Track 1

Cyber Security - Build Resilience

-
Navigating the Shifting Cyber Landscape
Salon I
The right combination of cyber strategies, tools, and operations is critical to effective cyber defense, but Federal CISOs and cyber defenders struggle to keep pace in a constantly shifting landscape. Learn about new strategies to prioritize risk and continuously evolve security capabilities, and see how AI, cloud, and cyber automation are changing the future – and effectiveness – of cyber defense in the Federal government.

Speakers

Bergen
Chief Technology Officer, Technology Innovation Services
GDIT
-
The Real Story on Zero Trust Architecture
Salon I
Risk is created when users, applications, data, and networks are implicitly trusted, but how can cyber defenders go beyond the buzzwords and effectively leverage a Zero Trust cyber strategy? Understand the realities behind effective Zero Trust Architecture (ZTA) and learn how to leverage automation, AI/ML, and native technologies to drive a prevention-focused transformation model. Real-world Federal government use cases show the true power of Zero Trust to thwart adversaries.
-
Mastering Cloud-native Cyber Security
Salon I
Decentralized, multi-cloud hybrid environments are the reality for most agencies today – further complicating their cyber defense challenges. Agencies need comprehensive cloud-focused cyber capabilities that scale securely with their mission. Learn how to optimize cloud security with a Secure Cloud Computing Architecture (SCCA), automation, and cloud-native cyber security products. Explore how to transform existing cyber tools to integrate and automate cyber operations in the cloud – extending the impact of your agency’s investment.
-
What's New? Autonomous Cyber Security and SOAR
Salon I
As cyber threat velocity and volume continue to grow unchecked, Autonomous Cyber Defense will move to the forefront in protecting government organizations. See what it takes to implement this new approach ‒ which focuses on automated detection and real-time response ‒ and the vital role of Security Orchestration, Automation, and Response (SOAR) technologies. Explore current state and how Autonomous Cyber Defense will reshape Federal cyber security strategies in the future.