Hear from HHS Chief Information Security Officer Kenneth W. Bible on how he's developing modern identity solutions for his organization.
Reduce Identity Exposure Risk by Securing and Monitoring Active Directory
Zero Trust assumes a breach has occurred. A secure Active Directory (AD) environment is an essential step in minimizing the damage from a cyber attack and enabling a Zero Trust environment. In this presentation, we will discuss how hackers leverage AD to achieve successful cyber attacks that lead to encryption (aka ransomware) and/or exfiltration of sensitive data, and how proactive AD security steps can block attack paths and prevent damage from those attacks.
Agency Spotlight: CISA
Hear from CISA Architecture Branch Chief Grant Dasher on how his agency is identifying and working to address identity security issues in the federal space.
Technology Insights 2
Session presented by Elite Underwriter, Socure
Agency Spotlight: Department of Education
Hear from Education CISO Steve Hernandez on how his agency is using technology to optimize secure identity solutions.
Cyber Security Strategies and the importance of edge computing environment
With cyberattacks increasing in quantity and sophistication it is becoming ever-more-important for all government entities to develop a pro-active and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because frequently these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. (1) In this session we will discuss why this is such an important area of cyber security focus and share key insights to help inform government entity decision making processes.
Agency Spotlight: FEMA
Hear from FEMA CISO Dr. Gregory Edwards on how his agency is using employing solutions for modern identity security.