The Department of Homeland Security has a dual role in federal cybersecurity: securing its own networks and systems as one of the largest agencies in government, but also supporting civilian agencies and critical infrastructure in their own efforts to prevent and mitigate cyberattacks. Join us as we speak to DHS Chief Information Security Officer Ken Bible about efforts at DHS to support cybersecurity orders from the Biden administration and to enable integration and collaboration both within government and with the private sector.
Modern DevOps permits high velocity development cycles resulting in weekly, daily, or even hourly software releases. But outdated security practices pose a significant barrier even to the most efficient DevOps initiatives. This is especially true when we consider the explosive growth of cloud and container environments, where containers are orchestrated and infrastructure is software defined, meaning even the simplest of environments move at speeds beyond manual control, and beyond the speed of legacy Security practices. Overcoming the barriers presented by legacy security practices that are typically manually intensive and slow, requires a DevSecOps mindset. Learn how agencies have used the Dynatrace automated software intelligence platform, powered by AI, to satisfy needs for both rapid development and reliable security without compromise.
The May executive order by the Biden administration requires all federal information systems to meet or exceed specific standards and requirements for cybersecurity, remove obstacles to sharing of information in contract language, and modernize federal cybersecurity through a zero-trust model and effective cloud implementation. So what does that mean for individual agencies? How do they move forward in compliance and how can contract partners help get them there? This panel will examine tactical efforts underway to comply with the spirit and letter of the order.
In the last few years the federal government transitioned from a Cloud First to a Cloud Smart strategy, intended to guide agencies in leveraging the benefits of cloud technology without compromising security. Neither has been without their challenges. This panel will dig into progress toward these grand strategies, and how security fits into the vision of widespread deployment of cloud technology across federal agencies.
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
During this session, Pubic Sector thought leader, Josh Brodbent, will discuss how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.
As public and private sector alike recognize the vulnerabilities that exist within the supply chain, the Defense Department and Homeland Security recognize the potential of leveraging their own buying power to force higher standard of security. This panel will examine how government can bake security into procurement language and how the private sector can shore up their own processes to comply, all without creating a chilling effect that drives suppliers from the government market entirely.
NSA opened earlier this year the Cybersecurity Collaboration Center to serve as a hub of information exchange between the historically secretive intelligence agency and private sector cybersecurity experts, in an effort to join forces to counter increasingly sophisticated adversaries. It’s existence exemplifies government’s growing emphasis on partnership to better address threats targeting sensitive networks and systems. But how will this new entity operation? Join us we speak to Matthew Seligman, technical director of the Cybersecurity Collaboration Center to hear more about how this entity will function and enhance public-private cybersecurity efforts.
The rise of ransomware has had a profound impact on the threat landscape. Discover how Recorded Future can help identify the key indicators of today's ransomware attacks through validated intelligence reporting and much more.
The vast majority of critical infrastructure is owned by private sector. But as Colonial Pipeline demonstrated, ransomware attack can have a crippling effect on national security. This panel will examine the proper role of government in securing the nation’s critical infrastructure from ransomware and other cybercrime, how effective OT/IT integration can help eliminate security gaps, and where federal oversight can create resiliency within critical infrastructure without divvying what some argue amounts to unfunded mandates.
The last decade brought a reversal, from a time when the greatest tech advancements came out of government (internet anyone?) to one where industry and the so-called “Silicon Valley “ mindset fed some of the greatest tech marvels (thank you Steve Jobs). But for true innovation to happen in cybersecurity, fed by threat intelligence collected by both public and private sector organizations, the greatest minds in both government and industry much be in coordination. This panel will bring together leaders from hubs of innovation to dissect the next wave of cyber development, and what that could mean for technology today.
Federal agencies must prepare for the risk that ransomware and other cyber threats pose to mission data. Join Veeam in this session to learn how a comprehensive security framework, powered by secure backups, can let you meet this challenge with confidence.