North Carolina AI and Cybersecurity Symposium 2025 Banner

Overview

The age of AI is here, and North Carolina’s public sector is leaning in to lead with purpose. As leaders strive to unlock AI’s potential, they must also confront the growing need to secure critical infrastructure, protect sensitive data, and ensure ethical, transparent use of these emerging technologies. With cyber threats evolving just as rapidly as AI capabilities, today’s CIOs and agency leaders face a dual challenge: driving innovation while fortifying digital trust.

The North Carolina AI and Cybersecurity Symposium is an action-packed opportunity to engage with leaders at the forefront of AI adoption and cyber defense. From state agencies to local governments, to higher education, attendees will explore how AI and cybersecurity intersect to shape smarter, safer, and more resilient public services. Join us in a friendly, collaborative environment to share ideas, build partnerships, and gain insights from both peers and private sector trailblazers leading the way on AI and Cybersecurity.

A message from our Keynote Speaker

Speakers

Shawnee Delaney

Shawnee Delaney

Founder and CEO, Vaillance Group and Former Spy

Shawnee Delaney is the founder and CEO of Vaillance Group and a globally recognized expert in human risk management, insider threat, and security investigations. As a decorated former Clandestine Services Officer with nearly a decade at the Defense Intelligence Agency (DIA), she conducted human intelligence (HUMINT) operations worldwide, including four combat zone tours in Iraq and Afghanistan, ultimately serving as both Detachment Chief and Supervisory Branch Chief. After leaving DIA, Shawnee supported the Department of Homeland Security (DHS) in protecting U.S. critical infrastructure with the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) before leading the creation of insider threat programs at Fortune 500 companies such as Uber and Merck Pharmaceuticals. Shawnee has advised nation-states, multinational corporations, and startups alike on preventing, detecting, and managing insider threats and continues to be a highly sought-after keynote speaker and consultant on insider threat, cybersecurity, and risk management. Her insights have been featured by The Financial Times, Fox Business, The Hill, USA Today, The Cipher Brief, Business Insider, Yahoo Finance and numerous international outlets. She holds master’s degrees in Counter-Terrorism & Counter-Proliferation and Cybersecurity and is currently completing a third in Industrial-Organizational Psychology.

More

Agenda

Wednesday, December 3

8:00 am Eastern

Registration and Morning Refreshments

9:00 am Eastern

Welcome

Teena Piccione, Secretary and Chief Information Officer, Department of Information Technology, State of North Carolina

9:30 am Eastern

Keynote – Spy vs. AI: Defending Against Artificial Intelligence's Threats to Your Life, Loved Ones and Livelihood

Have you heard of a deep fake? Would you or your family fall for one? Dive into the dynamic world of artificial intelligence and its intricate relationship with the insider threat landscape. As AI continues to reshape industries, it simultaneously introduces new dimensions of vulnerabilities within organizations that insiders can exploit. In this engaging and insightful keynote, we’ll explore the evolving threats of AI, from deepfakes to voice cloning, and how they can impact individuals, families, and businesses. With real-world examples and case studies, we'll break down the tactics malicious actors use and, more importantly, provide practical tips on how to protect yourself and your loved ones from these emerging dangers. By the end, you'll not only understand the risks but walk away empowered with actionable strategies to safeguard your digital lives in an increasingly AI-driven world.

Shawnee Delaney, Founder and CEO, Vaillance Group

10:30 am Eastern

Networking Break

11:00 am Eastern

Concurrent Sessions

The Evolution of Zero Trust

Zero Trust is no longer just a framework - it’s a mindset. As AI reshapes the cybersecurity landscape, Zero Trust is evolving into a smarter, more adaptive model that continuously verifies identities, detects anomalies in real time, and strengthens resilience. This session will unpack how AI-driven Zero Trust is transforming security strategies and what leaders need to do to stay ahead.

Smart Learning: Where Human Potential Meets AI

The classroom of tomorrow won’t be defined by humans or machines alone, but by how they work together. From personalized tutoring powered by AI to real-time feedback that adapts to each learner, artificial intelligence is transforming how we teach, train, and grow talent. Yet the human element - creativity, empathy and critical thinking remain essential. This session explores what the future of learning looks like when humans and AI collaborate, highlighting opportunities for more inclusive, adaptive, and impactful education across the public sector.

Defending Critical Infrastructure: Securing the Systems That Keep Us Running

From power grids and water systems to transportation networks and communications, critical infrastructure forms the backbone of our daily lives. Yet these essential services are increasingly under attack - targeted by nation-states, cybercriminals, and other malicious actors seeking disruption, ransom, or leverage. With the rise of AI-driven threats and the growing interconnection of operational technology and IT systems, the stakes have never been higher.

Governing AI: Policies, Guardrails, and Accountability in a Rapidly Evolving Landscape

As artificial intelligence continues to evolve at a rapid pace, organizations must establish strong governance frameworks to ensure responsible and effective deployment. Building on the morning’s foundational data discussion, this session will explore how different organizations are staying ahead of AI advancements by creating guardrails that promote transparency, accountability, and compliance. Learn how organizations are defining roles, implementing governance training, and developing policies that balance innovation with risk management.

Securing the Cloud

With more workloads and sensitive data moving to the cloud, agencies face new challenges in keeping systems safe and resilient. This session explores proven practices for cloud security, from strong identity and access controls to encryption, monitoring, and incident response. We’ll discuss how to defend against evolving threats, strengthen compliance, and maintain trust while operating in hybrid and multi-cloud environments. Attendees will leave with actionable strategies to protect their cloud investments and ensure mission continuity.

12:00 pm Eastern

Lunch

1:00 pm Eastern

General Session

1:30 pm Eastern

General Session

1:50 pm Eastern

Networking Break

2:10 pm Eastern

Concurrent Sessions

Coexisting with Technology: Optimizing the Workforce for a New Era

Emerging technologies are transforming the public sector workforce by streamlining operations, enhancing decision-making, and redefining job roles. As government agencies adopt new tools and automation, the challenge lies in balancing technological innovation with workforce optimization. How can IT leaders ensure a smooth transition, empower employees with new skills, and foster effective collaboration? This session will delve into strategies for seamlessly integrating emerging technologies into government operations while cultivating a culture that is resilient.

The Future of Identity Access Management

Identity and Access Management (IAM) is no longer just about passwords and permissions—it’s becoming the frontline of cybersecurity in an AI-driven world. As threat actors harness AI to scale their attacks, agencies are responding with smarter, adaptive IAM strategies that leverage AI for continuous authentication, real-time risk detection, and seamless user experience. This session explores how the convergence of cybersecurity and artificial intelligence is reshaping IAM.

Ransomware in the Age of AI

Ransomware has evolved from crude lockouts to highly targeted, business-crippling attacks - and now artificial intelligence is raising the stakes. As threat actors adopt AI to automate reconnaissance, craft convincing phishing lures, and accelerate encryption tactics, public sector organizations face a new level of risk. At the same time, defenders are leveraging AI for real-time threat detection, predictive analytics, and faster incident response. This session explores how ransomware is changing in the AI era, what this means for government cybersecurity strategies, and how agencies can harness AI’s power to stay one step ahead.

The Privacy Imperative: Protecting Data and Building Trust

In an era of increasing digital transformation, public sector organizations must navigate the complex landscape of privacy while maintaining transparency, ensuring compliance, and fostering public trust. With evolving regulations, growing cybersecurity threats, and the expanding use of AI and data-driven decision-making, safeguarding sensitive information is more critical than ever. This session will explore key privacy challenges in government, including data protection strategies, compliance with federal and state regulations and best practices for creating a “privacy-first” culture.

3:10 pm Eastern

Networking Break

3:30 pm Eastern

General Session

4:00 pm Eastern

Networking Reception

Network with your colleagues and discuss technology solutions with the event exhibitors.

4:30 pm Eastern

End of Day One

Thursday, December 4

8:00 am Eastern

Registration and Morning Refreshments

9:00 am Eastern

Welcome

9:20 am Eastern

Keynote

10:10 am Eastern

General Session

10:40 am Eastern

Networking Break

11:10 am Eastern

Concurrent Sessions

Asset Management in the Modern Era: Visibility, Value, and Vigilance

You can’t secure or optimize what you can’t see. From laptops and servers to cloud resources, IoT devices, and shadow IT, the modern public-sector environment is overflowing with assets that demand oversight. Effective asset management is no longer just an IT housekeeping task - it’s a critical foundation for cybersecurity, compliance, cost control, and service delivery. This session explores how agencies can modernize their asset management practices to gain full visibility, track lifecycle value, and reduce risk.

Unlocking the Power of Agentic AI in Government

Artificial intelligence is evolving from a supportive tool into an active collaborator. Agentic AI—systems capable of reasoning, planning, and taking initiative within defined boundaries—offers governments a chance to reimagine how work gets done. From automating routine tasks and coordinating workflows to surfacing insights for faster decision-making, agentic AI can help agencies boost efficiency, improve constituent services, and free up staff to focus on high-value priorities. This session will explore how public-sector organizations can harness agentic AI responsibly, highlight early use cases, and outline strategies for integrating these systems while maintaining transparency, security, and trust.

AI for Budget Analysts: Smarter Forecasting, Safer Data

As AI becomes more embedded in public sector operations, Budget Analysts have a unique opportunity to harness its power for smarter forecasting, anomaly detection, and resource optimization - while also navigating the risks of data exposure and algorithmic bias. This session will explore practical, real-world applications of AI tools that can enhance budget planning and financial oversight. Attendees will walk away with a clearer understanding of how to responsibly integrate AI into their workflows, and how to evaluate tools for transparency, security, and ethical use.

The People Problem + Social Engineering

Social engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks - and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat.

12:10 pm Eastern

Lunch

1:10 pm Eastern

General Session

1:40 pm Eastern

General Session

2:00 pm Eastern

Closing Refreshments

2:30 pm Eastern

End of Conference

Conference times, agenda, and speakers are subject to change.

Raleigh Convention Center

500 S Salisbury St
Raleigh, NC 27601
(919) 996-8500

Get Directions To
Raleigh Convention Center

Planning Committee

Industry Representatives

Zachary Thorn
Sr National Conference Director
Government Technology

Registration Information / Contact Us

Event Date: December 3 and 4, 2025

Open to Public Sector only.

Registration - Free

If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.

This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.

Contact Information

Need help registering, or have general event questions? Contact:

Sherri Tidwell
Government Technology
A division of e.Republic
Phone: (916) 932-1382
E-mail: stidwell@erepublic.com

Already a sponsor, but need a hand? Reach out to:

Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com

Want to sponsor and stand out? Reach out to explore opportunities!

Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com

Venue

Raleigh Convention Center

500 S Salisbury St
Raleigh, NC 27601
(919) 996-8500