About this Event
CyberSmart 2026
Cybersecurity is always a volatile topic – new threats, new approaches to defense, emerging new attack surfaces. Join us as thought leaders from government and industry discuss what is happening now, and what threats and opportunities may arise from current trends.
Session One: The Intersection of AI and Cyber (and Cyber Defense)
The cyber cold war between U.S. agencies and hostile interests – from criminals to nation-states – has entered a new phase with the widespread use of artificial intelligence (AI), which has emerged as a true two-edged sword in the conflict. AI can be a powerful tool in cyber defense, but it will have to be used against AI-driven cyber attacks.
Session Two: Zero Trust and Supply Chain Security Belong Together
The concept of Zero Trust is summarized in its slogan: Never trust, always verify. This concept is the basis of federal policy mandating that agencies adopt ZT architectures. Today, however, the premise must be expanded to include supply chain security – as more agencies rely on open-source software and commercial software from multiple vendors, they risk encountering bugs and malware that are already embedded in software codes from those sources.
Session Three: Bringing Cybersecurity to Critical Infrastructure
The need for stronger, more comprehensive cybersecurity has to extend to include U.S. critical infrastructure. The U.S. Coast Guard reported in late 2024 that hostile nation-states have been targeting operations technology (OT) used at our country’s maritime ports, one such critical infrastructure sector. This is another way that the cyber attack surface is expanding.
Learning Objectives
- Identify where new AI tools can reinforce existing cyber defenses
- Examine how to protect data privacy within an AI-enabled system
- Evaluate your software supply chain to determine how and where to implement zero trust requirements
- Delineate the elements of a universally applied ZT architecture, including identities, accounts, assets, resources, authentication, behavior, and data
- Review your agency’s operations to locate where OT is used and conduct risk assessments to determine corrective measures
Hosted by: Claudia Hosky, Publisher, FedInsider
Moderated by: Jane Norris, Contributing Editor, FedInsider
Sponsored by: Carahsoft Technology Corp., and The College of Professional Studies at George Washington University
Complimentary Registration
Please register using the form below or call (202) 237-0300. Participants can earn up to 3 CPE credits in Business Management & Organization. To receive CPE credit you must arrive on time, fill out and submit your evaluation to registration as you leave. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Additional Information
Prerequisites and Advance Preparation: None required.
Program Level: Basic
Delivery Method: Group Live
Fee: There is no fee associated with this event, and no penalty for cancellation or no-show. For more information regarding concern and/or program cancellation policies please contact [email protected]
CPE certification for this event is being administered by The George Washington University College of Professional Studies, registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education of the National Registry of CPE Sponsors. State boards of accountancy have final authority in the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website .
Agenda
🕑: 12:00 PM - 12:55 PM
Registration/Check-in & Networking
Info: Welcome! Register or check-in with our FedInsider Team.
🕑: 12:55 PM - 12:59 PM
Welcome Remarks
🕑: 01:00 PM - 01:55 PM
Session One: The Intersection of AI and Cyber (and Cyber Defense)
Info: The cyber cold war between U.S. agencies and hostile interests – from criminals to nation-states – has entered a new phase with the widespread use of artificial intelligence (AI), which has emerged as a true two-edged sword in the conflict. AI can be a powerful tool in cyber defense, but it will have to be used against AI-driven cyber attacks.
🕑: 02:00 PM - 02:55 PM
Session Two: Zero Trust and Supply Chain Security Belong Together
Info: The concept of Zero Trust is summarized in its slogan: Never trust, always verify. This concept is the basis of federal policy mandating that agencies adopt ZT architectures. Today, however, the premise must be expanded to include supply chain security – as more agencies rely on open-source software and commercial software from multiple vendors, they risk encountering bugs and malware that are already embedded in software codes from those sources.
🕑: 03:00 PM - 04:00 PM
Session Three: Bringing Cybersecurity to Critical Infrastructure
Info: The need for stronger, more comprehensive cybersecurity has to extend to include U.S. critical infrastructure. The U.S. Coast Guard reported in late 2024 that hostile nation-states have been targeting operations technology (OT) used at our country’s maritime ports, one such critical infrastructure sector. This is another way that the cyber attack surface is expanding.
🕑: 04:00 PM - 05:00 PM
Closing Comments & Networking Reception
Event Venue & Nearby Stays
Carahsoft Conference & Collaboration Center, 11493 Sunset Hills Rd, Reston, United States
USD 0.00





