On Demand
Winning the Cyber War
The cyber war is real — and the only way to win is with Zero Trust. Created by John Kindervag, Zero Trust shifts security from the perimeter to the protect surface, stopping breaches, containing threats, and securing critical infrastructure from the inside out. Mandated by governments and adopted by enterprises worldwide, Zero Trust is proven, practical, and essential to resilience. John’s keynote will show how Zero Trust transforms security into a business enabler and gives you the strategy to win.
Operationalizing Zero Trust Segmentation at the US Air Force
KPMG cyber experts will share how the U.S. Air Force leveraged Illumio segmentation to strengthen network security and limit the spread of cyberattacks. This session highlights the value continuum of Illumio, rapid deployment approaches, lessons learned during the Air Force implementation journey, and how segmentation supports the transition from implementation to sustained operations.
Zero Trust in an AI World
As AI adoption accelerates across government, it presents new opportunities as well as introduces new risks. Illumio Public Sector CTO Gary Barlet joins experts from GSA OIG and MITRE to examine how Zero Trust applies in the new AI world.
Zero Trust – A State and Local Perspective
State and local CISOs share real-world Zero Trust implementation experiences, highlighting progress, challenges, and lessons learned. This moderated panel explores funding constraints, workforce impacts, workload visibility gaps, policy enforcement hurdles, and strategies to strengthen cyber resilience across diverse government environments while advancing practical, scalable Zero Trust architectures.
Zero Trust at the Tipping Point: Why the Clock Is Ticking
Explore why Zero Trust has reached a critical tipping point, as AI accelerates threats and enables attackers of any skill level to operate with nation-state sophistication. This session will examine how agencies can move beyond incremental defenses to enforce segmentation, protect AI infrastructure, and build adaptive, antifragile architectures that contain breaches and strengthen over time.