Federal Solutions Forum

Today, defenders have in their arsenal faster and more capable technology than ever before. We can build robust prevention, detection, and response processes that augment and empower security analysts. In this solutions forum, we’re going to look at four areas of technology that deliver these improvements and help bolster an organization’s security posture:

  • Zero Trust
  • Endpoint Detection and Response
  • Identity and Access Management
  • Ransomware
Federal_Solutions_Forum.jpg

In Partnership With

Carahsoft-Blue-Logo-Web.png

Sponsors

centrify-logo-sized-768x384.jpgfortinet-logo.pngGigamon-Logo.pngDigitalnetwitness-logo-RGB.PNGOkta_Logo_BrightBlue_Medium.pngRadiant_Logic_Logo.jpgsplunk_logo.pngZscaler_Logo.png

Time

Description

10:30 - 10:45 AM ET

Opening Remarks

In the world of information security, it often feels like we are on the edge of our seats (or a rocky precipice), waiting for the next attack to take place – unsure of which network will be struck first. In the first half of 2021 alone, threat actors have launched attacks that have crippled pipelines and disrupted schools, hospitals, and supermarkets, demanding tens of millions of dollars in extortion fees and ransom payments along the way. It is easy to look at this landscape and feel like defenders do not stand a chance. However, the truth is quite the opposite.

Today, defenders have in their arsenal faster and more capable technology than ever before. We can build robust prevention, detection, and response processes that augment and empower security analysts. In this solutions forum, we’re going to look at four areas of technology that deliver these improvements and help bolster an organization’s security posture:

  • Zero Trust
  • Endpoint Detection and Response
  • Identity and Access Management
  • Ransomware

Matt Bromiley, SANS Instructor

Brian O'Donnell, Vice President, Carahsoft Technology Corp.

10:45 - 11:25 AM ET

Zero Trust Panel
In the wake of the massive breach of computer systems of multiple government agencies discovered in December 2020, the US Federal Government is recommending that a Zero Trust security model be considered for all critical networks. As part of this major push to promote ZT adoption, DISA, NIST and NSA are releasing specific guidelines. NSA for example, notes that Zero Trust principles should be implemented in most aspects of a network and its operations ecosystems to become fully effective, while DISA highlights the need to rethink how we utilize existing infrastructure to implement security by design in a simpler and more efficient way while enabling unimpeded operations. Join this discussion to learn what is Zero Trust, what it is not, and how to apply it practically.


Moderator:

Ismael Valenzuela, SANS Instructor

Panelists:

Juliana Vida, GVP, Chief Strategy Advisor - Public Sector, Splunk

Lisa Lorenzin, Director of Transformation Strategy, Zscaler

Martyn Crew, Director, Solutions Marketing, Gigamon

11:25 - 11:55 AM ET

Malware & Ransomware Attacks

Jake Williams, SANS Instructor

11:55 AM - 12:35 PM ET

Endpoint Panel

Endpoints represent perhaps the widest and most diverse footprint that any organization can have. Encompassing old and new technologies, endpoints present multiple challenges as they cannot simply be secured with the “push of a button.” Join us for this expert panel discussion where we look at modern endpoint detection and response technologies, and how they assist organizations in defending against attacks – today and tomorrow.

Moderator: Matt Bromiley, SANS Instructor

Panelists: Coming Soon

12:35 - 12:45 PM ET

Break

12:45 - 1:15 PM ET

Degree Programs for Federal Employees

This summit presentation provides an overview of the SANS Technology Institute (SANS.edu), an accredited college offering career-focused graduate and undergraduate programs at the cutting edge of cybersecurity. At this event, you’ll learn about the curriculum, faculty, and flexible structure of the SANS.edu programs, as well as the admissions process and options Federal employees may pursue to cover the cost of tuition. Join us to learn how previously completed SANS courses and GIAC certifications may be applied to undergraduate and graduate programs at SANS.edu.

Kim Kafka, SANS Technology Institute

1:15 - 1:45 PM ET

Congratulations! You're a supervisor!

It's a common scenario: We need to hire or backfill a team lead or supervisor so we reach into the team, tap the team's top contributor, and "promote" them. Unfortunately, we sometimes forget that the skills that make a top contributor aren't usually the same skills that make a good supervisor. If we don't give our newly minted supervisors the skills and knowledge they need to succeed, then it's our fault if they fail - not theirs. This session will cover key differences between individual contributor and supervisory roles, common issues faced by unprepared supervisors, and how we can help our newly minted supervisors flourish.

Greg Scheidel, IronVine & SANS CMS

1:45 - 2:25 PM ET

Identity & Access Management Panel

Identify is much more than a simple username and password. Now and in the future, to better secure our customers and organizations, we will have to improve in how we identify our users. Data breaches are in the national media every week, how can better stop this from happening?

Moderator:

Chris Dale, SANS Instructor

Panelists:

Sean Frazier, Federal CSO, Okta

Wade Ellery, VP of Solutions Architects, Radiant Logic

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic Centrify

2:25 - 2:30 PM ET

Wrap-Up

Matt Bromiley, SANS Instructor