cmscyberworks.fbcevent.com Open in urlscan Pro
52.2.211.100  Public Scan

Submitted URL: https://u17067067.ct.sendgrid.net/ls/click?upn=7a2TDU2EV6QWVbqoSA21TyYeBW0CKd7ygYeKtLHDnd3pDZchiyQpzOixF4LG2bQgvmRBgTdV3L-2B5hEn88...
Effective URL: https://cmscyberworks.fbcevent.com/agenda
Submission: On September 21 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This is what your event will look like after going live
 * No notifications yet.



 * Edit Profile
 * Settings
 * Invite Friends
 * Leave Community
 * Sign Out

Toggle navigation CMS Cyberworks
 * Event Home
 * Registration
 * Agenda
 * Exhibits
 * Sponsors
 * Event Program
 * Contest
 * Networking
 * FAQ/Help

 *  * No notifications yet.
   
   
   
    * Edit Profile
    * Settings
    * Invite Friends
    * Leave Community
    * Sign Out


HELLO ALEX!


JOIN OUR EVENT COMMUNITY

Welcome to the CMS CyberWorks networking community. This is the place where
conference participants can send messages to other attendees. 

You must be a registered participant in order to participate in this community,
but it does use a separate profile from your conference registration. You can
also use your linked in profile.

Don't be afraid to join as you can leave this networking community at any time!

Be sure to update your profile setting to set your notification preferences.

Join The Community
Not Alex?

view session


22 Sessions
Time
General Session


Logout

All Sessions (22)
(22)

My Interests


My Registered Sessions


Wed Jul 20
8:00 AM
8:00 AM - 8:30 AM EDT
12:00 PM - 12:30 PM Your local time
(30 min)
Achieving Autonomic Security Operations | Beyond Automated Threat Defense -
Google

Watch Recording

Security Operations transformations are not simply about replacing old SOC
technologies with cloud-native ones. Organizations are looking to drive the
complete transformation of their threat management function by inventing new
ways to accomplish proactive and value-driven security operations; from
reimagining the way their Security Operations personnel interact with
technologies & collaborators, aligning to a scalable workflow to manage modern
threats, and leveraging powerful cloud-native technologies to augment their
personnel. If businesses can scale and enter new markets while proactively
managing the risk that adversaries may pose to their organization, Security
Operations can effectively become an Autonomic component of the business.

Visit the Google Cloud Virtual Booth

Read More
Iman Ghanizada
Global Head of Autonomic Security Operations
Google
Speaker
Adam Sommers
Senior Principal CVTA
Google Cloud
Speaker
Presented By:

8:00 AM - 8:38 AM EDT
12:00 PM - 12:38 PM Your local time
(38 min)
Data Privacy in a Zero Trust World - Forcepoint

Watch Recording

Zero Trust is of growing importance in Federal Cybersecurity and a common
definition a lot of people associate with Zero Trust is “never trust, always
verify.” But trust is important. In fact, according to Stephen Covey, who wrote
The 7 Habit of Highly Effective People “Trust is the glue of life. It’s the most
essential ingredient in effective communication. It’s the foundational principle
that holds all relationships.” In other words, trust is important in our
personal and work lives. As we redefine security architectures there is a
fundamental need to balance trust in federal employees and protecting and
ensuring citizen trust with security. In this new Zero Trust world, we must
carefully build cyber systems that help identify risky users and prevent
damaging actions, the data we analyze comes for the most part from monitoring a
user’s activities. User activity monitoring must be done appropriately, and with
people’s privacy and the app

Visit the Forcepoint Virtual Booth

Read More
Michael Crouse
Director for Enterprise User and Data Protection
Forcepoint
Speaker
Abby Potter
Enterprise Account Executive, HHS
Forcepoint
Speaker
Presented By:

8:30 AM
8:30 AM - 8:45 AM EDT / 12:30 PM - 12:45 PM Your local time   (15 min)
Securing Your Cloud Environment with Datadog Cloud SIEM - Datadog

Watch Recording

As public sector organizations expand their digital footprint, they must be
vigilant in their pursuit of delivering secure and reliable citizen services.
Join this session to learn how Datadog Cloud SIEM helps you secure your cloud
environment with real-time threat detection and investigation support. With this
product, your security, compliance, and DevOps teams can collaborate within a
single security and observability platform. With Datadog Cloud SIEM, you can
collect and correlate all your critical security data in a single pane of glass
and go from detection, to triage, to full investigation quickly and confidently.

Visit the Datadog Virtual Booth

Partha Naidu
Product Manager, Cloud Security Platform
Datadog
Presented By:

8:45 AM
8:45 AM - 9:00 AM EDT / 12:45 PM - 1:00 PM Your local time   (15 min)
Zero Trust 101 - Tantus Technologies

Watch Recording

Executive Order 14028 requires federal civilian agencies to establish plans to
drive the adoption of Zero Trust Architecture. But what is Zero Trust and what
does it mean to be fully compliant? This session will explore what Zero Trust
really means and its potential implications for customer experience in health
care settings.

Visit the Tantus Virtual Booth

Karlene Stecchi
EVP
Tantus Technologies, Inc.
Speaker
Presented By:

9:00 AM
9:00 AM - 9:45 AM EDT / 1:00 PM - 1:45 PM Your local time   (45 min)
Welcome and Keynote

Watch Recording

Welcome:  Frank Domizio, Deputy CISO

Keynote: Robert Wood, CISO

Mr. Frank Domizio
Deputy Chief Information Security Officer
CMS
Mr. Robert Wood
CISO and Director of the Information Security and Privacy Group
CMS
9:45 AM
9:45 AM - 10:05 AM EDT
1:45 PM - 2:05 PM Your local time
(20 min)
Break l Visit Virtual Tech Show


Visit the virtual exhibits to learn more about the companies that made today's
event possible,

Read More


9:45 AM - 10:00 AM EDT
1:45 PM - 2:00 PM Your local time
(15 min)
Empowering the Cybersecurity Workforce with Human-Centered Design - Peraton

Watch Recording

Cybersecurity is a fast-paced field with new tools and approaches introduced
frequently. Keeping up with this change, and using modernize technology, tools
and approaches effectively, is a challenge for the cybersecurity and IT
workforce. Human-Centered Design (HCD) can help address this challenge. This
presentation will discuss Peraton's approach to using HCD to improve
cybersecurity effectiveness in areas including cyber threat analysis and zero
trust implementation.

Visit the Peraton Virtual Booth

Read More
Lonnie Price
Vice President, Cyber & Information Warfare
Peraton
Presented By:

9:45 AM - 10:05 AM EDT
1:45 PM - 2:05 PM Your local time
(20 min)
Headline Event Response: How Security Teams Prepare and Respond - Snowflake

Watch Recording

When a massive vulnerability or breach like Log4shell or SolarWinds hits the
headlines, incident response teams often find themselves "all hands on deck".
Organizations must act quickly to determine whether or not the issue has
impacted their environment. However, responding to cyber event headlines can be
tricky. Product security teams who are not always involved in incident response
on a day-to-day basis may be unprepared to perform many of the necessary tasks
that are second nature to incident response teams. 

Tune into this webinar to learn how incident response and product security teams
should work together to achieve fast resolution and avoid burnout with the help
of a security data lake.

Visit the Snowflake Virtual Booth

Read More
Omer Singer
Head of Cybersecurity Strategy
Snowflake
Speaker
Presented By:

10:05 AM
10:05 AM - 10:50 AM EDT
2:05 PM - 2:50 PM Your local time
(45 min)
Chaos Engineering

Watch Recording

Omar Marrero

Read More

10:05 AM - 10:50 AM EDT
2:05 PM - 2:50 PM Your local time
(45 min)
Threat Modeling

Watch Recording

In this talk, we will introduce attendees to Threat Modeling as part of a new
initiative of the CMS Application Security Program (CASP). By definition, Threat
Modeling is way to analyzing representations of a system to highlight concerns
about security and privacy characteristics. By engaging in Threat Modeling, ADOs
can think about secure design and address potential threats with effective
mitigations and solutions. We will review the Threat Modeling Process as well as
provide resources to help you get started. Finally, we will also talk about
Mission Enablement and how you can get involved in the many pilots currently
underway.

Presented By: Robert Hurlbut/ Douglas Nock

Read More

10:50 AM
10:50 AM - 11:10 AM EDT
2:50 PM - 3:10 PM Your local time
(20 min)
Break l Visit Virtual Tech Show


Visit the virtual exhibits and see how many emoji riddles you can solve.

Read More


10:50 AM - 11:11 AM EDT
2:50 PM - 3:11 PM Your local time
(21 min)
Automated Decision Support at Scale for Fraud, Waste, and Abuse - Red Hat

Watch Recording

The Centers for Medicare & Medicaid Services (CMS) handles 4 million
fee-for-service claims per day, and 99.7% of those claims are processed without
medical review. This low review rate originates with the difficulty of scaling
CMS systems to meet the magnitude of 1 billion annual claims. However, CMS sees
a 5-to-1 return on investment when comparing cost to recoveries. Private
commercial payers are able to review claims 15 times the rate Medicare achieves,
due in some part to reduced scale, but commercial payers also use techniques
such as prior authorization and AI/ML automation. In addition, detection of
overuse patterns and other improprieties can be done in real-time rather than
post-pay review. Please join us as we explore the techniques and technologies
that could automate the decision support systems necessary to meet the scaled
demand of CMS medical review now and into the future.

Read More
Ben Cushing
Chief Architect, Federal Health and Life Sciences
Red Hat
Speaker
Presented By::

11:10 AM
11:10 AM - 11:40 AM EDT
3:10 PM - 3:40 PM Your local time
(30 min)
AI

Watch Recording

John Rudolph

Read More

11:10 AM - 11:40 AM EDT
3:10 PM - 3:40 PM Your local time
(30 min)
The CMS OIT Security Datalake

Watch Recording

We will talk about what the project is about, and the opportunities it aims to
fulfill. We will also cover our approach to its design and its ability to scale
over time. Finally, we will share how the OIT Security Datalake ties to the
grander landscape of a broad and deep Enterprise such as CMS, at agile
velocities, on cyber security risk management.




Read More
Amine Raounak
CMS Cloud Chief Architect
R&D
11:40 AM
11:40 AM - 12:00 PM EDT
3:40 PM - 4:00 PM Your local time
(20 min)
Break l Visit Virtual Tech Show


Visit the virtual exhibits and see how these vendors can help CMS achieve their
mission.

Read More


11:40 AM - 12:00 PM EDT
3:40 PM - 4:00 PM Your local time
(20 min)
Keeping Healthcare Systems Healthy: Tips to Stop Ransomware in its Tracks -
Akamai Technologies

Watch Recording

America’s healthcare systems are under constant threat from ransomware attacks.
In the 3rd Quarter of 2021, ransomware attacks shut down a healthcare center
every single day. This session will take a dive into emerging technology that
can allow any healthcare system to respond to and remediate a ransomware attack
with little to no downtime.

Visit the Akamai Technologies Virtual Booth

Read More
Mr. Brian Dennis
Principal Technologist for the Public Sector
Akamai Technologies
Speaker
Presented By:

12:00 PM
12:00 PM - 12:30 PM EDT
4:00 PM - 4:30 PM Your local time
(30 min)
A Zero Trust Odyssey

Watch Recording

The Zero Trust Security model is all the rage, with good reason -- implemented
well it increases resilience to a breach.  As CMS continues to implement changes
needed to fulfill the 2021 Executive Order on Cybersecurity 14028 and the OMB
Memo on the Federal Zero Trust Strategy, M-22-09, we need to create some plans
for this journey so we don't get lost sailing in this sea of change.

Zero Trust has many elements, and we have been focusing on how to apply some of
those elements to one environment at CMS, the AWS environment run by CMSCloud.
 Using the CISA Zero Trust Maturity Model as our north star, we navigate the 5
Pillars of Identity, Devices, Networks, Applications, and Data to plot a route
that works for all the ships sailing towards increased Zero Trust maturity.  The
CMS Zero Trust Maturity Framework will survey the many paths taken so far and
recommend routes with the fewest obstacles.

 This talk explains how we created the CMS Zero Trust Maturity Model, where we
are now, and what the future plans are.







Presented By: Elizabeth Schweinsberg and Katy Craig

Read More
Elizabeth Schweinsberg
Security Engineer
CMS
Speaker
Katy Craig
Security Architect
Speaker
Josh Jholz
Captioner
National Captioning
Moderator

12:00 PM - 12:30 PM EDT
4:00 PM - 4:30 PM Your local time
(30 min)
Anomoly

Broadcast has ended

Recording will be ready soon

Presented By: Joseph Tritico

Read More

12:00 PM - 12:30 PM EDT
4:00 PM - 4:30 PM Your local time
(30 min)
CMS CyberVets

Watch Recording

In 2018 the Center for Medicare and Medicaid Services (CMS) created and piloted
an immersive one-year training program to prepare transitioning or transitioned
veterans to move into the federal cybersecurity workforce with great success.
However, there were also many lessons learned resulting in a redesign and
evolution to a talent development model shortening the training time, aligning
it with two NICE Framework roles, and registering as a DoD Skillbridge program.
It is now finishing its third year including the pilot, with the 10th cohort
after the redesign expected to graduate in February 2021. This session discusses
the program model/design, challenges and successes as it has moved beyond the
pilot into its second full year as an operational program and preparing the
next.




Presented By: Aaron Burnett and Shane Gallagher

Read More
Dr. Patrick Gallagher
CyberVets PM
Cybergenic Systems, LLC
12:30 PM
12:30 PM - 12:50 PM EDT / 4:30 PM - 4:50 PM Your local time   (20 min)
Break l Visit Virtual Tech Show


Visit the virtual exhibits


12:50 PM
12:50 PM - 1:15 PM EDT / 4:50 PM - 5:15 PM Your local time   (25 min)
Closing Remarks

Broadcast has ended

Presented By: Frank Domizio and Robert Wood

Mr. Frank Domizio
Deputy Chief Information Security Officer
CMS
Mr. Robert Wood
CISO and Director of the Information Security and Privacy Group
CMS
1:15 PM
1:15 PM - 1:45 PM EDT / 5:15 PM - 5:45 PM Your local time   (30 min)
Ghost in the Machine: Monitoring DevSecOps at Scale with Elastic

Watch Recording
 * Topic: Things move fast within the ephemeral machine-driven world of
   DevSecOps: the velocity and fleeting nature of the systems makes it hard to
   capture logs and metrics and analyze the events that indicate trouble, which
   means it’s all the more important to automate the monitoring and analysis of
   the platform as well as the containers and workloads deployed there. There is
   also a huge amount of untapped value in being able to analyze large amounts
   of historical data in near real-time as opposed to hours or days.
 * Content: This presentation will provide an overview of the Elastic Stack and
   how it can be integrated into every portion of the DevSecOps continuum to
   provide full visibility into activity at all levels. We will showcase some of
   the Elastic Stack’s built-in analysis and automation capabilities that can
   dramatically reduce the mean time to detection and resolution for any use
   case that requires high-speed access to data. We will also show how the
   search-based technology of Elastic can make exponentially more data available
   for long-tail investigative and trends analysis while still being
   cost-effective.  
 * Objectives and Outcomes: Attendees will have an understanding of the
   components and general capabilities of the Elastic Stack, and how they can be
   brought to bear to empower speed and security in the world of DevSecOps. 

Visit the Elastic Virtual Booth

Woody Walton
Principal Solutions Architect, U.S. Federal at Elastic
Elastic
Speaker
Presented By:


Add to calendar: Google iCal Outlook Yahoo

Looking for your ticket? Contact the organizer
Add to calendar: Google iCal Outlook Yahoo
Looking for your ticket? Contact the organizer

Copyright © 2022 Federal Business Council, Inc.