CyberThreats 2025 - Beyond Zero Trust - Building Federal Cyber Resilience - Day One

The federal government has invested almost four years to move all its systems and networks to a least permissive access architecture, based on the concept of “never trust, always verify.” This has significantly improved cybersecurity, but it’s a moving target – bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate.

 

To constantly improve an agency’s risk profile, security professionals must pay attention to trends both in cyber attacks and in new defensive measures. For instance, hackers are using AI to help their social engineering efforts, ferreting out and stealing legitimate login credentials.

 

Learning Objectives:

  • Review the five pillars of trust and which pillars are the hardest to address with legacy or siloed systems
  • Apply the concept of “least privilege” to your agency’s implementation of a least permissive architecture to determine feasibility
  • Outline the range of analytics that can be used to understand your agency’s entire cybersecurity environment and response profile

Speaker Details

Hosted By:

Claudia Hosky, Publisher, FedInsider

Claudia Hosky
Publisher,
FedInsider

 

John Breeden II, Moderator & Contributing Editor, FedInsider

John Breeden II
Contributing Editor,
FedInsider

 

Opening Remarks:

Sean McDonald, North American Public Sector Sales Director, Akamai Technologies

Sean McDonald
North American Public Sector
Sales Director, Akamai Technologies

 

Fireside Chat:

James Crocker, Chief Technology Officer, Business & Enterprise Systems Product Innovation (BESPIN), U.S. Air Force

James "Guideaux" Crocker
Original Creator of DOD Software Facrtories

 

Mike Colson, Director of Public Sector Growth, Akamai Technologies

Mike Colson
Director of Public Sector Growth,
Akamai Technologies

 

Session One: Rethinking Least Permissive Architectures
The federal push to implement zero trust architectures across all agencies is built on five pillars - identity, devices, networks, applications and workloads, and data. These work well, but do not address one of the government's ongoing issues: the existence of technology silos, where - whether because of outdated, legacy systems or capture by proprietary tech - that make achieving least permissive much more difficult. This is where the concept of least privilege comes in.

 

Larry Fuller, Senior Scientific Technical Manager for Cybersecurity, Naval Information Warfare Center (NIWC)

Larry Fuller
Sr. Scientific Technical Manager, Cybersecurity,
Naval Information Warfare Center (NIWC)

 

Mike Colson, Director of Public Sector Growth, Akamai Technologies

Mike Colson
Director of Public Sector Growth,
Akamai Technologies

 

Session Two: Identity, Access & Micro-segmentation
Identity is central to zero trust, but it also can be a fluid concept; users can be identified by their job titles, the tasks they're assigned, the work groups - both within and across disciplines - they contribute to, to name a few examples. A user might require access to a particular application in one role, for instance, but have no need for access when working in another of their roles. Utilizing micro-segmentation - dividing networks into smaller segments that can be isolated, often at the individual workload level - can mitigate threats from users that legitimately have access to one part of a system but should not be able to move laterally to other parts of that system.

 

Dave Zukowski, Principal Technical Consultant, Akamai

Dave Zukowski
Director, Defense Solutions,
Public Sector, Akamai Technologies

 

Session Three: Building Cross-Pillar Capabilities
Integrating security across the five pillars means ensuring visibility across all of them, and analytical tools that can take the information to present a unified picture. To accomplish that requires both automation - to ensure that cybersecurity is consistent and up to date - and orchestration that ensures all the pillars are attended to in a timely manner. These measures also apply to governance, such as the application of required regulations and reporting.

 

David Bottom, Chief Information Officer, Securities & Exchange Commission

David Bottom
Chief Information Officer,
Securities & Exchange Commission

 

Brian Dennis

Principal Technologist, 

Public Sector,

Akamai Technologies

 

Closing Thoughts:

Rob San Martin,

Vice President, 

Akamai Public Sector

Event Topic

Artificial Intelligence, Cybersecurity, Zero Trust

Relevant Audiences

All State and Local Government, All Federal Government, National Guard, Air Force, Coast Guard, Navy, City Government, County Government, Municipalities, State Government, Central Intelligence Agency, Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Housing and Urban Development, Department of Interior, Department of Justice, Department of Labor, Department of State, Department of Transportation, Department of the Treasury, Environmental Protection Agency, Equal Employment Opportunity Commission, Federal Aviation Administration, Federal Communications Commission, Food and Drug Administration, Federal Emergency Management Agency, General Services Administration, Government Accountability Office, National Aeronautics and Space Administration, National Institute of Health, National Security Agency, U.S. Agency of International Development, U.S. Census Bureau, U.S. Office of Personnel Management, U.S. Postal Service, Veterans Affairs

Other Agency

Office of the President (includes OMB), Other Federal Agencies, Judicial Branch Agencies, Foreign Governments/Agencies
CyberThreats 2025 - Beyond Zero Trust - Building Federal Cyber Resilience - Day One
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Wed, May 28, 2025 | 1:00 pm - 3:00 pm ET
Registration Cost
Complimentary
Website
Click here to view event website
Sponsors
Carahsoft Technology Corp.