5 hours
Carahsoft Conference & Collaboration Center
Free Tickets Available
Thu, 09 Apr • 12:00 PM (GMT-04:00)
Carahsoft Conference & Collaboration Center
11493 Sunset Hills Rd, Reston, United States
Cybersecurity is always a volatile topic – new threats, new approaches to defense, emerging new attack surfaces. Join us as thought leaders from government and industry discuss what is happening now, and what threats and opportunities may arise from current trends.
Session One: The Intersection of AI and Cyber (and Cyber Defense)
The cyber cold war between U.S. agencies and hostile interests – from criminals to nation-states – has entered a new phase with the widespread use of artificial intelligence (AI), which has emerged as a true two-edged sword in the conflict. AI can be a powerful tool in cyber defense, but it will have to be used against AI-driven cyber attacks.
Session Two: Zero Trust and Supply Chain Security Belong Together
The concept of Zero Trust is summarized in its slogan: Never trust, always verify. This concept is the basis of federal policy mandating that agencies adopt ZT architectures. Today, however, the premise must be expanded to include supply chain security – as more agencies rely on open-source software and commercial software from multiple vendors, they risk encountering bugs and malware that are already embedded in software codes from those sources.
Session Three: Bringing Cybersecurity to Critical Infrastructure
The need for stronger, more comprehensive cybersecurity has to extend to include U.S. critical infrastructure. The U.S. Coast Guard reported in late 2024 that hostile nation-states have been targeting operations technology (OT) used at our country’s maritime ports, one such critical infrastructure sector. This is another way that the cyber attack surface is expanding.
Hosted by: Claudia Hosky, Publisher, FedInsider
Moderated by: Jane Norris, Contributing Editor, FedInsider
Sponsored by: Carahsoft Technology Corp., and The College of Professional Studies at George Washington University
Complimentary Registration
Please register using the form below or call (202) 237-0300. Participants can earn up to 3 CPE credits in Business Management & Organization. To receive CPE credit you must arrive on time, fill out and submit your evaluation to registration as you leave. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Additional Information
Prerequisites and Advance Preparation: None required.
Program Level: Basic
Delivery Method: Group Live
Fee: There is no fee associated with this event, and no penalty for cancellation or no-show. For more information regarding concern and/or program cancellation policies please contact Q2VydHMgfCBGZWRJbnNpZGVyTmV3cyAhIGNvbQ==
CPE certification for this event is being administered by The George Washington University College of Professional Studies, registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education of the National Registry of CPE Sponsors. State boards of accountancy have final authority in the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website .
Info: Welcome! Register or check-in with our FedInsider Team.
Info: The cyber cold war between U.S. agencies and hostile interests – from criminals to nation-states – has entered a new phase with the widespread use of artificial intelligence (AI), which has emerged as a true two-edged sword in the conflict. AI can be a powerful tool in cyber defense, but it will have to be used against AI-driven cyber attacks.
Info: The concept of Zero Trust is summarized in its slogan: Never trust, always verify. This concept is the basis of federal policy mandating that agencies adopt ZT architectures. Today, however, the premise must be expanded to include supply chain security – as more agencies rely on open-source software and commercial software from multiple vendors, they risk encountering bugs and malware that are already embedded in software codes from those sources.
Info: The need for stronger, more comprehensive cybersecurity has to extend to include U.S. critical infrastructure. The U.S. Coast Guard reported in late 2024 that hostile nation-states have been targeting operations technology (OT) used at our country’s maritime ports, one such critical infrastructure sector. This is another way that the cyber attack surface is expanding.
Also check out other Workshops in Reston, Nonprofit events in Reston.
Tickets for CyberSmart 2026 can be booked here.
| Ticket type | Ticket price |
|---|---|
| In-Person (all sessions + happy hour) | Free |