This discussion focuses on leveraging network traffic visibility to help organizations reach the strategic goals and tasks associated with the Network/Environment Pillar described in the draft Zero Trust Maturity Model developed by CISA and set forth in OMB Memorandum 22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the "current state of assets network infrastructure and communications" to improve an enterprise's security posture is a fundamental tenet of zero trust and the ability to observe "all network traffic" is a requirement.
By deploying network traffic visibility, an enterprise will be able to:
1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;
2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.
The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at government's approach to crypto, including:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.
"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.
How do threats appear in your network and who is behind this malicious activity? What can you do to protect yourselves from these threats, and who can help you identify this activity? In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk.
It has been just over a year since the Senate confirmed Chris Inglis as the National Director for Cybersecurity. Since then, the office has grown to over 40 people and has become engaged in every aspect of U.S. cybersecurity. Join us for this exclusive fireside chat with Senior Policy Advisor Rex Booth as he shares his insights on:
Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves?
Join the FBI's Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including:
Zero Trust, buzzword of the decade, game changing approach to securing our information systems, or something else? Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:
The FCC and the Department of Justice. One is charged with protecting our critical communications infrastructure, the other with enforcing laws enacted to protect public and private cybersecurity interests.
In this exclusive panel, Andrea Simpson, CISO of the FCC, joins Benjamin Goldsmith, Principal Scientific Officer of the DOJ's National Security Division, to discuss:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
For years, it was known as "No Such Agency." Today, the National Security Agency is prominent in its roles to protect the U.S. Defense Industrial Base. And in this session, Bailey Bickley, Chief Strategy Officer at NSA's Cybersecurity Collaboration Center, will open up exclusively on:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
This discussion focuses on leveraging network traffic visibility to help organizations reach the strategic goals and tasks associated with the Network/Environment Pillar described in the draft Zero Trust Maturity Model developed by CISA and set forth in OMB Memorandum 22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the "current state of assets network infrastructure and communications" to improve an enterprise's security posture is a fundamental tenet of zero trust and the ability to observe "all network traffic" is a requirement.
By deploying network traffic visibility, an enterprise will be able to:
1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;
2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.
The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?
Join government/crypto expert Ari Redbord for an entertaining and informative look at government's approach to crypto, including:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.
"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.
How do threats appear in your network and who is behind this malicious activity? What can you do to protect yourselves from these threats, and who can help you identify this activity? In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk.
It has been just over a year since the Senate confirmed Chris Inglis as the National Director for Cybersecurity. Since then, the office has grown to over 40 people and has become engaged in every aspect of U.S. cybersecurity. Join us for this exclusive fireside chat with Senior Policy Advisor Rex Booth as he shares his insights on:
Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves?
Join the FBI's Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including:
Zero Trust, buzzword of the decade, game changing approach to securing our information systems, or something else? Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:
The FCC and the Department of Justice. One is charged with protecting our critical communications infrastructure, the other with enforcing laws enacted to protect public and private cybersecurity interests.
In this exclusive panel, Andrea Simpson, CISO of the FCC, joins Benjamin Goldsmith, Principal Scientific Officer of the DOJ's National Security Division, to discuss:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
For years, it was known as "No Such Agency." Today, the National Security Agency is prominent in its roles to protect the U.S. Defense Industrial Base. And in this session, Bailey Bickley, Chief Strategy Officer at NSA's Cybersecurity Collaboration Center, will open up exclusively on:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
July 26 - 27, 2022
Government Summit