Zero Trust Implementations & Lessons Learned

All event times are U.S. Eastern time
Nov 15 2023
1:00 pm - 3:00 pm
Virtual Workshop
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed, time-consuming, and agency wide process. This virtual workshop will focus on the ‘how to’ and Zero Trust lessons learned to date.



Welcome and Opening Remarks


Mike Smoyer, President, Digital Government Institute


Zero Trust: History, Challenges & Requirements

West Coile

West Coile
Assistant Director, Center for Enhanced Cybersecurity, GAO

West Coile

West Coile serves as Assistant Director of the Center for Enhanced Cybersecurity at the United States Government Accountability Office (GAO), and has over 20 years of audit experience, with an emphasis on reviews of many complex and highly interconnected computer control environments both inside and outside of government. He has led and executed a wide variety of computer security reviews to evaluate the adequacy of information systems general and application controls. 


Two Recent Breaches: An Identity Security Perspective

Gram Slingbaum

Gram Slingbaum
Federal Solutions Engineer, CyberArk

With OMB, CISA and DOD providing strategies and directives on improving the nation’s cybersecurity through principles such as Zero Trust, we’d like to offer guidance on where agencies cyber priorities should lie. In this session CyberArk will share:

  • How to meet Zero Trust and the Executive Order 14028 objectives and goals
  • Enforce least privilege for your privilege users, at the workstation, or server
  • How to act as a decision policy point for your operations tool sets
  • Secure the software supply chain by protecting applications and non-person entities
  • Reduce the attack vector with secure Multi-factor Authentication (MFA) and credential repository


Frictionless Zero Trust Security

Deborah Blyth

Deborah Blyth
Executive Strategist, Industry Business Unit, CrowdStrike and former CISO, State of Colorado  

Deborah Blyth

Deborah Blyth, Executive Strategist, is part of the Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for all industry verticals including Government, Education and Healthcare.

Prior to joining CrowdStrike, Deborah Blyth spent 7 years as Colorado’s Chief Information Security Officer (CISO). During her tenure she was successful at doubling the cybersecurity budget, recovering from a large-scale ransomware attack, and measurably reducing risk across the state. Deborah has over 25 years technology background and 15 years leading information security programs. Before joining the state of Colorado, Deborah led the Information Technology Security and Compliance programs at TTEC (5 years) and Travelport (3 years). Deborah is a Colorado native, and graduated Summa cum Laude with a Bachelor of Science degree from Regis University.


Fireside Chat – Zero Trust Roadmap and Lessons Learned

Mark Stanley

Dr. Mark Stanley
Enterprise Cybersecurity Architect, NASA, Langley


Closing Comments

  • CPE CREDITS: 2.0

In order to receive CPE credit, attendees must fulfill all of these requirements:

  • Attend the entire program
  • Respond to all poll questions
  • Complete and submit the post-event survey


Organizer Name


TD SYNNEX | Crowdstrike
TD SYNNEX | Crowdstrike

Registration for FISMA Training Closes Monday, September 11, 2023