11:00 – 11:05 a.m.
Welcome
Vu T. Nguyen, Acting U.S. Department of Justice Chief Information Security Officer (CISO)
11:05 – 11:10 a.m.
National Anthem
Dorothy Fleming Williams, Accessibility Specialist
11:10 – 11:15 a.m.
Opening Remarks
Melinda Rogers, Deputy Assistant Attorney General (DAAG) and U.S. Department of Justice Chief Information Officer (CIO)
11:15 – 11:45 a.m.
The State of Cybersecurity at the U.S. Department of Justice
Chris Inglis, National Cyber Director, Executive Office of the President
Lisa O. Monaco, Deputy Attorney General (DAG), U.S. Department of Justice
Learn about the current condition of cybersecurity at DOJ and the policies and programs dedicated to ensuring cybersecurity is robust and resilient, as well as DOJ’s role in helping other federal agencies mitigate the nation's most pressing cybersecurity challenges.
11:45 – 11:50 a.m.
Break
11:50 a.m. – 12:15 p.m.
Enabling a Hybrid Workplace with Zero Trust Security
Jay Chaudry, Chief Executive Officer, Zscaler
Review how national and international events during the last year changed the way cyber criminals attack public and private organizations. Discover the insight from trillions of signals across government and industry that offer visibility into emerging threat actors and threat vectors. Hear about best practices across public and private sectors and how a zero trust architecture eliminates the attack surface, blocks threats, and speeds adoption of hybrid workstyles while accelerating mission outcomes.
Against the backdrop of the new threats, employees are regularly in and out of offices and need secure access to critical applications and data from everywhere. Following the Executive Order on Improving the Nation’s Cybersecurity (E.O. 14028 of May 12, 2021), now is a critical time to prioritize the transformation to zero trust security.
12:15 – 12:20 p.m.
Break
12:20 – 12:50 p.m.
Newtonian Physics in Cyber, Kind of
Ryan Kovar, Distinguished Security Strategist and Leader, SURGe by Splunk
Zero trust, IPv6, and the new world of infrastructure sometimes complicates knowing where to push and when to pull. Join the discussion on how to defend the new world of remote work and what detections to make, as well as how to help ransomware defense strategy and understand new insights about supply chain attacks.
12:50 – 1:20 p.m.
Lunch
1:20 – 1:50 p.m.
Amazon’s Zero Trust Journey – Insights and Lesson Learned
Quint Van Deman, Principal, Office of the Chief Information Security Officer (CISO), Amazon Web Services Security, Amazon Web Services
Discover the journeys in zero trust that Amazon began before zero trust became widely recognized. Today, these enhanced security models, tools, and mechanisms enable thousands of Amazon employees to perform remote work, and power the technology that underpins both Amazon.com and Amazon Web Services (AWS). Hear insights and lessons learned that have been gained from these experiences, presented in ways that can be used to inform and accelerate the journey towards zero trust for other organizations.
1:50 – 1:55 p.m.
Break
1:55 – 2:25 p.m.
Why Identity is at the Heart of Zero Trust Security
Todd McKinnon, Chief Executive Officer (CEO), Okta
Kevin Yasuda, Acting U.S. Department of Justice Deputy Chief Information Security Officer (DCISO)
Discover how ICAM is critical to zero trust by identifying users and authenticating access throughout a network.
2:25 – 2:30 p.m.
Break
2:30 – 3:20 p.m.
DOJ Executive Leadership Panel: What Keeps You Awake at Night?
Listen to the most pressing concerns CIOs face as they maintain the balance between keeping critical assets and data safe, while empowering users to be productive for delivering mission success.
Panelists:
Roger Beasley, Assistant Director and Chief Information Officer, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)
Gwendolyn Miller, Chief Information Officer (Acting), United States Marshals Service (USMS)
Jonathan C. Moffa, Chief Information Officer, Federal Bureau of Investigation (FBI)
Nickolous Ward, Chief Information Officer, Drug Enforcement Administration (DEA)
Moderator:
Melinda Rogers, U.S. Department of Justice CIO
3:20 – 3:25 p.m.
Break
3:25 – 3:55 p.m.
IT Modernization is the Key to Effective Cybersecurity
Phil Venables, Chief Information Security Officer (CISO), Google Cloud
Outdated technology remains a significant challenge for those defending the nation’s critical systems and infrastructure. Making big investments in cybersecurity tooling without upgrading the wider technology environment is like building on a foundation of sand. Modernizing a technology environment should result in a more inherently defensible platform where security is built-in, not bolted-on. This includes adopting a modern security architecture based on principles of zero trust for user access as well as production applications. Modern technology systems and practices create the ability to make frequent security updates and changes safely, a critical part of cyber-defense for both the federal government and the private sector. Learn how government agencies can accelerate their IT modernization by investing in modern public cloud environments that are designed with built-in security protections.
3:55 – 4:00 p.m.
Break
4:00 – 4:30 p.m.
2021 in Review – A Slow Year in Cybersecurity
Jeff Greene, Chief for Cyber Response and Policy in the National Security Council’s Cyber Directorate, The White House
Develop an understanding of how cybersecurity plays an essential role in the National Security Council (NSC), the President’s principal forum for considering national security and foreign policy decision-making, and how emerging cybersecurity technologies are utilized in the response and the policies that meet the challenges of the current threat landscape.
4:30 – 4:35 p.m.
Break
4:35 – 5:05 p.m.
The Threat Landscape
Adam Meyers, Senior Vice President of Intelligence, CrowdStrike
Understand the comprehensive scope of cybersecurity threats, including potential threats as well as identified threats that span criminal, state-sponsored, and nationalist cyber adversary groups across the globe, and how actionable intelligence is leveraged in robust cybersecurity protection.
5:05 – 5:15 p.m.
Closing Remarks
Vu T. Nguyen, Acting U.S. Department of Justice CISO