Agenda

Tuesday, November 30th

Wednesday, December 1st

Thursday, December 2nd

Main Sessions

All times EST and subject to change

11:00am

Opening Remarks

George Jackson, Director of Events, GovExec

11:02am

Editorial

Enabling Trusted Digital Experiences in the DoD

Chris Cleary, Principal Cyber Advisor, Department of the Navy

Description

The U.S. Navy has continually worked to digitize the service branch’s work as well as develop its talent in the field. As the Navy continues to evolve to meet the growing demands, challenges still remain. Join the Navy's Principal Cyber Advisor, Christopher Cleary to examine issues like Zero Trust or Identity as it pertains to the Navy's partners inside the Department of Defense and out. He'll also highlight the role of the PCA and value of cyberesiliency in examining critical infrastructure, cyberoperations, warfighting functions, and cybercommand.

Watch Now

11:35am

Sponsored

Identity Market Trends and Insights

Dana Reed, Distinguished Engineer, Office of the Chief Technology Officer, SailPoint

Description

The identity and access (IAM) management market is experiencing a watershed moment in the wake of the global pandemic. The implementation of cloud, data analytics, and other digital initiatives have accelerated, but so too have cyber threats. IAM initiatives have risen in priority as organizations look to enable the digital business, while simultaneously tightening their belts on security. Join Mr. Dana Reed as he discusses the ever-evolving threat landscape and how it is shaping IAM business drivers. He will also discuss how regulations such as GDPR and CCPA and the recent Biden Administration’s Executive Order on Improving the Nation’s Cybersecurity are impacting the IAM market. Lastly, he will outline the top 5 IAM market trends for 2021-2022.

Watch Now

12:05pm

Editorial

Transforming Tomorrow: Enabling Digital Experiences

Jaime Noble, Director for IT Security & Chief Information Security Officer, Department of Justice, Office of Justice Programs

Mahreen Huque, Senior Manager, Cybersecurity, EY Government and Public Sector

Quint Van Deman, Office of the CISO, Amazon Web Services

Frank Briguglio, Public Sector Strategist, SailPoint

Description

The need for the public sector to replace aging and expensive application servers is fueled by changing demographics, emerging technologies, and more recently by pandemic-driven workplace precarities. As the world continues to adapt to a post-pandemic era, organization leaders find themselves in a position to take advantage of the shifts in culture and technology to meet their needs, while simultaneously ensuring secure access to data and applications. During this session we'll discuss how organizations are boosting innovation in their workforce, securing organizational-wide digital transformation, and using emerging technologies to help them stay ahead of the curve.

Watch Now

12:35pm

Booth, Networking, and Demo Break

Description

Please take some time to visit our virtual Exhibit Hall

1:05pm

Editorial

Identity Management Organization of the Year

Greg McCarthy, Chief Information Security Officer, City of Boston, Massachusetts

George Jackson, Director of Events, GovExec

Description

The City of Boston recently initiated a complete transformation of its identity program to improve their security posture, end reliance on legacy systems, and solve user experience issues. During this session, we'll sit down with the City of Boston's Chief Information Security Officer, Greg McCarthy, to discuss how his department has gone above and beyond to protect employee, customer, and partner identities by applying innovative approaches to enhance user experience.

Watch Now

1:40pm

Taming the Risk of Over Exposure with Identity

Mary Ann Blair, Chief Information Security Officer, Carnegie Mellon University

Dean Morstad, IAM Manager, Ramsey County

George Jackson, Director of Events, GovExec

Description

In the rush to get county staff up and running and productive, no matter where they work, many ultimately had more access than they needed. This increases the risk of cyber breaches and PII exposure. Join us to hear from state and local industry leaders about the risks associated with over-provisioning access, trends regarding cyber breaches, best practices for protecting personally identifiable information (PII), and more!

Watch Now

2:00pm

Sponsored

The Real-World Story of a Ransomware Attack

Joseph Carson, Chief Security Scientist & Advisory CISO, ThycoticCentrify

Description

Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker's techniques used and how they went from zero to full domain admin compromise that resulted in a nasty CryLock ransomware incident.

Watch Now

2:30pm

Closing Remarks

George Jackson, Director of Events, GovExec