ATARC's Mission Critical Identity Security Virtual Summit

This event qualifies for 2.5 CPEs

Hear from topic experts as they explore how the Federal Identity-Centric Security Roadmap fits in with the advancement of Zero Trust Security. What does the concept of never trust, always verify mean? What are some best practices for verifying users in your network? What challenges have these topic experts experienced as they incorporate Zero Trust within their Federal Identity-Centric Security Roadmap? What solutions have these topic experts come up with?


Tune into this panel as security experts to discuss how PAM controls can help minimize your agency’s attack surface and cyber risk, while also empowering agency program requirements such as ICAM and Secure Data Sharing. What best practices do these topic experts have for using PAM to build Zero Trust Architecture? What does this look like?


Don't miss the opportunity to hear from topic experts on how to build an effective zero trust approach with an emphasis on identity and privileged access management. How does identity and privileged access management align with and enable Zero Trust? How does Zero Trust help agencies achieve ICAM Cybersecurity goals?

Speaker and Presenter Information

Gerald J. Caron III

Chief Information Officer (CIO), Assistant Inspector General for Information Technology (AIG/IT), Office of the Inspector General (OIG), Department of Health and Human Services (HHS)

Ken Myers

Chief Federal ICAM Architect, General Services Administration

Sean Connelly

TIC Program Manager and Senior Cybersecurity Architect, Cybersecurity Division, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Ida Mix

Chief Information Security Officer, Bureau of Industry and Security, U.S. Department of Commerce

Trafenia Salzman

Security Architect, U.S. Small Business Administration

Sanjay Gupta

Chief Technology Officer, Office of the Chief Information Officer, Office of the Administrator, United States Small Business Administration

Robert Wood

Chief Information Security Officer and Director, Information Security and Privacy Group, Centers for Medicare and Medicaid Services, United States Department of Health and Human Services

Carole House

Director for Cybersecurity and Secure Digital Innovation for the White House National Security Council

Grant Dasher

Office of the Technical Director for Cyber at the Cybersecurity and Infrastructure Security Agency

Jeffery Shilling

Chief Information Officer (Acting), Center for Biomedical Informatics and Information Technology, National Institutes of Health, United States Department of Health and Human Services

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC

Event Type

This event has no exhibitor/sponsor opportunities

Tue, Feb 1, 2022, 10:00am - 12:15pm ET

Complimentary:    $ 0.00

Free Webinar

Click here to visit event website


Contact Event Organizer

Join the event conversation:

Return to search results