Program





Increased complexity – in our infrastructure and software – and increasingly sophisticated attacks from adversaries necessitate a new approach to cybersecurity. Zero Trust is an approach that recognizes a new “perimeter” exists by combining identity, data, workloads, and applications that emphasizes context, not network segment, to authorize access to systems that house critical data. Get […]

Now in its final phases, attend this session to learn where agencies stand with their CDM progress to date and how the program has evolved under DEFEND. Get the inside track on how agencies are working through the DEFEND structure, while meeting the CDM functional requirements and desired “Future State”. From defending the agency boundary, […]



From AI to IoT, blockchain, and more, next-gen solutions are powering innovation and transformation across the government. But with new technology comes new risks – increasing the threat surface with new entry points and opportunities for malicious attacks. As agencies work to meet the mandates of recent modernization initiatives, attend this session to discuss how […]



You’ve heard it before – “trust but verify.” While once the standard across government, agencies are now considering a zero-trust approach to security. With an increasingly hyper-connected and remote Federal workforce, the risks continue to magnify – and the bad guys are working harder than ever to breach security protocols. Attend this session to get […]



As the Federal enterprise continues to evolve, its devices, applications, and users are moving beyond the zone of control. Today, the traditional perimeter no longer exists – there is no “inside” or “outside” when it comes to detecting, deterring, and defending against advancing cyber threats. Powering smart decisions in real time, analytics at the edge […]



Get the inside track from Akamai’s Global Director of Security Strategy Patrick Sullivan on why traditional perimeter defenses are failing as the threat landscape evolves and the cloud continues to redefine the zone of control. Learn how the three primary Zero Trust architectures can power your agency’s cyber transformation to better detect, deter, and defend […]


