Mimic
No module selected or the selected module cannot be mimicked.
Agenda
Times are subject to change.
Registration, Breakfast, & Networking
Welcome to the 2025 Zero Trust Workshop!
Welcome to the 2025 Zero Trust Workshop!
Welcome to the 2025 Zero Trust Workshop!
Keynote
Keynote: The Pillars of the Zero Trust Model
During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.
During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.
During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.
Underwriter
Editorial
Continuous Monitoring & Threat Detection
Zero Trust requires continuous monitoring, real-time threat detection, and adaptive defenses to stay ahead of emerging threats. Explore how to implement continuous monitoring tools to detect anomalies and respond to threats before they escalate.
Zero Trust requires continuous monitoring, real-time threat detection, and adaptive defenses to stay ahead of emerging threats. Explore how to implement continuous monitoring tools to detect anomalies and respond to threats before they escalate.
Paul Blahusch
Chief Information Security OfficerDepartment of Labor
Zero Trust requires continuous monitoring, real-time threat detection, and adaptive defenses to stay ahead of emerging threats. Explore how to implement continuous monitoring tools to detect anomalies and respond to threats before they escalate.
Paul Blahusch
Chief Information Security OfficerDepartment of Labor
Underwriter
Underwritten
Fortifying Federal Security: The Zero-Trust Imperative
In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.
In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.
Richard Breakiron
Senior Strategist, Executive & Security Programs, Americas Federal SectorCommvault
In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.
Richard Breakiron
Senior Strategist, Executive & Security Programs, Americas Federal SectorCommvault
Editorial
Zero Trust in the Cloud
During this session, focus on strategies for securing cloud workloads, enforcing consistent policies, and managing identity and access across multiple platforms.
During this session, focus on strategies for securing cloud workloads, enforcing consistent policies, and managing identity and access across multiple platforms.
Jennifer Franks
Director, IT and CybersecurityGovernment Accountability Office
During this session, focus on strategies for securing cloud workloads, enforcing consistent policies, and managing identity and access across multiple platforms.
Jennifer Franks
Director, IT and CybersecurityGovernment Accountability Office
Underwriter
Editorial
Fireside Chat: Identity and Access Management
Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.
Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.
Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.
Editorial
Fireside Chat: Overcoming Zero Trust Challenges: Lessons from Leaders
Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.
Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.
Paul Selby
Chief Information Security Officer and Deputy Chief Information OfficerDepartment of Energy
Louis Eichenbaum
Zero Trust Program ManagerDepartment of the Interior
Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.
Paul Selby
Chief Information Security Officer and Deputy Chief Information OfficerDepartment of Energy
Louis Eichenbaum
Zero Trust Program ManagerDepartment of the Interior
Closing Remarks
Thank you for attending the 2025 Zero Trust Workshop!
Thank you for attending the 2025 Zero Trust Workshop!
Thank you for attending the 2025 Zero Trust Workshop!