Next-Gen Cyber Operations: AI in Action Summit - Agenda
Register    ➤

Agenda

8 AM EDT

1 HR
8 AM EDT 1 HR

Registration, Exhibition, and Breakfast

9:15 AM EDT

10 MINS
9:15 AM EDT 10 MINS

Opening Remarks

9:25 AM EDT

40 MINS
9:25 AM EDT 40 MINS

Zero Trust in Action: From Strategy to Scale Across Federal Systems

In 2026, Zero Trust is becoming the standard approach to cybersecurity across the federal government, centered on continuously verifying users, devices, and access. The conversation is shifting from strategy to execution—how agencies are scaling Zero Trust, integrating it with cloud and AI, and making it work in real-world environments while balancing security with mission needs.

In 2026, Zero Trust is becoming the standard approach to cybersecurity across the federal government, centered on continuously verifying users, devices, and access. The conversation is shifting from strategy to execution—how agencies are scaling Zero Trust, integrating it with cloud and AI, and making it work in real-world environments while balancing security with mission needs.

In 2026, Zero Trust is becoming the standard approach to cybersecurity across the federal government, centered on continuously verifying users, devices, and access. The conversation is shifting from strategy to execution—how agencies are scaling Zero Trust, integrating it with cloud and AI, and making it work in real-world environments while balancing security with mission needs.

In 2026, Zero Trust is becoming the standard approach to cybersecurity across the federal government, centered on continuously verifying users, devices, and access. The conversation is shifting from strategy to execution—how agencies are scaling Zero Trust, integrating it with cloud and AI, and making it work in real-world environments while balancing security with mission needs.

10:05 AM EDT

15 MINS
10:05 AM EDT 15 MINS

Emerging Technology Talk

10:25 AM EDT

30 MINS
10:25 AM EDT 30 MINS

Break in the Emerging Technology Showcase

10:55 AM EDT

10 MINS
10:55 AM EDT 10 MINS

Emerging Technology Talk

11:05 AM EDT

45 MINS
11:05 AM EDT 45 MINS

Advancing Cyber Defense Across Government Systems

Today, evolving cyber threats and increasingly sophisticated adversaries are challenging agencies to detect and respond to risks in real time, often across complex and distributed environments. Experts will come together to discuss how agencies are strengthening cybersecurity and threat intelligence strategies, sharing practical approaches to improving visibility, accelerating response, and better protecting sensitive data across government systems and critical infrastructure.

Today, evolving cyber threats and increasingly sophisticated adversaries are challenging agencies to detect and respond to risks in real time, often across complex and distributed environments. Experts will come together to discuss how agencies are strengthening cybersecurity and threat intelligence strategies, sharing practical approaches to improving visibility, accelerating response, and better protecting sensitive data across government systems and critical infrastructure.

Today, evolving cyber threats and increasingly sophisticated adversaries are challenging agencies to detect and respond to risks in real time, often across complex and distributed environments. Experts will come together to discuss how agencies are strengthening cybersecurity and threat intelligence strategies, sharing practical approaches to improving visibility, accelerating response, and better protecting sensitive data across government systems and critical infrastructure.

Today, evolving cyber threats and increasingly sophisticated adversaries are challenging agencies to detect and respond to risks in real time, often across complex and distributed environments. Experts will come together to discuss how agencies are strengthening cybersecurity and threat intelligence strategies, sharing practical approaches to improving visibility, accelerating response, and better protecting sensitive data across government systems and critical infrastructure.

11:50 AM EDT

15 MINS
11:50 AM EDT 15 MINS

Emerging Technology Talk

12:10 PM EDT

50 MINS
12:10 PM EDT 50 MINS

Lunch in the Emerging Technology Showcase

1 PM EDT

25 MINS
1 PM EDT 25 MINS

Fireside Chat

1:25 PM EDT

40 MINS
1:25 PM EDT 40 MINS

Secure the Shift: Strengthening Cloud Defenses in Government

As federal agencies increasingly adopt cloud solutions to improve agility and efficiency, securing these environments has become a top priority. This panel will explore practical strategies for protecting sensitive data, managing cloud access, and ensuring compliance with federal security standards. Experts will discuss emerging threats, best practices for cloud security, and actionable steps agencies can take to strengthen their cloud defenses while enabling mission success.

As federal agencies increasingly adopt cloud solutions to improve agility and efficiency, securing these environments has become a top priority. This panel will explore practical strategies for protecting sensitive data, managing cloud access, and ensuring compliance with federal security standards. Experts will discuss emerging threats, best practices for cloud security, and actionable steps agencies can take to strengthen their cloud defenses while enabling mission success.

As federal agencies increasingly adopt cloud solutions to improve agility and efficiency, securing these environments has become a top priority. This panel will explore practical strategies for protecting sensitive data, managing cloud access, and ensuring compliance with federal security standards. Experts will discuss emerging threats, best practices for cloud security, and actionable steps agencies can take to strengthen their cloud defenses while enabling mission success.

As federal agencies increasingly adopt cloud solutions to improve agility and efficiency, securing these environments has become a top priority. This panel will explore practical strategies for protecting sensitive data, managing cloud access, and ensuring compliance with federal security standards. Experts will discuss emerging threats, best practices for cloud security, and actionable steps agencies can take to strengthen their cloud defenses while enabling mission success.

2:05 PM EDT

10 MINS
2:05 PM EDT 10 MINS

Emerging Technology Talk

2:20 PM EDT

40 MINS
2:20 PM EDT 40 MINS

Secure by Habit: Building a Cyber-Smart Workforce

As cyber threats continue to evolve, one of the most effective lines of defense remains a well-trained workforce equipped with a strong foundation in everyday cybersecurity practices. Yet many agencies still face challenges in translating complex security requirements into simple, actionable behaviors for employees.

Read More

As cyber threats continue to evolve, one of the most effective lines of defense remains a well-trained workforce equipped with a strong foundation in everyday cybersecurity practices. Yet many agencies still face challenges in translating complex security requirements into simple, actionable behaviors for employees.

This panel will explore practical approaches to training the federal workforce on basic cybersecurity, focusing on how agencies can build awareness, reduce human risk, and empower staff to better protect sensitive data through clear, consistent, and easy-to-apply security practices.

As cyber threats continue to evolve, one of the most effective lines of defense remains a well-trained workforce equipped with a strong foundation in everyday cybersecurity practices. Yet many agencies still face challenges in translating complex security requirements into simple, actionable behaviors for employees.

Read More

As cyber threats continue to evolve, one of the most effective lines of defense remains a well-trained workforce equipped with a strong foundation in everyday cybersecurity practices. Yet many agencies still face challenges in translating complex security requirements into simple, actionable behaviors for employees.

This panel will explore practical approaches to training the federal workforce on basic cybersecurity, focusing on how agencies can build awareness, reduce human risk, and empower staff to better protect sensitive data through clear, consistent, and easy-to-apply security practices.

3 PM EDT

5 MINS
3 PM EDT 5 MINS

Closing Remarks

HTML Content

LEARN MORE ABOUT sponsorship opportunities