Agenda
Times are subject to change.
Welcome and Opening Remarks
Welcome to the Cyber Defenders Workshop!
Welcome to the Cyber Defenders Workshop!

Jessie Bur
Executive EditorNextgov/FCW
Underwriter

Keynote: Building a Resilient Cybersecurity Framework
Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.
Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.

Sonny Bhagowalia
Assistant Commissioner and Chief Information OfficerU.S. Customs and Border Protection
Underwriter

The Modern Kill Chain
As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.
As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.
Read More
Jim Coyle
US Public Sector CTOLookout

A Culture of Cybersecurity Vigilance
What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.
What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.

Marisol Cruz Cain
Director, Information and CybersecurityGAO
Underwriter

Modernizing Defenses to Combat Cyber Threats
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Key Takeaways:
- Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
- Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
- Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Read More
Erin Joe
Senior Cybersecurity AdvisorGoogle Cloud Office of the CISO

Tom Suder
PresidentATARC

Coffee Break
Refill your coffee and get ready for part two of this action-packed event!
Refill your coffee and get ready for part two of this action-packed event!
Securing the Supply Chain
Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.
Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.

Erin Joe
Senior Cybersecurity AdvisorGoogle Cloud Office of the CISO

Tom Suder
PresidentATARC
Underwriter

Modernizing Asset Management for Cyber Security Teams
Why do current asset management methods fail for cybersecurity teams?
In today's rapidly evolving digital landscape, cybersecurity teams face numerous challenges in managing assets effectively. Traditional asset management methods often fall short, leaving organizations vulnerable to cyber threats.
Challenges with Current Methods:
- Scanning techniques can be slow and incomplete, missing critical vulnerabilities.
- Relying on agents can lead to performance issues and gaps in coverage.
- Manual processes in the Network Operations Center (NOC) can be time-consuming and prone to human error.
- Manual asset management is labor-intensive and often fails to keep up with the dynamic nature of modern IT environments.
To address these challenges, companies are turning to Cyber Asset Attack Surface Management (CAASM). CAASM provides a more comprehensive and automated approach to asset management, helping cybersecurity teams stay ahead of potential threats
Why do current asset management methods fail for cybersecurity teams?
Read More
Allison Judge
Federal Field EngineerAxonius Federal Systems

Closing Remarks
Thank you for joining the Cyber Defenders Workshop!
Thank you for joining the Cyber Defenders Workshop!