Digital transformation remains a top priority in the public sector, where global and technology trends continue to drive unprecedented change. As public sector organizations tap into AI, cloud computing, IoT and infrastructure modernization to accelerate their missions, questions remain:
- How can organizations enable cyber resilience without hindering the mission?
- How can cyber leaders remain compliant with new government mandates while amplifying cyber efforts?
- What does the AI-driven threat landscape look like today, and what does it mean for organizations with large and complex networks?
- How can organizations design and implement effective defenses against advanced cyber threats despite resource constraints?
Register now for Public Sector Ignite 2024, where we will bring together cybersecurity decision makers, influencers and practitioners to explore the answers to these questions and so much more.
This unique one-day event features thought-leadership keynotes, technical deep-dives and networking opportunities to help you enable tomorrow’s cybersecurity, today.
Topics include:
- Zero Trust and network security
- Threat intelligence and security operations
- Cloud security
The scale, sophistication and speed of today’s threats are startling; just about every version would surprise most organizations. Compounding the problem: attackers are just getting started with AI. How can organizations protect themselves without hindering their mission?
In this session, Palo Alto Networks Chief Product Officer Lee Klarich will unpack exactly what this new threat landscape demands: an AI-backed high-powered innovation engine and a unique type of platform approach.
Main Theater
Moderated by: George Jackson, GovExec
Dr. Garfield Jones, Associate Chief, Strategic Technology, CISA
Phil Jones, Executive Security Advisor, AWS
Mr. Glenn Parham, Lead, Task Force Lima, Defense Digital Services (DDS), CDAO, DoD
Meerah Rajavel, SVP, CIO, Palo Alto Networks
In challenging the prevailing misconceptions surrounding AI, it is important to recognize that its essence transcends the mere replacement or elimination of humans. Instead, AI functions as a transformative force, reshaping the intricate landscape of work, skills, and the unfolding of human potential. This shift, however, is not without its complexities. The uncharted territory of AI lacks a predefined roadmap, thrusting a critical responsibility upon IT leaders to navigate this evolving landscape. As organizations prepare to embark on this transformative journey, a central question emerges: How can we ensure that the adoption of AI paves the way for a future where technology enhances human capabilities?
In this conversation, public sector leaders will delve into the art of the possible with AI. They will discuss current use cases, sharing best practices and lessons learned in their transformation journey. They will also shed light on where Generative AI is making a significant impact, transforming how the government fulfills its mission and ultimately creating better outcomes at scale.
Main Theater
Moderated by: Anna PettyJohn, GovExec
Drew Epperson, Vice President Federal Engineering, Palo Alto Networks
Chi Kang, Deputy Director for Operations, Cyber Security Division, NOAA
As the public sector workforce balances a hybrid work setting, prioritizing trustworthiness and bolstering the resilience of mobile infrastructure becomes paramount. As such, IT leaders are actively seeking ways to integrate frameworks into their tech stacks, aiming for comprehensive control over mobile operations. This encompasses overseeing identities, managing software permissions, monitoring company apps, and implementing remote management tailored to specific needs. The pivotal question that emerges is: where should leaders focus their efforts to enhance the resilience of their mobile workforce?
In this session, leaders from various sectors within the public domain will explore cutting-edge technologies designed to elevate the security of a mobile workforce. The discussion will span secure communication devices, networks, and IoT solutions, providing insights into the continuous advancements in this critical domain.
Main Theater
Eric Trexler, SVP, Public Sector, Palo Alto Networks
Meerah Rajavel, SVP, CIO, Palo Alto Networks
As the public sector workforce balances a hybrid work setting, prioritizing trustworthiness and bolstering the resilience of mobile infrastructure becomes paramount. As such, IT leaders are actively seeking ways to integrate frameworks into their tech stacks, aiming for comprehensive control over mobile operations. This encompasses overseeing identities, managing software permissions, monitoring company apps and implementing remote management tailored to specific needs. The pivotal question that emerges is: where should leaders focus their efforts to enhance the resilience of their mobile workforce?
In this fireside chat, the discussion will span secure communication devices, networks and IoT solutions, providing insights into the continuous advancements in this critical domain with Palo Alto Networks Chief Information Officer.
Main Theater
Matt House, CDM Program Manager, CISA
Deontray Jones, Director, Systems Engineering, Palo Alto Networks
The Continuous Diagnostics and Mitigation (CDM) program has been instrumental in fortifying cybersecurity defenses within the federal government, thwarting significant cyberattacks, and bolstering overall resilience. Its recent accolades include praise for its swift response to cyber incidents like the MOVEit mass exploit earlier this year, which affected both on-premise and cloud-based versions of a widely-used file transfer service across federal agencies. However, with the ever-evolving nature of cyber threats, there is a pressing need for the CDM program to adapt and expand its scope to effectively address emerging challenges. With the inclusion of over $400 million in the Biden administration's fiscal 2024 budget request for the CDM program, the question arises: what's next for the program, and how can it evolve to bolster proactive cyber defense operations?
In this session, we will delve into the dynamic evolution of the CDM program, charting its trajectory as it aligns with the Cybersecurity and Infrastructure Security Agency (CISA) in supporting the Federal Civilian Executive Branches (FCEB) in ongoing Zero Trust initiatives. Additionally, we will explore strategies for extending existing CDM capabilities to the cloud, implementing a comprehensive approach to Zero Trust, and delivering services across government entities. Furthermore, we will discuss the significance of extending CDM to the cloud and implementing a Cloud-Native Application Protection Platform (CNAPP) across FCEB. This transformative shift marks a transition from the program's traditional focus on endpoint and network security to a broader perspective that addresses mobile, cloud, and microservices hosted by public cloud providers
Moderated by: Frank Konkel, GovExec
Philip Kwan, Director, Product Management, Palo Alto Networks
Neal Ziring, Technical Director, Cybersecurity Directorate, NSA
The United States is hurtling toward a quantum computing future, raising questions about the effectiveness of extensive investments and cybersecurity preparations. But, in May 2023, President Biden signed a national security memo mandating federal agencies to conduct a thorough inventory of encryption use cases within their systems. This directive responds to the longstanding concern among experts that quantum computing could jeopardize the unassailable encryption standards protecting most online data, leaving crucial systems vulnerable, from online payments to classified government secrets. So, how is the nation gearing up to defend against this quantum future? This panel conversation will conviene industry experts to explore the current uses, future prospects, and potential legislative mandates of quantum computing within government agencies.They will delve into the practical applications of quantum computing in government, the challenges and opportunities it presents, and how it might shape future problem-solving.
Jeff Yeutter, Systems Engineering Manager - Federal Cortex Specialists, Palo Alto Networks
Mark Rogers, Federal Cortex Systems Engineering Specialist
Learn how organizations are transforming their SOCs with an automation-first foundation using Cortex XSIAM. Learn how to leverage machine learning and automation within a simplified infrastructure to intelligently stitch disparate data into a coherent storyline. Free your talented human analysts to focus on the proactive (and interesting) work while automating FTEs for routine and operationalized tasks.
Moderated by: Anna PettyJohn, GovExec
Kevin Finch, Senior Director | Global Security Practice at Iron Bow Technologies
Wayne LeRiche, Field CTO, Palo Alto Networks
Colonel Mike Smith, Director, Army Unified Network Task Force (UNTF)
Director, Army Functional Management Office Zero Trust
Cherilyn Pascoe, Director, National Cybersecurity Center of Excellence
Dr. Mark Stanley, Enterprise Cybersecurity Architect & Lead, NASA
Confronted by the complexities of automation, modernization, and the transition to hybrid work environments, cyber leaders are actively pursuing proactive measures to mitigate risks. A pivotal strategy in this complex landscape involves the adoption of cutting-edge zero trust security solutions. However, despite the ongoing strategic guidance available, IT and cyber leaders continue to grapple with persistent challenges presented by dynamic threats, the rapid emergence of new technologies, and an intensely competitive labor market. During this session, leaders will explore best practices meticulously crafted to enhance cybersecurity postures within the public sector. Delving into the implementation of zero trust, they will elaborate on how this approach has played a crucial role in securing their networks and data. The discussion will spotlight the strategic steps taken to meet Zero Trust requirements, providing insights into their journey and outlining their trajectory for 2024.
Explore the intricacies of unified cloud security in this technical session on Prisma Cloud. Uncover the power of a cohesive approach, seamlessly integrating security across multi-cloud environments. Gain insights into comprehensive threat prevention, compliance management, and the unification of diverse security controls for robust cloud security.
The incorporation of the FedRAMP Authorization Act into the FY23 National Defense Authorization Act represents a significant stride in fortifying America's cloud-first mission. This groundbreaking legislation not only fosters innovation but also enhances the security of federal entities transitioning to the cloud. Moreover, it introduces roles aimed at alleviating bottlenecks and streamlining the process for agencies to procure FedRAMP providers. Consequently, the FedRAMP team has witnessed a remarkable surge in program adoption, evident through increased agency participation and the widespread reuse of authorizations. In this session, FedRAMP leaders will delve into the program's expansion, shedding light on ongoing efforts to modernize through advancements in automation and refined business processes. The discussion will feature insights from key figures in both the public and private sectors, showcasing innovative solutions, sharing best practices, and envisioning the future trajectory of the Federal cloud marketplace.
Join renowned cybersecurity journalist and author, Nicole Perlroth, as she explores the evolving threats to public sector cybersecurity. Drawing from her extensive experience in reporting on cyber warfare and digital espionage, Perlroth will unveil invaluable insights into the evolving threats that confront government organizations today. From sophisticated ransomware attacks to nation-state hacking campaigns, she will provide strategic guidance on how public sector entities can fortify their cybersecurity posture, mitigate risks, and bolster resilience against emerging threats.
This year’s Public Sector Ignite will take place at the Capital One Hall in Tysons, Virginia, on April 2, 2024. Public Sector Ignite 2024 is free to attend.
Capital One Hall
7750 Capital One Tower Rd
Tysons, VA 22102
Premium Parking for all Capital One Hall Events is located in the Hotel/Event Garage (1625 Capital One Drive North, Tysons, VA 22102). This parking facility is attached to Capital One Hall and offers exclusive entry access directly from the Hotel/Event Garage. Please mention to the parking attendant that you are attending Public Sector Ignite to have your parking fees waived.
Log in to your registration account using the credentials that you created during registration. For any other questions, please contact publicsectorignite@paloaltonetworks.com
If you have any additional questions, please email the Palo Alto Networks Public Sector Ignite ’24 event team at publicsectorignite@paloaltonetworks.com.
Breakfast and lunch will be provided to all attendees. Hors d'oeuvres will be served at the networking reception. If you have dietary restrictions, please note this during your registration or reach out to publicsectorignite@paloaltonetworks.com.
Attendees from the public sector (defined as employees of the US federal government, state and local government and education employees) should consult their internal compliance requirements and obtain approval from the appropriate ethics or compliance official prior to accepting an invitation to any event offering gratuitous items such as meals and other business courtesies. If you have any questions about this event, you may reach out to publicsectorignite@paloaltonetworks.com.
Can attendees accrue Continuing Professional Education (CPE) credits during Public Sector Ignite 2024?
Yes, attendees will be able to earn CPE credits during Public Sector Ignite 2024. Attendees will have to sign in and out of the CPE sheet at the registration desk on site on April 2. To receive a CPE certificate, please reach out to the Palo Alto Networks Public Sector Ignite 2024 event team at publicsectorignite@paloaltonetworks.com.
GovExec is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org.
After completing this course, you will be able to: understand how organizations enable cyber resilience without hindering the mission, understand what the AI-driven threat landscape look like today and understand how organizations design and implement effective defenses against advanced cyber threats despite resource constraints,
To register for this session, enter your information here. If you would like to indicate interest in receiving CPE credit, please contact Beka after the event at btroutman@govexec.com. In order to receive full credit as an in-person attendee you must attend for at least 50 minutes and sign in and out at the registration desk on-site on April 2nd.
Participants will earn up to 6 CPE credits in Information Technology. Participants will earn 1 CPE credit for each 50 minutes of participation.
Field of Study: Information Technology
Additional Information Prerequisites: None
Who Should Attend: All cybersecurity professionals, including: CIOs/CISOs, VPs of IT, Network engineers/architects, SOC engineers, DevOps and cloud architects, IT directors/managers, and anyone else who is interested in learning about the future of cybersecurity in the public sector.
Advanced Preparation: None
Program Level: Basic
Delivery Method: Group Live
Refunds, Complaints and Cancellations: This program is free for all attendees. information regarding administrative policies such as complaints or program cancellations please contact the Palo Alto Networks Public Sector Ignite 2024 event team at publicsectorignite@paloaltonetworks.com.
Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.
Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.
Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.
Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.