CyberThreats 2025 - State & Local Requirements for Cyber Resilience - Day Two


This event qualifies for .2 CEUs

This event qualifies for 2 CPEs

This event qualifies for 2 CLPs


State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place.

 

Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing driver’s licenses to approving building permits. It also helps these governments comply with various privacy and security regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), which protects sensitive health information from being disclosed without the patient’s consent.

 

Learning Objectives:

  • Delineate the elements of identity, how they change by location, task and group
  • Evaluate the concept of micro-segmentation and how it can be applied as a cybersecurity measure
  • Define the connections between automation and orchestration in cybersecurity and how they assist in analytics

Speaker and Presenter Information

Hosted By:

Claudia Hosky, Publisher, FedInsider

Claudia Hosky
Publisher,
FedInsider

 

John Breeden II, Moderator & Contributing Editor, FedInsider

John Breeden II
Contributing Editor,
FedInsider

 

Opening Remarks:

Ken Klestinec

Regional Sales Manager

Akamai Technologies 

 

Session One: Beyond Zero Trust- Embracing Least Permissive Trust                 

The premise of zero trust architectures is based on the maxim “never trust, always verify.” This can be difficult when working with siloed legacy systems, where communication links are tenuous because of proprietary technology or don’t exist because they were never connected to each other. Additionally, ZT is identity-based, but users often have multiple “identities” depending on their physical location, their day-to-day work, groups they may belong to, etc. Incorporating the concept of “least permissive trust” takes identity-based access one step further.

 

Bernice Bond

CISO,

NCDIT

 

Jason Turse

Principal Enterprise Architect, 

Public Sector, 

Akamai Technologies 

 

Session Two: The Building Blocks of Least Privilege Trust: ICAM and Micro-segmentation                          
The role of Micro-segmentation – dividing networks into smaller segments that can be isolated, often at the individual workload level – mitigates threats from users that legitimately have access to one part of a system but should not be able to move laterally to other parts of that system.  Identity Credentials Access Management (ICAM), compliments micro-segmentation, ensuring that access and permission is specifically in line with the persona attached to them. Both network solutions embody the tenants of Least Permissive Trust. building flexible, responsive controls that can block unexpected or inappropriate movements within a network. 

 

 Cesar Gamez, Information Security Administrator, City of Roseville CA

Cesar Gamez
Information Security Administrator,
City of Roseville CA

 

CyberThreats 2024: Douglas Holland, Senior Solutions Engineer, Akamai

Douglas Holland
Senior Solutions Engineer,
Akamai Technologies

 

Session Three: Applying Analytics to Least Privilege
Maximizing the value of identity verification and network micro-segmentation requires visibility across not just identity and networks, but devices, applications, workloads, and data. With that visibility comes the opportunity for analytics, to create a unified cybersecurity picture. Automation and orchestration can streamline security operations and improve governance by applying relevant regulations and reporting requirements.

 

Micah Maryn

Senior Solutions Engineer,

Government Solutions, 

Akamai Technologies

 

Closing Remarks:

Rob San Martin

Vice President,

Akamai Publoc Sector 

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC


Register as Attendee


Add to Calendar


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, May 29, 2025, 1:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
FedInsider


Contact Event Organizer



Return to search results