cmscyberworks.fbcevent.com
Open in
urlscan Pro
52.2.211.100
Public Scan
Submitted URL: https://u17067067.ct.sendgrid.net/ls/click?upn=7a2TDU2EV6QWVbqoSA21TyYeBW0CKd7ygYeKtLHDnd3pDZchiyQpzOixF4LG2bQgvmRBgTdV3L-2B5hEn88...
Effective URL: https://cmscyberworks.fbcevent.com/agenda
Submission: On September 21 via manual from US — Scanned from DE
Effective URL: https://cmscyberworks.fbcevent.com/agenda
Submission: On September 21 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
This is what your event will look like after going live * No notifications yet. * Edit Profile * Settings * Invite Friends * Leave Community * Sign Out Toggle navigation CMS Cyberworks * Event Home * Registration * Agenda * Exhibits * Sponsors * Event Program * Contest * Networking * FAQ/Help * * No notifications yet. * Edit Profile * Settings * Invite Friends * Leave Community * Sign Out HELLO ALEX! JOIN OUR EVENT COMMUNITY Welcome to the CMS CyberWorks networking community. This is the place where conference participants can send messages to other attendees. You must be a registered participant in order to participate in this community, but it does use a separate profile from your conference registration. You can also use your linked in profile. Don't be afraid to join as you can leave this networking community at any time! Be sure to update your profile setting to set your notification preferences. Join The Community Not Alex? view session 22 Sessions Time General Session Logout All Sessions (22) (22) My Interests My Registered Sessions Wed Jul 20 8:00 AM 8:00 AM - 8:30 AM EDT 12:00 PM - 12:30 PM Your local time (30 min) Achieving Autonomic Security Operations | Beyond Automated Threat Defense - Google Watch Recording Security Operations transformations are not simply about replacing old SOC technologies with cloud-native ones. Organizations are looking to drive the complete transformation of their threat management function by inventing new ways to accomplish proactive and value-driven security operations; from reimagining the way their Security Operations personnel interact with technologies & collaborators, aligning to a scalable workflow to manage modern threats, and leveraging powerful cloud-native technologies to augment their personnel. If businesses can scale and enter new markets while proactively managing the risk that adversaries may pose to their organization, Security Operations can effectively become an Autonomic component of the business. Visit the Google Cloud Virtual Booth Read More Iman Ghanizada Global Head of Autonomic Security Operations Google Speaker Adam Sommers Senior Principal CVTA Google Cloud Speaker Presented By: 8:00 AM - 8:38 AM EDT 12:00 PM - 12:38 PM Your local time (38 min) Data Privacy in a Zero Trust World - Forcepoint Watch Recording Zero Trust is of growing importance in Federal Cybersecurity and a common definition a lot of people associate with Zero Trust is “never trust, always verify.” But trust is important. In fact, according to Stephen Covey, who wrote The 7 Habit of Highly Effective People “Trust is the glue of life. It’s the most essential ingredient in effective communication. It’s the foundational principle that holds all relationships.” In other words, trust is important in our personal and work lives. As we redefine security architectures there is a fundamental need to balance trust in federal employees and protecting and ensuring citizen trust with security. In this new Zero Trust world, we must carefully build cyber systems that help identify risky users and prevent damaging actions, the data we analyze comes for the most part from monitoring a user’s activities. User activity monitoring must be done appropriately, and with people’s privacy and the app Visit the Forcepoint Virtual Booth Read More Michael Crouse Director for Enterprise User and Data Protection Forcepoint Speaker Abby Potter Enterprise Account Executive, HHS Forcepoint Speaker Presented By: 8:30 AM 8:30 AM - 8:45 AM EDT / 12:30 PM - 12:45 PM Your local time (15 min) Securing Your Cloud Environment with Datadog Cloud SIEM - Datadog Watch Recording As public sector organizations expand their digital footprint, they must be vigilant in their pursuit of delivering secure and reliable citizen services. Join this session to learn how Datadog Cloud SIEM helps you secure your cloud environment with real-time threat detection and investigation support. With this product, your security, compliance, and DevOps teams can collaborate within a single security and observability platform. With Datadog Cloud SIEM, you can collect and correlate all your critical security data in a single pane of glass and go from detection, to triage, to full investigation quickly and confidently. Visit the Datadog Virtual Booth Partha Naidu Product Manager, Cloud Security Platform Datadog Presented By: 8:45 AM 8:45 AM - 9:00 AM EDT / 12:45 PM - 1:00 PM Your local time (15 min) Zero Trust 101 - Tantus Technologies Watch Recording Executive Order 14028 requires federal civilian agencies to establish plans to drive the adoption of Zero Trust Architecture. But what is Zero Trust and what does it mean to be fully compliant? This session will explore what Zero Trust really means and its potential implications for customer experience in health care settings. Visit the Tantus Virtual Booth Karlene Stecchi EVP Tantus Technologies, Inc. Speaker Presented By: 9:00 AM 9:00 AM - 9:45 AM EDT / 1:00 PM - 1:45 PM Your local time (45 min) Welcome and Keynote Watch Recording Welcome: Frank Domizio, Deputy CISO Keynote: Robert Wood, CISO Mr. Frank Domizio Deputy Chief Information Security Officer CMS Mr. Robert Wood CISO and Director of the Information Security and Privacy Group CMS 9:45 AM 9:45 AM - 10:05 AM EDT 1:45 PM - 2:05 PM Your local time (20 min) Break l Visit Virtual Tech Show Visit the virtual exhibits to learn more about the companies that made today's event possible, Read More 9:45 AM - 10:00 AM EDT 1:45 PM - 2:00 PM Your local time (15 min) Empowering the Cybersecurity Workforce with Human-Centered Design - Peraton Watch Recording Cybersecurity is a fast-paced field with new tools and approaches introduced frequently. Keeping up with this change, and using modernize technology, tools and approaches effectively, is a challenge for the cybersecurity and IT workforce. Human-Centered Design (HCD) can help address this challenge. This presentation will discuss Peraton's approach to using HCD to improve cybersecurity effectiveness in areas including cyber threat analysis and zero trust implementation. Visit the Peraton Virtual Booth Read More Lonnie Price Vice President, Cyber & Information Warfare Peraton Presented By: 9:45 AM - 10:05 AM EDT 1:45 PM - 2:05 PM Your local time (20 min) Headline Event Response: How Security Teams Prepare and Respond - Snowflake Watch Recording When a massive vulnerability or breach like Log4shell or SolarWinds hits the headlines, incident response teams often find themselves "all hands on deck". Organizations must act quickly to determine whether or not the issue has impacted their environment. However, responding to cyber event headlines can be tricky. Product security teams who are not always involved in incident response on a day-to-day basis may be unprepared to perform many of the necessary tasks that are second nature to incident response teams. Tune into this webinar to learn how incident response and product security teams should work together to achieve fast resolution and avoid burnout with the help of a security data lake. Visit the Snowflake Virtual Booth Read More Omer Singer Head of Cybersecurity Strategy Snowflake Speaker Presented By: 10:05 AM 10:05 AM - 10:50 AM EDT 2:05 PM - 2:50 PM Your local time (45 min) Chaos Engineering Watch Recording Omar Marrero Read More 10:05 AM - 10:50 AM EDT 2:05 PM - 2:50 PM Your local time (45 min) Threat Modeling Watch Recording In this talk, we will introduce attendees to Threat Modeling as part of a new initiative of the CMS Application Security Program (CASP). By definition, Threat Modeling is way to analyzing representations of a system to highlight concerns about security and privacy characteristics. By engaging in Threat Modeling, ADOs can think about secure design and address potential threats with effective mitigations and solutions. We will review the Threat Modeling Process as well as provide resources to help you get started. Finally, we will also talk about Mission Enablement and how you can get involved in the many pilots currently underway. Presented By: Robert Hurlbut/ Douglas Nock Read More 10:50 AM 10:50 AM - 11:10 AM EDT 2:50 PM - 3:10 PM Your local time (20 min) Break l Visit Virtual Tech Show Visit the virtual exhibits and see how many emoji riddles you can solve. Read More 10:50 AM - 11:11 AM EDT 2:50 PM - 3:11 PM Your local time (21 min) Automated Decision Support at Scale for Fraud, Waste, and Abuse - Red Hat Watch Recording The Centers for Medicare & Medicaid Services (CMS) handles 4 million fee-for-service claims per day, and 99.7% of those claims are processed without medical review. This low review rate originates with the difficulty of scaling CMS systems to meet the magnitude of 1 billion annual claims. However, CMS sees a 5-to-1 return on investment when comparing cost to recoveries. Private commercial payers are able to review claims 15 times the rate Medicare achieves, due in some part to reduced scale, but commercial payers also use techniques such as prior authorization and AI/ML automation. In addition, detection of overuse patterns and other improprieties can be done in real-time rather than post-pay review. Please join us as we explore the techniques and technologies that could automate the decision support systems necessary to meet the scaled demand of CMS medical review now and into the future. Read More Ben Cushing Chief Architect, Federal Health and Life Sciences Red Hat Speaker Presented By:: 11:10 AM 11:10 AM - 11:40 AM EDT 3:10 PM - 3:40 PM Your local time (30 min) AI Watch Recording John Rudolph Read More 11:10 AM - 11:40 AM EDT 3:10 PM - 3:40 PM Your local time (30 min) The CMS OIT Security Datalake Watch Recording We will talk about what the project is about, and the opportunities it aims to fulfill. We will also cover our approach to its design and its ability to scale over time. Finally, we will share how the OIT Security Datalake ties to the grander landscape of a broad and deep Enterprise such as CMS, at agile velocities, on cyber security risk management. Read More Amine Raounak CMS Cloud Chief Architect R&D 11:40 AM 11:40 AM - 12:00 PM EDT 3:40 PM - 4:00 PM Your local time (20 min) Break l Visit Virtual Tech Show Visit the virtual exhibits and see how these vendors can help CMS achieve their mission. Read More 11:40 AM - 12:00 PM EDT 3:40 PM - 4:00 PM Your local time (20 min) Keeping Healthcare Systems Healthy: Tips to Stop Ransomware in its Tracks - Akamai Technologies Watch Recording America’s healthcare systems are under constant threat from ransomware attacks. In the 3rd Quarter of 2021, ransomware attacks shut down a healthcare center every single day. This session will take a dive into emerging technology that can allow any healthcare system to respond to and remediate a ransomware attack with little to no downtime. Visit the Akamai Technologies Virtual Booth Read More Mr. Brian Dennis Principal Technologist for the Public Sector Akamai Technologies Speaker Presented By: 12:00 PM 12:00 PM - 12:30 PM EDT 4:00 PM - 4:30 PM Your local time (30 min) A Zero Trust Odyssey Watch Recording The Zero Trust Security model is all the rage, with good reason -- implemented well it increases resilience to a breach. As CMS continues to implement changes needed to fulfill the 2021 Executive Order on Cybersecurity 14028 and the OMB Memo on the Federal Zero Trust Strategy, M-22-09, we need to create some plans for this journey so we don't get lost sailing in this sea of change. Zero Trust has many elements, and we have been focusing on how to apply some of those elements to one environment at CMS, the AWS environment run by CMSCloud. Using the CISA Zero Trust Maturity Model as our north star, we navigate the 5 Pillars of Identity, Devices, Networks, Applications, and Data to plot a route that works for all the ships sailing towards increased Zero Trust maturity. The CMS Zero Trust Maturity Framework will survey the many paths taken so far and recommend routes with the fewest obstacles. This talk explains how we created the CMS Zero Trust Maturity Model, where we are now, and what the future plans are. Presented By: Elizabeth Schweinsberg and Katy Craig Read More Elizabeth Schweinsberg Security Engineer CMS Speaker Katy Craig Security Architect Speaker Josh Jholz Captioner National Captioning Moderator 12:00 PM - 12:30 PM EDT 4:00 PM - 4:30 PM Your local time (30 min) Anomoly Broadcast has ended Recording will be ready soon Presented By: Joseph Tritico Read More 12:00 PM - 12:30 PM EDT 4:00 PM - 4:30 PM Your local time (30 min) CMS CyberVets Watch Recording In 2018 the Center for Medicare and Medicaid Services (CMS) created and piloted an immersive one-year training program to prepare transitioning or transitioned veterans to move into the federal cybersecurity workforce with great success. However, there were also many lessons learned resulting in a redesign and evolution to a talent development model shortening the training time, aligning it with two NICE Framework roles, and registering as a DoD Skillbridge program. It is now finishing its third year including the pilot, with the 10th cohort after the redesign expected to graduate in February 2021. This session discusses the program model/design, challenges and successes as it has moved beyond the pilot into its second full year as an operational program and preparing the next. Presented By: Aaron Burnett and Shane Gallagher Read More Dr. Patrick Gallagher CyberVets PM Cybergenic Systems, LLC 12:30 PM 12:30 PM - 12:50 PM EDT / 4:30 PM - 4:50 PM Your local time (20 min) Break l Visit Virtual Tech Show Visit the virtual exhibits 12:50 PM 12:50 PM - 1:15 PM EDT / 4:50 PM - 5:15 PM Your local time (25 min) Closing Remarks Broadcast has ended Presented By: Frank Domizio and Robert Wood Mr. Frank Domizio Deputy Chief Information Security Officer CMS Mr. Robert Wood CISO and Director of the Information Security and Privacy Group CMS 1:15 PM 1:15 PM - 1:45 PM EDT / 5:15 PM - 5:45 PM Your local time (30 min) Ghost in the Machine: Monitoring DevSecOps at Scale with Elastic Watch Recording * Topic: Things move fast within the ephemeral machine-driven world of DevSecOps: the velocity and fleeting nature of the systems makes it hard to capture logs and metrics and analyze the events that indicate trouble, which means it’s all the more important to automate the monitoring and analysis of the platform as well as the containers and workloads deployed there. There is also a huge amount of untapped value in being able to analyze large amounts of historical data in near real-time as opposed to hours or days. * Content: This presentation will provide an overview of the Elastic Stack and how it can be integrated into every portion of the DevSecOps continuum to provide full visibility into activity at all levels. We will showcase some of the Elastic Stack’s built-in analysis and automation capabilities that can dramatically reduce the mean time to detection and resolution for any use case that requires high-speed access to data. We will also show how the search-based technology of Elastic can make exponentially more data available for long-tail investigative and trends analysis while still being cost-effective. * Objectives and Outcomes: Attendees will have an understanding of the components and general capabilities of the Elastic Stack, and how they can be brought to bear to empower speed and security in the world of DevSecOps. Visit the Elastic Virtual Booth Woody Walton Principal Solutions Architect, U.S. Federal at Elastic Elastic Speaker Presented By: Add to calendar: Google iCal Outlook Yahoo Looking for your ticket? Contact the organizer Add to calendar: Google iCal Outlook Yahoo Looking for your ticket? Contact the organizer Copyright © 2022 Federal Business Council, Inc.