Cyber Resilience in a Turbulent Environment Series
This event qualifies for .1 CEUs
This event qualifies for 1 CPEs
This event qualifies for 1 CLPs
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.
The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.
This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.
September 3: Facing the Two-Edged Sword of AI
How to Keep What You Have & Still Strengthen Security
The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.
This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.
Learning Objectives:
- Learn how to identify inadequate security guardrails for AI models and the steps needed to strengthen them
- Review common pitfalls of AI deployments, such as the inability to segment and contain anomalous behaviors, poor visibility into the AI model’s behavior, and lack of control over data flow
- Outline methods of restricting AI access to approved data sets only
- Delineate ways to trigger alerts and blocking AI access to external or unintended data sources
Speaker and Presenter Information
Ashley Billman
Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory
Gary Barlet
Public Sector CTO,
Illumio
Mark Mitchell
Federal Security Architect
Netskope
Jane Norris
Contributing Editor,
FedInsider
Relevant Government Agencies
Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Wed, Sep 3, 2025, 2:00pm - 3:00pm
ET
Cost
Complimentary: $ 0.00
Where
Free Webinar
Website
Click here to visit event website
Event Sponsors
Organizer
FEDINSIDER