Defending Against Supply Chain Attacks


This event qualifies for 1 CPEs


When faced with the increasingly frequent and damaging cyberattacks, it may feel like our current network perimeter defense is still relying on a ‘castle and moat’ like strategy. And this approach can in fact be an invitation for lateral movement of malware.

 

For proper cyber defense, we need to know more than just WHO can access the network from an identity management perspective. It is imperative to lock down the entire application attack vector. When malicious packets penetrate the network, they should not be able to access the organization’s high value assets (HVAs) – the applications and data deemed most critical. This scenario calls for a Zero Trust application-based security model that denies ALL, and only allows what is necessary.

 

This can be accomplished through host-based micro-segmentation – a methodology that establishes small and effective allowlists that indicate which applications and workloads can talk to each other. In a breach situation when malware tries to move laterally in an unauthorized manner, host-based micro-segmentation will effectively shut down all connections automatically, thus containing the breach to the original machine(s) affected.

 

Join the webinar to learn more about how micro-segmentation can reduce the network attack surface, improve breach containment and strengthen regulatory compliance. How can and why should Federal agencies shift to a Zero Trust security strategy? How can micro-segmentation help defend against advanced cyberthreats at a granular level? Hear about ways to overcome challenges in implementing better security strategies.

Speaker and Presenter Information

Brennan Grignon

Brennan Grignon

Supply Chain Risk Management, U.S. Department of Defense

Hemant Baidwan

Hemant Baidwan

Deputy Chief Information Security Officer (Acting), U.S. Department of Homeland Security

 
Roy Fernando

CyberSecOps, Information Security Division, U.S. Small Business Administration

Col. Gerard Acosta

Col. Gerard Acosta

Chief, Director's Initiative Group, Defense Logistics Agency

 
Dr. Chase Cunningham

Dr. Chase Cunningham

Cybesecurity Expert, Author, former Forrester Principal Analyst – Zero Trust Wave

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Census Bureau, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, USAID, State & Local Government, National Guard Association, EEOC, Federal Government, FDA, Foreign Governments/Agencies, NSA, FCC


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Tue, Mar 30, 2021, 1:30pm - 2:30pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
ATARC


Contact Event Organizer


Join the event conversation:
@ATARC


Return to search results