CyberThreats 2025 - Federal, State & Local - 2 Day Summit


This event qualifies for .4 CEUs

This event qualifies for 4 CPEs

This event qualifies for 4 CLPs


The federal government has invested almost four years to move all its systems and networks to a zero trust (ZT) architecture, based on the concept of “never trust, always verify.” State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement ZTarchitectures, but there are numerous reasons they are either considering it or taking action to put it in place.

 

This has significantly improved cybersecurity, but it’s a moving target – bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate. To constantly improve an agency’s risk profile, security professionals at all levels of government must pay attention to trends both in cyber attacks and in new defensive measures.

 

Learning Objectives:

  • Review the five pillars of ZT architectures and which pillars are the hardest to address with legacy or siloed systems
  • Delineate the elements of identity, how they change by location, task and group
  • Apply the concept of “least privilege” to your agency’s implementation of a least permissive architecture to determine feasibility
  • Evaluate the concept of micro-segmentation and how it can be applied as a cybersecurity measure
  • Outline the range of analytics that can be used to understand your agency’s entire cybersecurity environment and response profile
  • Define the connections between automation and orchestration in cybersecurity and how they assist in analytics

Speaker and Presenter Information

Hosted & Moderated By:

Claudia Hosky, Publisher, FedInsider

Claudia Hosky
Publisher,
FedInsider

 

John Breeden II, Moderator & Contributing Editor, FedInsider

John Breeden II
Contributing Editor,
FedInsider

 

Day One: Beyond Zero Trust - Building Federal Cyber Resilience
The federal government has invested almost four years to move all its systems and networks to a least permissive access architecture, based on the concept of “never trust, always verify. This has significantly improved cybersecurity, but it's a moving target - bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate.

 

To constantly improve an agency's risk profile, security professionals must pay attention to trends both in cyber attacks and in new defensive measures. For instance, hackers are using AI to help their social engineering efforts, ferreting out and stealing legitimate login credentials.

 

Join us as thought leaders from government and industry discuss their progress in implementing least-permission and how they are thinking about next steps.

Larry Fuller, Senior Scientific Technical Manager for Cybersecurity, Naval Information Warfare Center (NIWC)

Larry Fuller
Sr. Scientific Technical Manager, Cybersecurity,
Naval Information Warfare Center (NIWC)

 

David Bottom, Chief Information Officer, Securities & Exchange Commission

David Bottom
Chief Information Officer,
Securities & Exchange Commission

 

Day Two: State & Local Requirements for Cyber Resilience
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place.

 

Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing driver’s licenses to approving building permits. It also helps these governments comply with various privacy and security regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), which protects sensitive health information from being disclosed without the patient’s consent.

 

Join us as thought leaders from state and local agencies and the cybersecurity industry discuss the nuances of implementing going even further than ZT, to least permissive, the challenges they have addressed and the benefits they have seen, and ways to build on it to strengthen cyber protections even more.

Cesar Gamez, Information Security Administrator, City of Roseville CA

Cesar Gamez
Information Security Administrator,
City of Roseville CA

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC


Register as Attendee


Add to Calendar


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed-Thu, May 28-29, 2025, 1:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
FedInsider


Contact Event Organizer



Return to search results