The age of AI is here, and North Carolina’s public sector is leaning in to lead with purpose. As leaders strive to unlock AI’s potential, they must also confront the growing need to secure critical infrastructure, protect sensitive data, and ensure ethical, transparent use of these emerging technologies. With cyber threats evolving just as rapidly as AI capabilities, today’s CIOs and agency leaders face a dual challenge: driving innovation while fortifying digital trust.
The North Carolina AI and Cybersecurity Symposium is an action-packed opportunity to engage with leaders at the forefront of AI adoption and cyber defense. From state agencies to local governments, to higher education, attendees will explore how AI and cybersecurity intersect to shape smarter, safer, and more resilient public services. Join us in a friendly, collaborative environment to share ideas, build partnerships, and gain insights from both peers and private sector trailblazers leading the way on AI and Cybersecurity.
Wednesday, December 3 |
|
8:00 am Eastern |
Registration and Morning Refreshments |
9:00 am Eastern |
WelcomeTeena Piccione, Secretary and Chief Information Officer, Department of Information Technology, State of North Carolina |
9:30 am Eastern |
Keynote – Spy vs. AI: Defending Against Artificial Intelligence's Threats to Your Life, Loved Ones and LivelihoodHave you heard of a deep fake? Would you or your family fall for one? Dive into the dynamic world of artificial intelligence and its intricate relationship with the insider threat landscape. As AI continues to reshape industries, it simultaneously introduces new dimensions of vulnerabilities within organizations that insiders can exploit. In this engaging and insightful keynote, we’ll explore the evolving threats of AI, from deepfakes to voice cloning, and how they can impact individuals, families, and businesses. With real-world examples and case studies, we'll break down the tactics malicious actors use and, more importantly, provide practical tips on how to protect yourself and your loved ones from these emerging dangers. By the end, you'll not only understand the risks but walk away empowered with actionable strategies to safeguard your digital lives in an increasingly AI-driven world. Shawnee Delaney, Founder and CEO, Vaillance Group |
10:30 am Eastern |
Networking Break |
11:00 am Eastern |
Concurrent SessionsThe Evolution of Zero TrustZero Trust is no longer just a framework - it’s a mindset. As AI reshapes the cybersecurity landscape, Zero Trust is evolving into a smarter, more adaptive model that continuously verifies identities, detects anomalies in real time, and strengthens resilience. This session will unpack how AI-driven Zero Trust is transforming security strategies and what leaders need to do to stay ahead. Smart Learning: Where Human Potential Meets AIThe classroom of tomorrow won’t be defined by humans or machines alone, but by how they work together. From personalized tutoring powered by AI to real-time feedback that adapts to each learner, artificial intelligence is transforming how we teach, train, and grow talent. Yet the human element - creativity, empathy and critical thinking remain essential. This session explores what the future of learning looks like when humans and AI collaborate, highlighting opportunities for more inclusive, adaptive, and impactful education across the public sector. Defending Critical Infrastructure: Securing the Systems That Keep Us RunningFrom power grids and water systems to transportation networks and communications, critical infrastructure forms the backbone of our daily lives. Yet these essential services are increasingly under attack - targeted by nation-states, cybercriminals, and other malicious actors seeking disruption, ransom, or leverage. With the rise of AI-driven threats and the growing interconnection of operational technology and IT systems, the stakes have never been higher. Governing AI: Policies, Guardrails, and Accountability in a Rapidly Evolving LandscapeAs artificial intelligence continues to evolve at a rapid pace, organizations must establish strong governance frameworks to ensure responsible and effective deployment. Building on the morning’s foundational data discussion, this session will explore how different organizations are staying ahead of AI advancements by creating guardrails that promote transparency, accountability, and compliance. Learn how organizations are defining roles, implementing governance training, and developing policies that balance innovation with risk management. Securing the CloudWith more workloads and sensitive data moving to the cloud, agencies face new challenges in keeping systems safe and resilient. This session explores proven practices for cloud security, from strong identity and access controls to encryption, monitoring, and incident response. We’ll discuss how to defend against evolving threats, strengthen compliance, and maintain trust while operating in hybrid and multi-cloud environments. Attendees will leave with actionable strategies to protect their cloud investments and ensure mission continuity. |
12:00 pm Eastern |
Lunch |
1:00 pm Eastern |
General Session |
1:30 pm Eastern |
General Session |
1:50 pm Eastern |
Networking Break |
2:10 pm Eastern |
Concurrent SessionsCoexisting with Technology: Optimizing the Workforce for a New EraEmerging technologies are transforming the public sector workforce by streamlining operations, enhancing decision-making, and redefining job roles. As government agencies adopt new tools and automation, the challenge lies in balancing technological innovation with workforce optimization. How can IT leaders ensure a smooth transition, empower employees with new skills, and foster effective collaboration? This session will delve into strategies for seamlessly integrating emerging technologies into government operations while cultivating a culture that is resilient. The Future of Identity Access ManagementIdentity and Access Management (IAM) is no longer just about passwords and permissions—it’s becoming the frontline of cybersecurity in an AI-driven world. As threat actors harness AI to scale their attacks, agencies are responding with smarter, adaptive IAM strategies that leverage AI for continuous authentication, real-time risk detection, and seamless user experience. This session explores how the convergence of cybersecurity and artificial intelligence is reshaping IAM. Ransomware in the Age of AIRansomware has evolved from crude lockouts to highly targeted, business-crippling attacks - and now artificial intelligence is raising the stakes. As threat actors adopt AI to automate reconnaissance, craft convincing phishing lures, and accelerate encryption tactics, public sector organizations face a new level of risk. At the same time, defenders are leveraging AI for real-time threat detection, predictive analytics, and faster incident response. This session explores how ransomware is changing in the AI era, what this means for government cybersecurity strategies, and how agencies can harness AI’s power to stay one step ahead. The Privacy Imperative: Protecting Data and Building TrustIn an era of increasing digital transformation, public sector organizations must navigate the complex landscape of privacy while maintaining transparency, ensuring compliance, and fostering public trust. With evolving regulations, growing cybersecurity threats, and the expanding use of AI and data-driven decision-making, safeguarding sensitive information is more critical than ever. This session will explore key privacy challenges in government, including data protection strategies, compliance with federal and state regulations and best practices for creating a “privacy-first” culture. |
3:10 pm Eastern |
Networking Break |
3:30 pm Eastern |
General Session |
4:00 pm Eastern |
Networking ReceptionNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
4:30 pm Eastern |
End of Day One |
Thursday, December 4 |
|
8:00 am Eastern |
Registration and Morning Refreshments |
9:00 am Eastern |
Welcome |
9:20 am Eastern |
Keynote |
10:10 am Eastern |
General Session |
10:40 am Eastern |
Networking Break |
11:10 am Eastern |
Concurrent SessionsAsset Management in the Modern Era: Visibility, Value, and VigilanceYou can’t secure or optimize what you can’t see. From laptops and servers to cloud resources, IoT devices, and shadow IT, the modern public-sector environment is overflowing with assets that demand oversight. Effective asset management is no longer just an IT housekeeping task - it’s a critical foundation for cybersecurity, compliance, cost control, and service delivery. This session explores how agencies can modernize their asset management practices to gain full visibility, track lifecycle value, and reduce risk. Unlocking the Power of Agentic AI in GovernmentArtificial intelligence is evolving from a supportive tool into an active collaborator. Agentic AI—systems capable of reasoning, planning, and taking initiative within defined boundaries—offers governments a chance to reimagine how work gets done. From automating routine tasks and coordinating workflows to surfacing insights for faster decision-making, agentic AI can help agencies boost efficiency, improve constituent services, and free up staff to focus on high-value priorities. This session will explore how public-sector organizations can harness agentic AI responsibly, highlight early use cases, and outline strategies for integrating these systems while maintaining transparency, security, and trust. AI for Budget Analysts: Smarter Forecasting, Safer DataAs AI becomes more embedded in public sector operations, Budget Analysts have a unique opportunity to harness its power for smarter forecasting, anomaly detection, and resource optimization - while also navigating the risks of data exposure and algorithmic bias. This session will explore practical, real-world applications of AI tools that can enhance budget planning and financial oversight. Attendees will walk away with a clearer understanding of how to responsibly integrate AI into their workflows, and how to evaluate tools for transparency, security, and ethical use. The People Problem + Social EngineeringSocial engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks - and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat. |
12:10 pm Eastern |
Lunch |
1:10 pm Eastern |
General Session |
1:40 pm Eastern |
General Session |
2:00 pm Eastern |
Closing Refreshments |
2:30 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
500 S Salisbury St
Raleigh, NC 27601
(919) 996-8500
Zachary Thorn
Sr National Conference Director
Government Technology
Open to Public Sector only.
Registration - Free
If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Need help registering, or have general event questions? Contact:
Sherri Tidwell
Government Technology
A division of e.Republic
Phone: (916) 932-1382
E-mail: stidwell@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com