Overview

April 26

Watch Now

Deploying the latest in cloud technology enables state and local governments to streamline operations, embrace automation and reserve time for critical tasks. As cloud adoption has become more popular, cyber criminals have adapted, pushing agencies to strengthen their security posture with a zero trust approach.

This strategy requires all users within or outside of the network to be authenticated and verified before gaining access to additional information and applications. Approaches that continuously ask for users to prove their identity can be especially helpful to thwart attacks from other countries. Though a zero trust foundation might involve multiple layers of authentication, it can be an efficient tool to amplify security.

Taking actionable steps to enhance security shouldn’t be an overwhelming drain on resources or time. Government Technology and SADA are partnering to bring practical advice for improving cloud security during a live webcast April 26 at 10 a.m. Pacific/1 p.m. Eastern.

Participants will hear from experts from Google Cloud and SADA on:

   -- The latest advancements in hacking efforts
   -- Best practices to utilizing a zero trust approach
   -- Improving protection for cloud environments
   -- Identifying possible gaps in security and addressing them

Sign up now to learn more about mitigating risks in today’s threat environment.

Speakers

Alexandre Popp headshot

Alexandre Popp

Channel Account Manager, Google Cloud Security

Alex is a security specialist at Google Cloud, supporting customers and partners in building out their cloud security infrastructure. Previously, Alex helped build out Google Cloud's partner program in Europe before returning home to the Bay Area where he guided startups seeking to architect their SaaS offerings on GCP and take advantage of the available co-sell programs. Before joining Google, he led partnerships and alliances at a few different startups, notably Xamarin, the developer tools company acquired by Microsoft. In his free time, Alex has his hands full with his one year old daughter and is an avid swimmer.

John Giglio headshot

John Giglio

Manager, Cloud Security at SADA

As a former US Marine, John has secured systems in every clime and place and worked with security teams in nearly every industry. John built the security program for what is the now the largest background check provider in the US handling millions of PII records. John has done everything from administrative to technical, policy, procedure and risk management to racking, powering on and operating day to day security tools. John believes that Offense informs defense, he knows how to think like the bad guy in order to help the good guy.

Deborah A. Snyder headshot

Deborah A. Snyder — Moderator

Senior Fellow, Center for Digital Government

Deborah is accomplished C-level influencer, with a broad range of experience in government, policy, cyber security, privacy and information technology. An experienced and highly-respected thought-leader who has held executive roles for over two decades. She recently retired from her position as New York State’s Chief Information Security Officer (CISO), after over 35 years of public service. In that role, as part of New York State's information technology transformation and consolidation initiative, she helped redesign how the state protects its data. As State CISO, she directed the State’s comprehensive cyber security governance, risk management and compliance program, providing strategic leadership and vision, and assuring business-aligned, risk-based investments that maximized business opportunity and minimized cyber security risk. She also directed the NYS Cyber Command Center, hotline, procedures for reporting and response to cyber-threats, and digital forensics. https://www.govtech.com/blogs/lohrmann-on-cybersecurity/an-inside-look-at-new-york-state-government-cybersecurity.html She holds multiple industry certifications including Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), SANS Strategic Planning, Policy, and Leadership (GSTRT) Global Information Assurance Certification, and Project Management Institute certified Project Management Professional (PMP).