-
CDM in Context
With the progression of the EINSTEIN program, and the release of the new TIC 3.0 policy – how are other programs interacting and complementing CDM? What extra measures can agencies take to protect the expanding perimeter while also securing their cloud?
Session Speakers
![John Curran](https://meritalk.com/wp-content/uploads/2018/09/john-curran-300x300-1-143x143.jpg)
![Sean Connelly](https://meritalk.com/wp-content/uploads/2019/04/sean-connelly-300x300-2-143x143.jpg)
TIC Program Manager and Senior Cybersecurity Architect
Cybersecurity and Infrastructure Security Agency
Department of Homeland Security
![Felker](https://meritalk.com/wp-content/uploads/2017/12/felker-143x143.jpg)
Assistant Director, Integrated Operations Division
Cybersecurity and Infrastructure Security Agency
Department of Homeland Security
![Stevens](https://meritalk.com/wp-content/uploads/2019/10/stevens-143x143.jpg)
Deputy Chief Information Security Officer
Executive Director, Cybersecurity Policy and Strategy
Department of Veterans Affairs