May 19

Watch Now

The seismic shift to remote work in state and local government has dissolved the traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk.

On May 19 at 11am PT/2pm ET, Government Technology is being joined by BeyondTrust and SailPoint to discuss how to build an effective zero trust approach with an emphasis on identity and privileged access management. Register now for this hour-long webinar to learn:

- What zero trust is and how it helps agencies achieve cybersecurity goals
- Roadblocks to zero trust, like legacy architectures, and how to overcome them
- How identity and privileged access management aligns with and enables zero trust
- The funding available for cybersecurity initiatives in 2021


Brian A. Engle

Brian A. Engle

Chief Operations Officer & Chief Information Security Officer, CyberDefenses, and Former CISO, State of Texas

Brian Engle is the VP of Cybersecurity Services and Operations & Chief Information Security Officer for CyberDefenses. Brian leads the security operations, advisory consulting and program management teams that provide services to the dynamic and diverse client base.

Prior to joining CyberDefenses, Brian’s roles included the Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), now the Retail and Hospitality Information Sharing and Analysis Center, CISO and Cybersecurity Coordinator for the State of Texas, CISO for Texas Health and Human Services Commission, CISO for Temple-Inland, Manager of Information Security Assurance for Guaranty Bank, and Senior Information Security Analyst for Silicon Laboratories.

Brian has been a professional within Information Security and Information Technology for over 25 years, is a member and leader in numerous industry groups and associations, and holds the CISSP certification.

Morey J. Haber

Morey J. Haber

Chief Technology Officer, Chief Information Security Officer, BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three Apress books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Frank Briguglio

Frank Briguglio

Global Public Sector Strategist, SailPoint

Frank Briguglio is a recognized thought leader and authority in Identity Governance, Administration (IGA), and Authentication & Access Controls. Throughout his career he has been involved in the design and implementation of identity-centric technologies and the development of identity standards. He has supported the Federal Identity, Credential and Access Management Subcommittee (FICAM) as a Subject Matter Expert and was involved in the development of the FICAM Roadmap; the Federal and DoD Public Key Infrastructure (PKI) and Federated Identity Standards adopted by FICAM E-Authentication program.

Frank has over 20 years’ experience supporting Federal Civilian, Department of Defense, and the Intelligence community. He has worked for industry leaders in the Security, Identity and Access Management space at Oracle, Microsoft, Netscape, Sun Microsystems and Deloitte and is currently the Public Sector Identity Governance Strategist at SailPoint.

Prior to his career in Enterprise Security and Identity Management he served in the United States Navy as a Cryptologist.

Dan Lohrmann

Dan Lohrmann — Moderator

Senior Fellow, Center for Digital Government

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including as enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO). During his distinguished career, he has served both the public and private sectors in a variety of executive leadership capacities including advising senior leaders at the White House, National Governors Association (NGA) and the U.S. Department of Homeland Security (DHS). Throughout his career he has received numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.