Cyber Resilience in a Turbulent Environment Series

Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.

 

The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.

 

This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.

 

September 3: Facing the Two-Edged Sword of AI


How to Keep What You Have & Still Strengthen Security


The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.

 

This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.

 

Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.

 

Learning Objectives:

  • Learn how to identify inadequate security guardrails for AI models and the steps needed to strengthen them
  • Review common pitfalls of AI deployments, such as the inability to segment and contain anomalous behaviors, poor visibility into the AI model’s behavior, and lack of control over data flow
  • Outline methods of restricting AI access to approved data sets only
  • Delineate ways to trigger alerts and blocking AI access to external or unintended data sources

Speaker Details

Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory

Ashley Billman
Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory

 

Gary Barlet
Public Sector CTO,
Illumio

 

Mark Mitchell

Federal Security Architect

Netskope

 

Jane Norris
Contributing Editor,
FedInsider

Event Topic

Cybersecurity, Security, Technology

Relevant Audiences

All State and Local Government, All Federal Government, National Guard, Air Force, Coast Guard, Navy, City Government, County Government, Municipalities, State Government, Central Intelligence Agency, Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Housing and Urban Development, Department of Interior, Department of Justice, Department of Labor, Department of State, Department of Transportation, Department of the Treasury, Environmental Protection Agency, Equal Employment Opportunity Commission, Federal Aviation Administration, Federal Communications Commission, Food and Drug Administration, Federal Emergency Management Agency, General Services Administration, Government Accountability Office, National Aeronautics and Space Administration, National Institute of Health, National Security Agency, U.S. Agency of International Development, U.S. Census Bureau, U.S. Office of Personnel Management, U.S. Postal Service, Veterans Affairs

Other Agency

Office of the President (includes OMB), Other Federal Agencies, Judicial Branch Agencies, Foreign Governments/Agencies
Cyber Resilience in a Turbulent Environment Series
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Wed, Sep 03, 2025 | 2:00 pm - 3:00 pm ET
Registration Cost
Complimentary
Website
Click here to view event website
Sponsors
Carahsoft Technology Corp.
Organizer