CyberSmart 2025: From A to Z
This event qualifies for .3 CEUs
This event qualifies for 3 CPEs
This event qualifies for 3 CLPs
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office.
For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to estimate how long it will take for the hackers’ access to be shut down.
One major challenge for agencies is how to meet these requirements while looking for ways to incorporate new technologies that can streamline their operations. The biggest example of this is the explosive advent of artificial intelligence (AI) as a tool that agencies are tasked to incorporate.
Learning Objectives:
- Understand the role of Zero Trust in a FedRAMP cloud service provider and how to use it to meet the federal mandate
- Review the FedRAMP cloud service levels to confirm your agency is using the right level of service for different classes of information
- Outline the different types of AI tools and services available to agencies, including which can best be used to strengthen current cybersecurity measures
- Delineate the elements that comprise a user’s “identity” within your agency’s systems, and the protective steps available to guard against human or AI-generated intruders
- Define the differences between government employees accessing systems internally and contractors entering from outside the systems, and the tools available to distinguish between them
Speaker and Presenter Information
CyberSmart 2025: Hosted by
Claudia Hosky
Publisher,
FedInsider
Michael Kennedy
Contributing Editor,
FedInsider
CyberSmart 2025: Check-in & Welcome
12:00 noon 12:59 pm
Welcome! Register or check in with our FedInsider team.
Session 1: The Role of AI in Cybersecurity
1:00 pm 1:55 pm
Both public and private sector cyber experts recognize that AI represents a new level of threat, such as fear of AI-generated deepfakes that could allow bad actors to circumvent mechanisms to confirm legitimate users identities. But AI also offers new opportunities to enhance security, by preventing attacks, automating threat responses, and detecting anomalies in user behavior.
Our panel of government and industry experts share their experiences in harnessing AI to confront the continually evolving threat landscape and how agencies can put AI squarely on the side of defending against bad actors.
Session 2: Zero Trust & FedRAMP High
2:00 pm 2:55 pm
One of the governments biggest cyber initiatives is the requirement to incorporate Zero Trust (ZT) architecture as a baseline security measure. The General Services Administrations Federal Risk and Authorization Management Program (FedRAMP) expects cloud providers to meet this requirement; as federal agencies modernize and adopt cloud solutions, they are mandated to use FedRAMP authorized Cloud Service Offerings (CSO) for any public cloud delivered service. The requirement applies to all three FedRAMP impact levels, from high-impact (cloud services that handle highly sensitive controlled unclassified information such as national security or public health information), to low-impact cloud services that handle non-sensitive, unclassified information.
Our panel of government and industry experts will discuss the role of ZT in meeting FedRAMPs cloud security requirements.
Session 3: Identity is Everything
3:00 pm 3:55 pm
Protecting a users identity who the user is, what they are allowed to access, whether they can edit and copy data, etc. lies at the heart of cybersecurity. Its also like having millions of users with a copy of your door key; it only takes one users carelessness to unlock the door.
Zero trust, for example, is about never trusting, always verifying a users identity. One of the biggest fears about AI is the possibility of generating a false persona that appears real or creating an online deepfake of a real person that can wreak havoc with the systems it can enter. The National Institute of Standards and Technology recently released draft guidelines that include expanded identity proofing models, applicable to both government agencies and contractors.
Our panel of government and business experts will outline the central importance of identity management and verification, how to strengthen identity verification processes, and how to evaluate their success.
CyberSmart 2025: Closing Comments & Networking Reception
4:00 pm 5:00 pm
Join us for a Networking reception afterward! There will be a variety of delicious fare & drinks. This is a unique and amazing opportunity to network with your State, local and industry peers.
Relevant Government Agencies
Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC
This event has no exhibitor/sponsor opportunities
When
Thu, Feb 6, 2025, 12:00pm - 5:00pm
ET
Cost
Complimentary: $ 0.00
Where
Carahsoft Conference & Collaboration Center
11493 Sunset Hills Road Suite 100
Reston, VA 20190
Get directions
Website
Click here to visit event website
Event Sponsors
Organizer
FedInsider