On Demand
Keynote: The Pillars of the Zero Trust Model
During this opening keynote, travel through a step-by-step guide to understanding and implementing each pillar of the Zero Trust model. Identify best practices for identity verification, device compliance, network segmentation, application security, and continuous data monitoring.
Security Acro-salad: AI’s, EO’s, & RTO’s Impact on ZT
As agencies continue to push forward with Zero Trust, evolving threats, an Administration change, and policy mandates are introducing new complexities—AI’s dual role in cybersecurity, the rapid shift in compliance requirements through executive orders, and the security impact of everyone returning to the office. However, the key to managing risk and maintaining compliance lies in reinforcing foundational security practices. This session explores how agencies can align Zero Trust principles with core security controls like asset visibility, identity management, and protective DNS to create a resilient, policy-driven security framework.
Underwritten by:

Quantum Computing and AI
As quantum computing and artificial intelligence reshape the cybersecurity and privacy landscape, agencies must evolve to address new regulatory and compliance challenges. Examine the intersection of quantum security, AI, and emerging legal frameworks.
Fortifying Federal Security: The Zero-Trust Imperative
In today’s complex cyber landscape, federal agencies must adopt a zero-trust architecture (ZTA) to protect sensitive data. Unlike traditional perimeter defenses, ZTA assumes all networks and users are potentially compromised, requiring continuous verification and strict access controls. Richard Breakiron, Senior Director at Commvault, emphasizes the importance of integrating security into every aspect of the network from the start. ZTA minimizes the attack surface and enhances threat detection and response, aligning with the National Institute of Standards and Technology’s Cybersecurity Framework. Despite the White House’s September 2024 deadline, most federal agencies are targeting fiscal 2027. Agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks and ensure long-term security.
Underwritten by:

Zero Trust and Risk Management
During this session, focus on the mutually reinforcing concepts of zero trust and risk management, and learn how the two can work in tandem.
Crossing the CAASM to Zero Trust
A conversation around crossing the CAASM to Zero Trust. This session will focus on how Axonius positions itself for Zero Trust, emphasizing the role of asset visibility. It will outline what asset visibility is and define what assets are.
Underwritten by:

Fireside Chat: Identity and Access Management
Identity is at the center of the Zero Trust model. During this session, examine how public sector organizations can implement multi-factor authentication (MFA), identity governance, and least-privilege access to secure their systems.
Fireside Chat: Overcoming Zero Trust Challenges: Lessons from Leaders
Listen in as public sector leaders who have successfully navigated legacy systems, budget constraints, organizational silos, and other challenges during Zero Trust implementation to share their lessons learned, solutions, and best practices.