Cyber Defenders Workshop 2025 - Agenda
Register    ➤

Agenda

Times are subject to change.

9:00 AM EST Tuesday, March 04

Welcome and Opening Remarks

2 minutes

Welcome to the Cyber Defenders Workshop!

Welcome to the Cyber Defenders Workshop!

Read More
9:02 AM EST Tuesday, March 04

Underwriter

Invicti

9:07 AM EST Tuesday, March 04

Keynote: Building a Resilient Cybersecurity Framework

25 minutes

Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.

Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.

Read More
9:32 AM EST Tuesday, March 04

Underwriter

Google Cloud Security

Modernizing Defenses to Combat Cyber Threats or Modernizing Government CyberSecurity in the Age of AI

20 minutes

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Read More

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Key Takeaways:

  • Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
  • Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
  • Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.

 

Read More
Google Cloud Security
9:52 AM EST Tuesday, March 04

A Culture of Cybersecurity Vigilance

25 minutes

What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.

What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.

Marisol Cruz Cain
Marisol Cruz Cain
Director, Information and Cybersecurity
GAO
Read More
10:17 AM EST Tuesday, March 04

Sponsor Session

20 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
10:37 AM EST Tuesday, March 04

Coffee Break

10 minutes

Refill your coffee and get ready for part two of this action-packed event!

Refill your coffee and get ready for part two of this action-packed event!

Read More
10:47 AM EST Tuesday, March 04

10:49 AM EST Tuesday, March 04

Securing the Supply Chain

25 minutes

Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.

Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.

Read More
11:14 AM EST Tuesday, March 04

Sponsor Session

20 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
11:34 AM EST Tuesday, March 04

Where Security Meets Privacy

25 minutes

Examine the intersection of privacy and cybersecurity, emerging threats, and the government's role in ensuring data brokers aren't selling sensitive data abroad.

Examine the intersection of privacy and cybersecurity, emerging threats, and the government's role in ensuring data brokers aren't selling sensitive data abroad.

Read More
11:59 AM EST Tuesday, March 04

Sponsor Session

20 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
12:19 PM EST Tuesday, March 04

Closing Remarks

5 minutes

Thank you for joining the Cyber Defenders Workshop!

Thank you for joining the Cyber Defenders Workshop!

Read More