Akamai

Events We Are Sponsoring

Join your regional cybersecurity community for two days built on connection, learning, and real-world impact. SecureWorld brings together local leaders, national experts, and practitioners from across the industry for 30+ interactive sessions, insightful keynotes, and engaging panel discussions—all curated with guidance from regional CISOs.
Earn 12-18 CPE credits, explore innovative solutions from trusted providers, meet with association chapters, and build relationships that last well beyond the event. Designed to be accessible and deeply relevant, SecureWorld delivers the practical knowledge, collaborative energy, and peer support you need to strengthen your skills and secure what matters most.
Cybersecurity is always a volatile topic – new threats, new approaches to defense, emerging new attack surfaces. The emergence of AI as a commercially viable technology introduces new considerations, including growing recognition that it substantially increases the need for risk management.
Join us as thought leaders from government and industry discuss what is happening now, and what threats and opportunities may arise from current trends.
Learning Objectives:
- Identify where new AI tools can reinforce existing cyber defenses
- Examine how to protect data privacy within an AI-enabled system
- Evaluate your software supply chain to determine how and where to implement zero trust requirements
- Delineate the elements of a universally applied ZT architecture, including identities, accounts, assets, resources, authentication, behavior, and data
- Review your agency’s operations to locate where OT is used and conduct risk assessments to determine corrective measures
Microsegmentation is a critical security strategy for state and local law enforcement agencies aiming to comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. This policy mandates strict security, encryption, and access controls for protecting sensitive Criminal Justice Information (CJI).
The security policy ensures that law enforcement agencies and their partners securely manage biometric, biographical, and case data throughout its lifecycle. Microsegmentation helps meet stringent requirements for controlling access to Criminal Justice Information (CJI) by breaking networks into small, secure zones to restrict lateral movement of threats. Key aspects of microsegmentation for CJIS compliance include limiting “east-west” movement between systems; implementing Zero Trust architectures; and automating the classification of protected assets and creating dynamic security policies.
Learning Objectives:
- Understand the connection between microsegmentation and zero trust architecture in protecting and monitoring “need-to-know” access to CJI
- Evaluate how automated policy generation protects both compliance and operational stability
- Define the role of microsegmentation in protecting high-value assets, such as database servers containing sensitive information such as biographic, biometric, or case report data
Learning Objectives:
- Identify the types of cyber threats your agency is facing and which AI tools are best suited to respond to them
- Delineate which cybersecurity activities can be adapted quickly for AI enablement (e.g., fraud detection through real-time transaction monitoring, phishing detection by analyzing suspicious email)
- Outline the steps to implement AI tools in order of priority
- Identify ways to incorporate theater MPEs into one overall solution
- Review the roles played by zero trust and ICAM in protecting operations while maintaining speed of execution
- Outline the role of AI in identifying and eliminating cyber threats in a battle space environment
- Identify the assets – from supercomputers to dedicated high-speed wireless networks to scientific disciplines – needed to meet the objectives of the Genesis Mission
- Evaluate the role your agency may play in executing a foundational science research project
- Delineate the internal and external resources required to achieve scientific breakthroughs in multiple disciplinary fields and identify overlaps in capabilities and objectives
Learning Objectives:
- Understand how an agency can set priorities for using AI in cybersecurity, whether through monitoring for phishing, closing gaps and patching existing systems, or monitoring for malware that has been modified
- Outline the steps in implementing AI-enabled tools that can work with existing cyber defenses
- Define metrics that can measure the impact of using AI tools for cybersecurity
- Outline the role of drones, sensors and AI to improve situational awareness for first responders, including GIS mapping to analyze hazard risks and affected populations
- Evaluate how your agency is using systems that provide two-way communications, especially alert systems with geo-targeting capabilities to reach affected areas
- Delineate steps to ensure operational readiness, by testing systems, training first responders, and updating protocols to meet federal, state, and local emergency regulations
- Evaluate the value of a unified dashboard that tracks spending across clouds and allocates costs to teams, projects, and applications
- Delineate the steps to implement automated shutdowns of non-critical environments during off-hours and delete unused resources such as unattached storage volumes or IP addresses
- Outline methods for analyzing resource utilization and allocating underutilized storage and databases

Three Days of Collaboration, Learning, and Cybersecurity Insights
This gathering marks the 19th ISAC Annual Meeting—celebrating nearly two decades of State, Local, Tribal, and Territorial (SLTT) collaboration and community defense. Government Technology is proud to partner with the MS-ISAC in advancing an ongoing initiative that has been shaping how the public sector confronts its most urgent cybersecurity challenges.
Join us on June 21-24, 2026 at the Caribe Royale in Orlando, Florida. Engage with peers, gain insights from shared SLTT best practices, and enhance your security, resilience, and continuity strategies to better protect U.S. government networks and systems.
Open to State, Local, Tribal, and Territorial (SLTT) government organizations.