Agenda
Times are subject to change.
Welcome and Opening Remarks
Welcome to the Cyber Defenders Workshop!
Welcome to the Cyber Defenders Workshop!
Underwriter
Keynote: Building a Resilient Cybersecurity Framework
Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.
Explore the critical components of a robust cybersecurity strategy. Hear about some of the best practices in safeguarding sensitive data and effectively preparing for cyber threats before they happen.
Underwriter
Modernizing Defenses to Combat Cyber Threats or Modernizing Government CyberSecurity in the Age of AI
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Key Takeaways:
- Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
- Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
- Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Read MoreA Culture of Cybersecurity Vigilance
What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.
What are some of the best practices in cybersecurity training? During this session, learn more about effective training programs, cyber hygiene practices, and resources for creating a resilient workforce.
Marisol Cruz Cain
Director, Information and CybersecurityGAO
Coffee Break
Refill your coffee and get ready for part two of this action-packed event!
Refill your coffee and get ready for part two of this action-packed event!
Securing the Supply Chain
Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.
Supply chains remain a top target for cyber adversaries. Explore insights into protecting critical supply chain systems and discuss federal regulations and risk management strategies to prevent attacks.
Where Security Meets Privacy
Examine the intersection of privacy and cybersecurity, emerging threats, and the government's role in ensuring data brokers aren't selling sensitive data abroad.
Examine the intersection of privacy and cybersecurity, emerging threats, and the government's role in ensuring data brokers aren't selling sensitive data abroad.
Closing Remarks
Thank you for joining the Cyber Defenders Workshop!
Thank you for joining the Cyber Defenders Workshop!