Cyber Resilience in a Turbulent Environment Series
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.
The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.
This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.
September 3: Facing the Two-Edged Sword of AI
How to Keep What You Have & Still Strengthen Security
The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent.
This series of three webinars will help you map out the risks and benefits of artificial intelligence – used by bad actors to launch innovative new attacks, but also with the potential to bolster defenses in new ways. It will showcase how to use Zero Trust architecture as a framework for ongoing protection and the integration of new tools. And it will show how to enhance the value of security already in place and integrate interoperable tools that work in multiple cloud environments.
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources.
Learning Objectives:
- Learn how to identify inadequate security guardrails for AI models and the steps needed to strengthen them
- Review common pitfalls of AI deployments, such as the inability to segment and contain anomalous behaviors, poor visibility into the AI model’s behavior, and lack of control over data flow
- Outline methods of restricting AI access to approved data sets only
- Delineate ways to trigger alerts and blocking AI access to external or unintended data sources
Speaker Details

Ashley Billman
Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory

Gary Barlet
Public Sector CTO,
Illumio

Mark Mitchell
Federal Security Architect
Netskope

Jane Norris
Contributing Editor,
FedInsider
Event Topic
Cybersecurity, Security, TechnologyRelevant Audiences
All State and Local Government, All Federal Government, National Guard, Air Force, Coast Guard, Navy, City Government, County Government, Municipalities, State Government, Central Intelligence Agency, Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Housing and Urban Development, Department of Interior, Department of Justice, Department of Labor, Department of State, Department of Transportation, Department of the Treasury, Environmental Protection Agency, Equal Employment Opportunity Commission, Federal Aviation Administration, Federal Communications Commission, Food and Drug Administration, Federal Emergency Management Agency, General Services Administration, Government Accountability Office, National Aeronautics and Space Administration, National Institute of Health, National Security Agency, U.S. Agency of International Development, U.S. Census Bureau, U.S. Office of Personnel Management, U.S. Postal Service, Veterans AffairsOther Agency
Office of the President (includes OMB), Other Federal Agencies, Judicial Branch Agencies, Foreign Governments/Agencies