Cyber Defenders Workshop 2025 - Agenda
Register    ➤

Agenda

Times are subject to change.

9:00 AM EST Tuesday, March 04

Welcome and Opening Remarks

1 minute
ON DEMAND

Welcome to the Cyber Defenders Workshop!

Welcome to the Cyber Defenders Workshop!

Jessie Bur
Jessie Bur
Executive Editor
Nextgov/FCW
Read More
9:01 AM EST Tuesday, March 04

Underwriter

Invicti

Remarks from Invicti

4 minutes
ON DEMAND
Frank Catucci
Frank Catucci
CTO
Invicti
Read More
Invicti
9:05 AM EST Tuesday, March 04

Keynote: Building a Resilient Cybersecurity Framework

25 minutes
ON DEMAND

Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.

Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.

Sonny Bhagowalia
Sonny Bhagowalia
Assistant Commissioner and Chief Information Officer
U.S. Customs and Border Protection
Read More
9:30 AM EST Tuesday, March 04

Underwriter

Lookout

The Modern Kill Chain

26 minutes
ON DEMAND

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

Read More

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

 

Jim Coyle
Jim Coyle
US Public Sector CTO
Lookout
Read More
Lookout
9:56 AM EST Tuesday, March 04

A Culture of Cybersecurity Vigilance

27 minutes
ON DEMAND

What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.

What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.

Marisol Cruz Cain
Marisol Cruz Cain
Director, Information and Cybersecurity
GAO
Read More
10:23 AM EST Tuesday, March 04

Underwriter

Google Cloud Security

Modernizing Defenses to Combat Cyber Threats

17 minutes
ON DEMAND

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Read More

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Key Takeaways:

  • Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
  • Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
  • Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.
Erin Joe
Erin Joe
Senior Cybersecurity Advisor
Google Cloud Office of the CISO
Tom Suder
Tom Suder
President
ATARC
Read More
Google Cloud Security
10:40 AM EST Tuesday, March 04

Coffee Break

10 minutes

Refill your coffee and get ready for part two of this action-packed event!

Refill your coffee and get ready for part two of this action-packed event!

Read More
10:50 AM EST Tuesday, March 04

Mid-day Remarks

1 minute
ON DEMAND
Jessie Bur
Jessie Bur
Executive Editor
Nextgov/FCW
Read More
10:51 AM EST Tuesday, March 04

Securing the Supply Chain

28 minutes
ON DEMAND

Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.

Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.

Erin Joe
Erin Joe
Senior Cybersecurity Advisor
Google Cloud Office of the CISO
Tom Suder
Tom Suder
President
ATARC
Read More
11:19 AM EST Tuesday, March 04

Underwriter

Axonius

Modernizing Asset Management for Cyber Security Teams

20 minutes
ON DEMAND

Why do current asset management methods fail for cybersecurity teams?

Read More

Why do current asset management methods fail for cybersecurity teams?

In today's rapidly evolving digital landscape, cybersecurity teams face numerous challenges in managing assets effectively. Traditional asset management methods often fall short, leaving organizations vulnerable to cyber threats.

Challenges with Current Methods:

  • Scanning techniques can be slow and incomplete, missing critical vulnerabilities.
  • Relying on agents can lead to performance issues and gaps in coverage.
  • Manual processes in the Network Operations Center (NOC) can be time-consuming and prone to human error.
  • Manual asset management is labor-intensive and often fails to keep up with the dynamic nature of modern IT environments.

To address these challenges, companies are turning to Cyber Asset Attack Surface Management (CAASM). CAASM provides a more comprehensive and automated approach to asset management, helping cybersecurity teams stay ahead of potential threats

Allison Judge
Allison Judge
Federal Field Engineer
Axonius Federal Systems
Read More
Axonius
11:39 AM EST Tuesday, March 04

Closing Remarks

1 minute

Thank you for joining the Cyber Defenders Workshop!

Thank you for joining the Cyber Defenders Workshop!

Read More