Government Cybersecurity Showcase Federal
Registration & Networking
7:50 AM - 8:50 AM (60 mins)
Welcome from PSN
8:50 AM - 9:00 AM (10 mins)
Opening from the Chair
9:00 AM - 9:10 AM (10 mins)
Decentralizing Cyber Defense: Empowering State and Local Governments
9:10 AM - 9:30 AM (20 mins)
The federal government is reshaping cybersecurity by transferring more responsibilities to state and local levels. This session explores the vision behind the National Resilience Strategy and how decentralized systems can fortify national security.
- Understand the objectives and impact of the National Resilience Strategy and National Risk Register.
- Explore the new role of state and local governments in threat detection and incident response.
- Discuss federal support mechanisms to help decentralized entities build cyber resilience.
- Identify best practices for creating agile, locally adapted cybersecurity frameworks.
Optimizing Zero Trust Through Automation in a Decentralized Framework
9:30 AM - 9:50 AM (20 mins)
Automation is critical to implementing Zero Trust architectures across a fragmented, decentralized cybersecurity environment. This session highlights strategies to maintain strong security controls while streamlining operations for distributed teams.
- Explore how automation enhances identity verification and access control in decentralized environments.
- Discuss orchestration tools for consistent enforcement of Zero Trust policies across multiple jurisdictions.
- Identify key metrics for measuring Zero Trust maturity when cybersecurity is locally driven.
- Address the challenges of scaling Zero Trust with minimal federal regulatory intervention.
Beyond Borders: Securing Federal Supply Chains Against Nation-State Threats
9:50 AM - 10:20 AM (30 mins)
Attacks like SolarWinds, and DOGE-era data aggregation, have elevated supply chain risks. This panel will explore how federal agencies are ensuring supply chain resilience through vetting, monitoring, and collaboration.
- Supply chain threat intelligence sharing and real-time monitoring
- CISA and NSA frameworks for software bill of materials (SBOMs)
- Public-private roles in securing hardware, cloud, and data contracts
- Vetting third-party vendors in decentralized procurement environments
Morning Break
10:20 AM - 10:40 AM (20 mins)
Welcome Back from Chair
10:40 AM - 10:50 AM (10 mins)
AI Governance and Privacy: Navigating Cybersecurity in the Age of Deregulation
10:50 AM - 11:10 AM (20 mins)

As AI innovation surges and federal regulations are recalibrated, safeguarding privacy and cybersecurity remains a critical challenge. This session examines emerging governance models to balance innovation, security, and individual rights.
- Understand the cybersecurity risks posed by AI-driven applications in the absence of strict federal oversight.
- Explore frameworks for ethical AI use and privacy protection under deregulated conditions.
- Examine the role of state legislation and public-private partnerships in closing governance gaps.
- Identify strategies to foster responsible AI development while enabling operational agility.
Preparing for Quantum Threats: Building Resilience in a Decentralized Cybersecurity Landscape
11:10 AM - 11:30 AM (20 mins)
Quantum computing presents existential threats to current cryptographic standards. This session discusses how decentralized cybersecurity systems can start building quantum-resilient infrastructures today.
- Explore the vulnerabilities quantum computing will expose in traditional encryption models.
- Identify post-quantum cryptography standards critical for decentralized entities to adopt.
- Discuss timelines and practical steps for quantum preparedness at the local and state levels.
- Understand the role of decentralized innovation hubs in accelerating quantum-safe cybersecurity development.
Enabling and Accelerating Data and Innovation Partnerships with Zero Trust
11:30 AM - 12:00 PM (30 mins)


Zero Trust is more than a security framework; it’s a foundation for secure data-sharing ecosystems. This session explores how agencies can create conditions for innovation and partnership while preserving cybersecurity integrity.
- Understand how Zero Trust principles enable secure cross-agency and public-private collaborations.
- Explore the intersection of Zero Trust and decentralized cyber architectures.
- Learn how to measure the effectiveness of Zero Trust in fostering innovation safely.
- Identify governance structures that protect data and drive mission outcomes.
Architecting Cyber Resilience in an Era of Fragmentation: Enabling Trust, Speed, and Scalability
12:00 PM - 12:20 PM (20 mins)
As federal cybersecurity strategy shifts from centralized control to distributed, locally-driven execution, technology must become the unifying layer that enables resilience without sacrificing speed or mission outcomes. Explore how modern infrastructure, AI-enhanced tools, and Zero Trust orchestration are helping agencies:
- Operationalize Zero Trust through automation and dynamic identity-based access across fragmented environments
- Secure AI pipelines and data flows while aligning with evolving governance models and privacy expectations
- Prepare for post-quantum threats with crypto-agile infrastructures designed for future resilience
- Enable mission continuity at the edge through cloud-native, decentralized cybersecurity frameworks
From Policy to Protection: Implementing the Federal Cybersecurity Strategy in a Post-Compliance Era
12:20 PM - 12:40 PM (20 mins)
Federal cybersecurity policy is evolving from strict compliance to a performance- and resilience-based model—accelerated by executive orders, TMF projects, and the DOGE-driven transformation mandates. This keynote will help agencies align mission delivery with proactive cyber defense.
- Operationalizing Executive Order 14028 and the Federal Zero Trust Strategy
- Moving from checkbox compliance to resilience-based frameworks
- Aligning cybersecurity with DOGE cost-efficiency mandates and program cuts
- Using TMF funding to modernize without compromising security
Lunch Break and Networking
12:40 PM - 1:38 PM (58 mins)
Interactive Roundtable Discussions
1:40 PM - 2:40 PM (60 mins)
Zero Trust Under Fire: Securing Mission Systems and Warfighter Networks in Real Time
2:40 PM - 3:00 PM (20 mins)
While many agencies focus on Zero Trust as a compliance or architectural objective, for the Department of Defense it is an operational imperative. This keynote explores how Zero Trust is being deployed in real-world, high-risk environments—from the tactical edge to global cloud infrastructures—where latency, scale, and resilience are mission-critical.
- Transitioning from perimeter-based defense to continuous verification in active defense environments
- Deploying Zero Trust in classified, contested, and disconnected operations across global theaters
- Integrating identity, device, and data protections without compromising speed or mission agility
- Lessons learned from Zero Trust pilots in combatant commands, enterprise IT, and hybrid environments
Cyber Accountability in the Age of Deregulation: Rebuilding Trust and Oversight
3:00 PM - 3:30 PM (30 mins)
With regulations being rolled back under DOGE and new executive orders, this session explores how agencies can maintain transparency, legal compliance, and public trust—without regulatory overreach.
- Maintaining transparency and reporting integrity with fewer federal mandates
- Ethics and accountability frameworks for AI, data sharing, and automation
- The watchdog role of GAO, OIGs, and independent cybersecurity audits
- Cyber incident reporting and metrics for decentralized networks
Closing Remarks
3:30 PM - 3:40 PM (10 mins)
Reception
3:40 PM - 4:40 PM (60 mins)