NGFCW | Zero Trust Workshop 2024 - Agenda
Register    ➤

Agenda

Times are subject to change.

7:45 AM EST Tuesday, February 06

8:30 AM EST Tuesday, February 06

Main Stage

Welcome & Opening Remarks

5 minutes
ON DEMAND
Susan Valverde
Susan Valverde
Senior Manager, Federal Solution Engineering
Oracle
Susan Valverde
Susan Valverde
Senior Manager, Federal Solution Engineering
Oracle
Read More
8:35 AM EST Tuesday, February 06

Editorial

Guarding Consumer Data: CFPB's Zero Trust Journey

25 minutes
ON DEMAND

Scott Braus, Director of Cybersecurity Operations at the CFPB, provides valuable insights into the implementation and impact of Zero Trust strategies within his agency.

Scott Braus
Scott Braus
Director of Cybersecurity Operations
Consumer Financial Protection Bureau

Scott Braus, Director of Cybersecurity Operations at the CFPB, provides valuable insights into the implementation and impact of Zero Trust strategies within his agency.

Scott Braus
Scott Braus
Director of Cybersecurity Operations
Consumer Financial Protection Bureau
Read More
9:00 AM EST Tuesday, February 06

Underwritten

Safeguarding Tomorrow: An Exploration into Direct-Routed Network Architecture and Why it Matters for Federal Civilian Agencies

20 minutes
ON DEMAND

Zero Trust Access has emerged as a critical focal point for Federal Governments and Enterprise organizations alike. Establishing a resilient and comprehensive security strategy that aligns to Zero Trust best practices is imperative to safeguarding our agencies against the ever-changing threat landscape. In this session, join Appgate’s CEO and President Leo Taddeo as he discusses how Appgate’s unique direct-routed architecture facilitates flexibility, scalability and streamlined network management—ensuring compliance adherence, resilience to cyber threats and a future-ready infrastructure.

Leo Taddeo
Leo Taddeo
Chief Executive Officer and President
Appgate

Zero Trust Access has emerged as a critical focal point for Federal Governments and Enterprise organizations alike. Establishing a resilient and comprehensive security strategy that aligns to Zero Trust best practices is imperative to safeguarding our agencies against the ever-changing threat landscape. In this session, join Appgate’s CEO and President Leo Taddeo as he discusses how Appgate’s unique direct-routed architecture facilitates flexibility, scalability and streamlined network management—ensuring compliance adherence, resilience to cyber threats and a future-ready infrastructure.

Leo Taddeo
Leo Taddeo
Chief Executive Officer and President
Appgate
Read More
9:20 AM EST Tuesday, February 06

Editorial

Zero Trust at the Core of FDA's IT Approach

25 minutes

Chief Information Security Officer Craig Taylor joins the program to discuss how they are implementing Zero Trust and its integration into the Food and Drug Administration's overall IT strategy.

Craig Taylor
Craig Taylor
Chief Information Security Officer, Office of Digital Transformation
Food and Drug Administration

Chief Information Security Officer Craig Taylor joins the program to discuss how they are implementing Zero Trust and its integration into the Food and Drug Administration's overall IT strategy.

Craig Taylor
Craig Taylor
Chief Information Security Officer, Office of Digital Transformation
Food and Drug Administration
Read More
9:45 AM EST Tuesday, February 06

Underwritten

Zero Trust: Top 5 Best Practices

20 minutes
ON DEMAND

The rise of cyber-attacks indicates the obvious—the current approach to security isn’t working. Enter Zero Trust.

Read More
Evan Pelecky
Evan Pelecky
Product Manager for Cryptographic Key Management
Thales Trusted Cyber Technologies

The rise of cyber-attacks indicates the obvious—the current approach to security isn’t working. Enter Zero Trust.

There is not a single blueprint for implementing zero trust. EO 14028, NSM 8, and the National Cybersecurity Strategy require agencies to implement zero trust. And, DoD, CISA, NIST and OMB have all issued architecture guidance. This often results in agencies implementing a self-defined approach made up of an assortment of single-purpose solutions. An ad-hoc approach has limitations and is not scalable, often making an environment more susceptible to security gaps and vulnerabilities.

Attend this session to learn about the best practices for implementing zero trust. The speaker will discuss the top 5 tips for putting zero trust into action.

Evan Pelecky
Evan Pelecky
Product Manager for Cryptographic Key Management
Thales Trusted Cyber Technologies
Read More
10:05 AM EST Tuesday, February 06

10:20 AM EST Tuesday, February 06

Sponsored

Remarks from Netskope

5 minutes
ON DEMAND
Mark Mitchell
Mark Mitchell
Enterprise Security Architect
Netskope
Mark Mitchell
Mark Mitchell
Enterprise Security Architect
Netskope
Read More
10:25 AM EST Tuesday, February 06

Editorial

ITA's Path to the Future: Lessons on Zero Trust

25 minutes
ON DEMAND

ITA's Chief Information Officer Gerald Caron shares the challenges and lessons learned around Zero Trust --- and what the future looks like at ITA.

Gerald Caron
Gerald Caron
Chief Information Officer
International Trade Administration

ITA's Chief Information Officer Gerald Caron shares the challenges and lessons learned around Zero Trust --- and what the future looks like at ITA.

Gerald Caron
Gerald Caron
Chief Information Officer
International Trade Administration
Read More
10:50 AM EST Tuesday, February 06

Underwritten

Rise of the Machines! Zero Trust Considerations in an AI-Enabled Enterprise

20 minutes
ON DEMAND

From A(I) to Z(T), we’re inundated with new terms and technologies. Our enterprises are in a constant state of flex, users searching for better and faster ways to accomplish their goals, and administrators more effective ways to protect their assets. AI has drastically reduced time-to-task, but at what cost? And how has AI better enabled the threat actor? We will discuss these topics as well as how to implement flexible Zero Trust principles that securely support and embrace future tech.

Chris Usserman
Chris Usserman
Public Sector Chief Technology Officer
Infoblox

From A(I) to Z(T), we’re inundated with new terms and technologies. Our enterprises are in a constant state of flex, users searching for better and faster ways to accomplish their goals, and administrators more effective ways to protect their assets. AI has drastically reduced time-to-task, but at what cost? And how has AI better enabled the threat actor? We will discuss these topics as well as how to implement flexible Zero Trust principles that securely support and embrace future tech.

Chris Usserman
Chris Usserman
Public Sector Chief Technology Officer
Infoblox
Read More
11:10 AM EST Tuesday, February 06

Editorial

Exploring CISA's Zero Trust Maturity Model

25 minutes
ON DEMAND

Sean Connelly joins the program to discuss CISA's Zero Trust Maturity Model (ZTMM) and how it has supported CISA's journey to Zero Trust.

Sean Connelly
Sean Connelly
TIC Program Manager & Cybersecurity Architect, Cybersecurity Division
Cybersecurity & Infrastructure Security Agency

Sean Connelly joins the program to discuss CISA's Zero Trust Maturity Model (ZTMM) and how it has supported CISA's journey to Zero Trust.

Sean Connelly
Sean Connelly
TIC Program Manager & Cybersecurity Architect, Cybersecurity Division
Cybersecurity & Infrastructure Security Agency
Read More
11:35 AM EST Tuesday, February 06

Underwritten

The Impact of Quantum Computing on Zero Trust and How to Prepare

20 minutes
ON DEMAND

Find out how Quantum is impacting Cybersecurity and what this will mean for prioritizing, strategizing and budgeting for the future. We will cover the current threats, the current market and how to prepare for looming standards.

Joe Boye
Joe Boye
Federal Systems Integrator Engineering Manager
Palo Alto Networks

Find out how Quantum is impacting Cybersecurity and what this will mean for prioritizing, strategizing and budgeting for the future. We will cover the current threats, the current market and how to prepare for looming standards.

Joe Boye
Joe Boye
Federal Systems Integrator Engineering Manager
Palo Alto Networks
Read More
11:55 AM EST Tuesday, February 06

Editorial

Navigating Digital Landscapes with NARA

25 minutes
ON DEMAND

Join us as Nicole Willis, Deputy CIO, dives into the realm of Zero Trust, revealing the groundbreaking strategies the National Archives and Records Administration is using to fortifying their digital landscapes.

Nicole Willis
Nicole Willis
Deputy Chief Information Officer
National Archives and Records Administration
Jessie Bur
Jessie Bur
Managing Editor
Nextgov

Join us as Nicole Willis, Deputy CIO, dives into the realm of Zero Trust, revealing the groundbreaking strategies the National Archives and Records Administration is using to fortifying their digital landscapes.

Nicole Willis
Nicole Willis
Deputy Chief Information Officer
National Archives and Records Administration
Jessie Bur
Jessie Bur
Managing Editor
Nextgov
Read More
12:20 PM EST Tuesday, February 06

Editorial

Advancing Mission Success Through Zero Trust

25 minutes
ON DEMAND

Randy Resnick, from the Department of Defense, joins us to discuss his role in advancing mission success through Zero Trust.

Randy Resnick
Randy Resnick
Director, Zero Trust Portfolio Management Office
Department of Defense

Randy Resnick, from the Department of Defense, joins us to discuss his role in advancing mission success through Zero Trust.

Randy Resnick
Randy Resnick
Director, Zero Trust Portfolio Management Office
Department of Defense
Read More
12:45 PM EST Tuesday, February 06

Main Stage

Closing Remarks

5 minutes
ON DEMAND
Jessie Bur
Jessie Bur
Managing Editor
Nextgov
Jessie Bur
Jessie Bur
Managing Editor
Nextgov
Read More