August 7 | 1:30 PM ET Artificial intelligence is rapidly transforming our world, from the way we work to the way we interact with machines. Once AI is able to utilize the power of quantum computing, the results—both good and bad—will be immeasurable. As AI becomes more sophisticated and quantum computers become more readily available, so too do the potential security risks. This session will discuss the critical issues at the intersection of Quantum, AI and security. The panelists will explore: Countering malicious use of AI systems and quantum computers by actors with ill intentions, such as criminals, terrorists, or hostile states. Adversarial attacks on AI, such as attempts to fool or manipulate AI systems by exploiting their vulnerabilities or limitations.Protection of the massive amounts of data used by AI systems to learn and improve their performance.Using AI to enhance cybersecurity, such as preventing cyberattacks, optimizing security processes, and improving securit...
Continue →July 31 | 2:00 PM ET In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a more resilient, "never trust, always verify" approach. This exclusive webinar will provide an in-depth exploration on how Menlo Security, Votiro and Thales Trusted Cyber Technologies (TCT) align with CISA's Zero Trust Maturity Model. You'll gain valuable insights into how each of these solutions can enhance your agency's security posture and help you stay compliant with federal mandates. The speakers will discuss best practices including: Aligning with CISA's Zero Trust Maturity Model Building a FedRAMP- Compli...
Continue →