Agenda
August 14, 2024
Times are subject to change.
Welcome Remarks
Welcome to the 2024 Identity Security Workshop!
Welcome to the 2024 Identity Security Workshop!
Zero Trust and Identity Management
Zero trust architecture and identity management solutions form a robust framework for a modern cybersecurity structure. In this session, hear more about zero trust security, privacy protections, and resiliency in your IT infrastructure.
Zero trust architecture and identity management solutions form a robust framework for a modern cybersecurity structure. In this session, hear more about zero trust security, privacy protections, and resiliency in your IT infrastructure.
Dr. Amy S. Hamilton
Government ChairDepartment of Energy, National Defense University, College of Information and Cyberspace
Identity In the Shadows, Shedding Light on Zero Trust, Tenable Underwriter Session
In today’s ever-changing cybersecurity landscape, safeguarding your organization demands a paradigm shift—enter Zero Trust. Join us for an illuminating presentation that delves into the critical role of an organization's Identity Provider in fortifying Zero Trust Architecture.
We'll start by demystifying the concept of Zero Trust, next, we’ll explore the pivotal role of Identity within Zero Trust as identity is the cornerstone of this framework, and then we will then examine common use cases and attack vectors that exploit identity weaknesses. Understanding these real-world scenarios is crucial to comprehending how a robust Zero Trust strategy can thwart potential threats.
We’ll also showcase how Tenable supports the Zero Trust Architecture, highlighting tools and solutions designed to seamlessly integrate with your Identity Provider, enhancing your organization's security posture.
Don't miss this opportunity to transform your security strategy. Embrace Zero Trust and empower your Identity Provider to be the linchpin of your organization’s defense.
In today’s ever-changing cybersecurity landscape, safeguarding your organization demands a paradigm shift—enter Zero Trust. Join us for an illuminating presentation that delves into the critical role of an organization's Identity Provider in fortifying Zero Trust Architecture.
Read MoreTim Oroszi
Principal Security EngineerTenable
Agency Spotlight: GSA
The U.S. GSA, or General Services Administration, exists to manage the basic functions of federal agencies. Listen in as we sit down with an incredible GSA representative to discuss security, Login.gov, and identity management practices.
The U.S. GSA, or General Services Administration, exists to manage the basic functions of federal agencies. Listen in as we sit down with an incredible GSA representative to discuss security, Login.gov, and identity management practices.
Dr. Babur Kohy
Acting Director of Identity Assurance and Trusted Access Division, Office of Technology PolicyGSA
Debunking the Myths of Digital Identity: Establishing Digital Trust in the Age of AI, Socure Underwriter Session
In an era where digital identity is increasingly critical for both cybersecurity and citizen services, government agencies must navigate a landscape rife with misinformation and sophisticated AI-driven deception. This session will dispel common myths surrounding digital identity and highlight how government agencies can lead in establishing digital trust. We will discuss the latest challenges and solutions in identity verification, focusing on balancing security, privacy, and user experience.
In an era where digital identity is increasingly critical for both cybersecurity and citizen services, government agencies must navigate a landscape rife with misinformation and sophisticated AI-driven deception. This session will dispel common myths surrounding digital identity and highlight how government agencies can lead in establishing digital trust. We will discuss the latest challenges and solutions in identity verification, focusing on balancing security, privacy, and user experience.
Adam Hughes
Co-Founder and PresidentGovNavigators LLC
Jennifer Kerber
Senior Director, Government AffairsSocure
Agency Spotlight: CISA
The Cybersecurity and Infrastructure Agency, or CISA, overlooks federal cybsecurity and infrastructure protection and defense. Listen in as we sit down with a CISA representative to explore identity management and ICAM practices.
The Cybersecurity and Infrastructure Agency, or CISA, overlooks federal cybsecurity and infrastructure protection and defense. Listen in as we sit down with a CISA representative to explore identity management and ICAM practices.
Arielle Baine
Chief of CybersecurityRegion 3, in the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency
How to Secure Your Agency’s Identities and Privileged Access BeyondTrust/Ping Identity Underwriter Session
It’s estimated that approximately 80% of hacking related security breaches involve the misuse of privileged credentials. A zero-trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy.
Deploying a strong Identity, Credential and Access Management (ICAM) program as part of your zero trust strategy allows you to take an integrated approach to users, applications, and data across your increasingly complex infrastructure. ICAM means ensuring the right users have the appropriate access to the appropriate resources, at the right time. Most importantly it means managing heightened privileged access across the enterprise.
Join this session to learn how BeyondTrust and Ping Identity deliver the key components of zero trust, while empowering worker productivity with seamless access just when they need it.
It’s estimated that approximately 80% of hacking related security breaches involve the misuse of privileged credentials. A zero-trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy.
Deploying a strong Identity, Credential and Access Management (ICAM) program as part of your zero trust strategy allows you to take an integrated approach to users, applications, and data across your increasingly complex infrastructure. ICAM means ensuring the right users have the appropriate access to the appropriate resources, at the right time. Most importantly it means managing heightened privileged access across the enterprise.
Join this session to learn how BeyondTrust and Ping Identity deliver the key components of zero trust, while empowering worker productivity with seamless access just when they need it.
Kelvin Brewer, CISSP, CEH
Director, Public Sector Sales EngineeringPing Identity
Michael Saintcross
VP FederalBeyondTrust
Tom Suder
ModeratorATARC
A Comprehensive Security Framework
Dig deep into information security, risk management, and data protection as we sit down with a government expert to discuss what is necessary for a robust security framework.
Dig deep into information security, risk management, and data protection as we sit down with a government expert to discuss what is necessary for a robust security framework.
Ryan Galluzzo
Digital Identity Program Lead, Applied Cybersecurity DivisionNIST
ZT, EO14028 and AAL-2/3: How Future-proof MFA Ticks All Boxes, Axiad Underwriter Session
A number of critical government mandates require not only multifactor authentication, but strong, phishing-resistant MFA that scales to thousands of users. At the same time, adversaries are getting better at compromising MFA every day. In this session we’ll show how MFA can be augmented to make it phishing-resistant and compliant to high AAL standards…without ripping and replacing existing systems and solutions. We’ll show how to defend against the latest adversary-in-the-middle (AitM) toolkits while making your existing MFA system resilient and future-proof.
A number of critical government mandates require not only multifactor authentication, but strong, phishing-resistant MFA that scales to thousands of users. At the same time, adversaries are getting better at compromising MFA every day. In this session we’ll show how MFA can be augmented to make it phishing-resistant and compliant to high AAL standards…without ripping and replacing existing systems and solutions. We’ll show how to defend against the latest adversary-in-the-middle (AitM) toolkits while making your existing MFA system resilient and future-proof.
Michael Thelander
Sr. Director of Product MarketingAxiad
Closing Remarks
Thank you for attending the 2024 Identity Security Workshop!
Thank you for attending the 2024 Identity Security Workshop!