Cyber Resilience in a Turbulent Environment Series


This event qualifies for .1 CEUs

This event qualifies for 1 CPEs

This event qualifies for 1 CLPs


Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.

 

The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.

 

This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.

 

September 3: Facing the Two-Edged Sword of AI


How to Keep What You Have & Still Strengthen Security


The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.

 

This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.

 

Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.

 

Learning Objectives:

  • Learn how to identify inadequate security guardrails for AI models and the steps needed to strengthen them
  • Review common pitfalls of AI deployments, such as the inability to segment and contain anomalous behaviors, poor visibility into the AI model’s behavior, and lack of control over data flow
  • Outline methods of restricting AI access to approved data sets only
  • Delineate ways to trigger alerts and blocking AI access to external or unintended data sources

Speaker and Presenter Information

Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory

Ashley Billman
Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory

 

Gary Barlet
Public Sector CTO,
Illumio

 

Mark Mitchell

Federal Security Architect

Netskope

 

Jane Norris
Contributing Editor,
FedInsider

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC


Register as Attendee


Add to Calendar


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Sep 3, 2025, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Where
Free Webinar


Website
Click here to visit event website


Event Sponsors


Organizer
FEDINSIDER


Contact Event Organizer



Return to search results