Zero Trust Workshop 2025 - Agenda
Register    ➤

Mimic

No module selected or the selected module cannot be mimicked.

Agenda

Times are subject to change.

8:00 AM EST Thursday, February 06

Registration, Breakfast, & Networking

1 hour

Welcome to the 2025 Zero Trust Workshop!

Welcome to the 2025 Zero Trust Workshop!

Read More
9:00 AM EST Thursday, February 06

Opening Remarks

5 minutes
ON DEMAND
Jessie Bur
Jessie Bur
Executive Editor
Nextgov/FCW
Read More
9:05 AM EST Thursday, February 06

Opening Remarks: Oracle

5 minutes
ON DEMAND
Sandy Barsky
Sandy Barsky
Master Principal Cloud Architect
Oracle
Read More
9:10 AM EST Thursday, February 06

Keynote

Keynote: The Pillars of the Zero Trust Model

25 minutes
ON DEMAND

During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.

During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.

Paul Selby
Paul Selby
Chief Information Security Officer and Deputy Chief Information Officer
Department of Energy
Read More
9:35 AM EST Thursday, February 06

Underwriter

Infoblox

Underwritten

Security Acro-salad: AI’s, EO’s, & RTO’s Impact on ZT

20 minutes
ON DEMAND

As agencies continue to push forward with Zero Trust, evolving threats, an Administration change, and policy mandates are introducing new complexities—AI’s dual role in cybersecurity, the rapid shift in compliance requirements through executive orders, and the security impact of everyone returning to the office. However, the key to managing risk and maintaining compliance lies in reinforcing foundational security practices. This session explores how agencies can align Zero Trust principles with core security controls like asset visibility, identity management, and protective DNS to create a resilient, policy-driven security framework.

As agencies continue to push forward with Zero Trust, evolving threats, an Administration change, and policy mandates are introducing new complexities—AI’s dual role in cybersecurity, the rapid shift in compliance requirements through executive orders, and the security impact of everyone returning to the office. However, the key to managing risk and maintaining compliance lies in reinforcing foundational security practices. This session explores how agencies can align Zero Trust principles with core security controls like asset visibility, identity management, and protective DNS to create a resilient, policy-driven security framework.

Chris Usserman
Chris Usserman
Chief Technology Officer, Public Sector
Infoblox
Read More
Infoblox
9:55 AM EST Thursday, February 06

Editorial

Quantum Computing and AI

25 minutes
ON DEMAND

As quantum computing and artificial intelligence reshape the cybersecurity and privacy landscape, agencies must evolve to address new regulatory and compliance challenges. Examine the intersection of quantum security, AI, and emerging legal frameworks.

As quantum computing and artificial intelligence reshape the cybersecurity and privacy landscape, agencies must evolve to address new regulatory and compliance challenges. Examine the intersection of quantum security, AI, and emerging legal frameworks.

Ryan McKenney
Ryan McKenney
Director of Government Relations and General Counsel of Compliance
Quantinuum
Jessie Bur
Jessie Bur
Executive Editor
Nextgov/FCW
Read More
10:20 AM EST Thursday, February 06

Underwriter

Commvault

Underwritten

Fortifying Federal Security: The Zero-Trust Imperative

20 minutes
ON DEMAND

In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.

In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.

Richard Breakiron
Richard Breakiron
Senior Strategist, Executive & Security Programs, Americas Federal Sector
Commvault
Read More
Commvault
10:40 AM EST Thursday, February 06

Editorial

Zero Trust and Risk Management

25 minutes
ON DEMAND

During this session, focus on the mutually reinforcing concepts of zero trust and risk management, and learn how the two can work in tandem.

During this session, focus on the mutually reinforcing concepts of zero trust and risk management, and learn how the two can work in tandem.

Victoria Pillitteri
Victoria Pillitteri
Manager, Security Engineering and Risk Management Group, Computer Security Division
NIST
David DiMolfetta
David DiMolfetta
Cybersecurity Reporter
Nextgov/FCW
Read More
11:05 AM EST Thursday, February 06

11:20 AM EST Thursday, February 06

Underwriter

Axonius

Underwritten

Crossing the CAASM to Zero Trust

20 minutes
ON DEMAND

A conversation around crossing the CAASM to Zero Trust. This session will focus on how Axonius positions itself for Zero Trust, emphasizing the role of asset visibility. It will outline what asset visibility is and define what assets are.

A conversation around crossing the CAASM to Zero Trust. This session will focus on how Axonius positions itself for Zero Trust, emphasizing the role of asset visibility. It will outline what asset visibility is and define what assets are.

Brian "Stretch" Meyer
Brian "Stretch" Meyer
Field Chief Technology Officer
Axonius Federal
Read More
Axonius
11:35 AM EST Thursday, February 06

Editorial

Fireside Chat: Identity and Access Management

25 minutes
ON DEMAND

Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.

Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.

Ryan Galluzzo
Ryan Galluzzo
Digital Identity Program Lead, Applied Cybersecurity Division
NIST
Natalie Alms
Natalie Alms
Staff Reporter
Nextgov/FCW
Read More
12:00 PM EST Thursday, February 06

Underwritten

A Session Presented by VAST

15 minutes
ON DEMAND
Randy Hayes
Randy Hayes
Vice President of Public Sector
VAST Data Federal
Read More
12:15 PM EST Thursday, February 06

Editorial

Fireside Chat: Overcoming Zero Trust Challenges: Lessons from Leaders

25 minutes
ON DEMAND

Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.

Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.

Jennifer Franks
Jennifer Franks
Director, IT and Cybersecurity
Government Accountability Office
David DiMolfetta
David DiMolfetta
Cybersecurity Reporter
Nextgov/FCW
Read More
12:40 PM EST Thursday, February 06

Closing Remarks

5 minutes
ON DEMAND

Thank you for attending the 2025 Zero Trust Workshop!

Thank you for attending the 2025 Zero Trust Workshop!

Jessie Bur
Jessie Bur
Executive Editor
Nextgov/FCW
Read More

Promo Image