Agenda
Times are subject to change.
Main Stage
Welcome to the Okta Gov Identity Summit
Katy Mann
SVP and GM, Public SectorOkta
Main Stage
Transform Your Organization With Secure Identity
As the World’s Identity Company, Okta recognizes Identity has never been more important than it is today - it drives every digital interaction, and powers every public sector organization. We also know that the heightened importance of Identity has, in turn, made it a prime attack vector for threat actors. In response, Okta is at the forefront of leading the next evolution: secure Identity.
Read MoreEric Kelleher
President, Customer Experience and CommunicationsOkta
Sean Frazier
VP, Federal Chief Security OfficerOkta
Katy Mann
SVP and GM, Public SectorOkta
Mike Uster
Chief Information Officer, Chief Technology Officer, and Senior Vice PresidentManTech
Keynote
Morning Keynote | Government
Jason Bonci
Chief Technology OfficerDepartment of the Air Force
Main Stage
Internet, Interrupted: Building Resilient and Reliable Digital Services
Public sector organizations exist to serve people– which today means serving them online. But how do your digital services measure up to those in the private sector? In this session, you’ll learn why public sector organizations adopt modern Identity as the core of their secure, human-centered digital services. You’ll leave with the insight you need to deliver reliable online services that build relationships and trust with the people you serve.
Jeremy "Remy" DeCausemaker
Open Source Lead, Digital ServiceCenters for Medicare & Medicaid Services (CMS)
Antonio Ramos
Chief Innovation and Technology OfficerGovernment of Puerto Rico
Fatima Terry
Deputy Director, Digital ServiceU.S. Department of Agriculture
Cassio Sampaio
Senior Vice President, ProductOkta
Main Stage
Zero Trust: What's Supporting the Pillars?
When CISA published the first Zero Trust Maturity Model (ZTMM), the five pillars took center stage: Identity, Device, Network, Application, and Data. But there’s more to it than that. This session focuses on the critical, cross-pillar capabilities that truly enable a Zero Trust architecture: Visibility and Analytics, Automation and Orchestration, and Governance. You’ll learn how these critical capabilities tie the pillars together for optimal Zero Trust maturity.
Nickolous Ward
Chief Information OfficerDrug Enforcement Administration
David Crawford
Lead Cyber Architect, National Security and JusticeCGI Federal
Sagnik Nandy
President and Chief Development OfficerWorkforce Identity
Custom
Identity Automation Accelerates Zero Trust Maturity
This session shines the spotlight on Automation and Orchestration, a foundational capability of your Zero Trust architecture. In this fast-paced chat with Identity expert Andrew Chanthaphone, you’ll learn the five essential Identity Workflows use cases that make the biggest impact on Zero Trust maturity and operational efficiency.
Andrew Chanthaphone
ICAM LeadLeidos
Sagnik Nandy
President and Chief Development OfficerWorkforce Identity
Government Session
Modern ICAM from the Enterprise to the Edge
This insightful session explores key challenges that organizations face with Identity, Credential, and Access Management (ICAM), particularly in the DOD. We’ll discuss ICAM solutions for (1) Mission Application Owners who rely on the power of enterprise identity; (2) Tactical Edge environments where missions are vital but connectivity is unreliable; and (3) cross-pillar Zero Trust maturity beyond simple checklists. So whether you’re a seasoned ICAM professional or new to the field, you’ll how to succeed with ICAM from the enterprise to the edge.
John Baase (CIV), PMP
Enterprise Identity, Credential & Access Management, PMDISA
Jason Bonci
Chief Technology OfficerDepartment of the Air Force
Wesley Smith
Chief Technology OfficerSelecTech
Sabrina Lea
DoD & Intel LeadOkta
Main Stage
Advancing the Security of Cloud Service Providers
As organizations adopt cloud technologies, hackers shifted their focus to cloud service providers (CSPs) themselves. But cloud security programs are not all created equal, and the shared responsibility model can blur the lines of accountability. Cloud services need more than just a secure product and infrastructure; it must be a true partnership that includes culture, discipline, and transparency. In this session, you’ll learn how leading CSPs are ensuring the confidentiality, integrity, and availability of your mission critical systems and data. You’ll also learn what federal agencies need to do to better secure those services in order to limit the risks to taxpayers and deploy modern IT architectures.
Dave Hinchman
Director, Information Technology & CybersecurityGovernment Accountability Office
Dr. Cynthia Sutherland
Emerging Industries Lead, Security AssuranceAmazon Web Services
Sean Frazier
VP, Federal Chief Security OfficerOkta
Main Stage
Identity is Everything in Human-Centered Design
Public sector organizations are reimagining online experiences to make their services fast and easy to find, apply for, track status, and receive. Human-Centered Design puts people at the center. But how? This session focuses on people, and the way humans interact with digital technology. You’ll learn how modern Identity helps you make great first impressions, reduces the dread of account creation, and eliminates the pain of passwords forever.
Ryan Galluzzo
Digital Identity Program Lead, Applied Cybersecurity DivisionNational Institute of Standards and Technology
Cassio Sampaio
Senior Vice President, ProductOkta
Main Stage
Visibility: The Vital Link in Supply Chain Security
You depend on your suppliers and mission partners. However, according to CISA, breaches are well-documented where attackers exploit sub-tier suppliers with poor cyber hygiene, and then pivot to attack the larger organization. This session explores visibility, the vital link in supply chain security. You’ll learn how to securely and scalably manage essential supplier and partner identities while improving observability to mitigate cyber risks.
Jeanette McMillian
Assistant Director for the Supply Chain and Cyber DirectorateOffice of the Director of National Intelligence
Theresa Campobasso
Senior Vice President, Strategic AccountsExiger Government Solutions
Arnab Bose
Chief Product Officer, Workforce Identity CloudOkta
Keynote
Queen of Cuba: An FBI Agent’s Insider Account of the Spy Who Evaded Detection for 17 Years
As a spy prepared to give away America’s biggest secrets after the 9/11 attacks, an FBI agent raced to catch her.
U.S. government officials knew they had a spy. But it never occurred to them it was a woman—and certainly not a superstar Defense Intelligence Agency employee known as “the Queen of Cuba.”
Ana Montes had spent seventeen years spying for the Cubans. She had been raised in a patriotic Puerto Rican household. Montes impressed her bosses, but in secret, spent her breaks memorizing top secret documents before sending them to the Cuban government. She received no payment, even as one of her missives could have brought her the death penalty.
After the 9/11 attacks, Cuba wanted Montes to continue her work. They couldn’t know the FBI was already on to her. Retired FBI agent Peter J. Lapp explains the clues—including never-released information—that led their team to catch one of the United States’ most dangerous spies.
Pete Lapp
Author "Queen of Cuba", FounderPJ Lapp Consulting LLC