This webinar is offered free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through the SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with the sponsor(s).
Event Agenda | 10:00am - 4:15pm ET
Timeline (EDT) | Session Details |
---|---|
10:00AM | Welcome & Opening Remarks Speakers: |
10:15AM | Session One | 2024 Zero Trust Top Threats Speakers: |
10:45AM | Session Two | Advancing Zero Trust Maturity in Hybrid Environments in 2024 Panel In this roundtable we will explore the practical application of Zero Trust principles, focusing on how government agencies can enhance their cybersecurity posture. This session will provide a thorough discussion on methods to reduce attack surfaces and strengthen defenses using Zero Trust aligned initiatives. Participants will learn from case studies and established strategies to apply these principles effectively within their agencies, aiming to protect critical infrastructure from evolving cyber threats. SANS Moderator: Panelists: |
11:30AM | Session Three | Everyone is a Target: Steps to Achieve State and Local Compliance In the past 4 years a multitude of regulations have appeared to enforce cybersecurity through compliance. This session will examine the federal, state, and local cybersecurity policies. How to find the policies, how to comply, and how to support the security of your business.Speaker: |
12:00 PM | Break |
12:15 PM | Session Four | Authorization and Identity Management Discussion Protecting your user identities is no longer a maybe, it's now a must. Adversaries are constantly targeting user accounts, looking for easy entry vectors to gain trust and compromise an organization. Join us for this panel discussion on Authorization and Identity Management, featuring industry experts who will delve into strategies and technologies for securing access control and identity verification. Looking to recent federal government initiatives as inspiration, attendees will gain critical insights into how evolving cyber threats are forcing us to level up identity management and protection. SANS Moderator: |
1:00PM | Session Five | Coming Soon! The Cybersecurity Maturity Model Certification (CMMC) - Do You Know Where to Start? Are you working for an organization that delivers products or services to the Department of Defense (DoD), or to their primary contractors, or are you just interested in learning more about new career opportunities, then this is the session for you! Speaker: |
1:30PM | Session Six | Supply Chain Security Panel Many of the most damaging cybersecurity incidents today involve a supply chain partner. Software supply chains in particular have gotten more complex, and that complexity increases the likelihood of vulnerabilities. As government agencies have improved local security controls, attackers have often found the supply chain to be the most vulnerable point of entry. SANS Moderator: Panelists: |
2:15PM | Break |
2:30PM | Session Seven | Harnessing AI for Advanced Threat Detection Panel SANS Moderator: Panelists: |
3:15PM | Keynote: Session Eight | Use of AI in Cyber Defense Panel SANS Moderator Panelists: |
4:00PM | Closing Remarks Speaker: |