The age of AI is here, and North Carolina’s public sector is leaning in to lead with purpose. As leaders strive to unlock AI’s potential, they must also confront the growing need to secure critical infrastructure, protect sensitive data, and ensure ethical, transparent use of these emerging technologies. With cyber threats evolving just as rapidly as AI capabilities, today’s CIOs and agency leaders face a dual challenge: driving innovation while fortifying digital trust.
The North Carolina AI and Cybersecurity Symposium is an action-packed opportunity to engage with leaders at the forefront of AI adoption and cyber defense. From state agencies to local governments, to higher education, attendees will explore how AI and cybersecurity intersect to shape smarter, safer, and more resilient public services. Join us in a friendly, collaborative environment to share ideas, build partnerships, and gain insights from both peers and private sector trailblazers leading the way on AI and Cybersecurity.
Wednesday, December 3 |
|
8:00 am Eastern |
Registration and Morning RefreshmentsBallroom Lobby |
9:00 am Eastern |
WelcomeBallroom BTeena Piccione, Secretary and Chief Information Officer, Department of Information Technology, State of North Carolina I-Sah Hsieh, Deputy Secretary for AI & Policy, Department of Information Technology, State of North Carolina Bernice Russell-Bond, Chief Information Security Officer, Department of Information Technology, State of North Carolina |
9:30 am Eastern |
Keynote – AI, Cybersecurity, and Courageous Leadership — Thriving in the Age of Intelligent RiskBallroom BArtificial intelligence is reshaping our world at breathtaking speed, opening extraordinary opportunities while unlocking unprecedented risks. In this powerful and keynote, former White House CIO and bestselling author Theresa Payton cuts through the hype to reveal what AI means for you, your organization, and the people you serve. With real stories from the front lines of cybercrime and law enforcement, Theresa exposes how modern threat actors exploit AI, and how forward-thinking leaders can use those same tools to drive secure innovation. Learn the personal leadership lessons that carried her from working parent to the first woman to serve as White House CIO, and later to CEO and media contributor seen around the world. Her message is both practical and deeply human: you can innovate without compromising trust, take bold action without sacrificing security, and lead confidently even when the path ahead is uncertain. Theresa Payton, President/CEO of Fortalice Solutions and Former White House Chief Information Officer |
10:30 am Eastern |
Networking BreakBallroom A |
11:00 am Eastern |
Concurrent SessionsThe Evolution of Zero TrustMeeting Room 301BZero Trust is no longer just a framework - it’s a mindset. As AI reshapes the cybersecurity landscape, Zero Trust is evolving into a smarter, more adaptive model that continuously verifies identities, detects anomalies in real time, and strengthens resilience. This session will unpack how AI-driven Zero Trust is transforming security strategies and what leaders need to do to stay ahead. Moderator: Mike Long, Chief Information Security Officer, NC Department of Information Technology Shankar Chebrolu, President, CSA Triangle Phil Emer, VP of Business Development, MCNC Victor Tham, Chief Technologist, Cybersecurity, OpenText Smart Learning: Where Human Potential Meets AIMeeting Room 302BThe classroom of tomorrow won’t be defined by humans or machines alone, but by how they work together. From personalized tutoring powered by AI to real-time feedback that adapts to each learner, artificial intelligence is transforming how we teach, train, and grow talent. Yet the human element - creativity, empathy and critical thinking remain essential. This session explores what the future of learning looks like when humans and AI collaborate, highlighting opportunities for more inclusive, adaptive, and impactful education across the public sector. Moderator: Katina Blue, Associate Vice Chancellor and Chief Information Officer, UNC Pembroke Dr. Siobhan Day Grady, Associate Professor and Founding Director of IAIER, Library and Information Sciences, North Carolina Central University Dr. Jeffrey Merritt, Assistant Professor, Security and Computing , College of Arts & Sciences, Campbell University Dr. Mark Sorrells, President, Fayetteville Technical Community College Defending Critical Infrastructure: Securing the Systems That Keep Us RunningMeeting Room 302AFrom power grids and water systems to transportation networks and communications, critical infrastructure forms the backbone of our daily lives. Yet these essential services are increasingly under attack - targeted by nation-states, cybercriminals, and other malicious actors seeking disruption, ransom, or leverage. With the rise of AI-driven threats and the growing interconnection of operational technology and IT systems, the stakes have never been higher. Moderator: Zach Thorn, Senior National Conference Director, Government Technology Lisa Jones, Chief Information Security Officer, Wake County Marina Kelly, Chief Information Security Officer, City of Raleigh Dr. Amanda Parker, Department Chair, Security & Computing, College of Arts & Sciences, Campbell University Sam Brown, Critical Infrastructure Lead, Palo Alto Networks Governing AI: Policies, Guardrails, and Accountability in a Rapidly Evolving LandscapeMeeting Room 302CAs artificial intelligence continues to evolve at a rapid pace, organizations must establish strong governance frameworks to ensure responsible and effective deployment. Building on the morning’s foundational data discussion, this session will explore how different organizations are staying ahead of AI advancements by creating guardrails that promote transparency, accountability, and compliance. Learn how organizations are defining roles, implementing governance training, and developing policies that balance innovation with risk management. Moderator: Jordan Wilkins, National Conference Director, Government Technology Zerek D. Olson, Governance, Risk, and Information Privacy Officer, University of North Carolina Wilmington John Evans, Chief Technology Officer, State & Local Government, World Wide Technology Steven Tiell, Global Head of AI Governance Advisory, SAS |
12:00 pm Eastern |
LunchBallroom B |
1:00 pm Eastern |
General Session - Inside North Carolina’s AI Accelerator: Building a Framework for Responsible InnovationBallroom BEarlier this year, North Carolina launched its AI Accelerator—a first-of-its-kind statewide initiative designed to turn promising ideas into practical, responsible AI solutions for government. Guided by Executive Order No. 24 and the state’s new AI Leadership Council, the Accelerator helps agencies, universities, and private partners pilot AI use cases in a safe, transparent, and ethical environment. In this session, discover how the program is driving innovation while maintaining strong guardrails around privacy, security, and accountability. Learn how North Carolina is evaluating real-world use cases, establishing governance frameworks, and preparing its workforce to adopt AI confidently – setting a national example for how states can embrace artificial intelligence with trust and purpose. I-Sah Hsieh, Deputy Secretary for AI & Policy, Department of Information Technology, State of North Carolina |
1:30 pm Eastern |
General Session – Private AI: The Next Frontier for State and Local GovernmentBallroom BKonstantin Cvetanov, Sr. Manager- Global AI Factory Technical Sales and Strategy, NVIDIA Alex Fanous, Sr. Advanced Services Architect - Private AI, VMware by Broadcom |
1:50 pm Eastern |
Networking BreakBallroom A |
2:10 pm Eastern |
Concurrent SessionsCoexisting with Technology: Optimizing the Workforce for a New EraMeeting Room 301BEmerging technologies are transforming the public sector workforce by streamlining operations, enhancing decision-making, and redefining job roles. As government agencies adopt new tools and automation, the challenge lies in balancing technological innovation with workforce optimization. How can IT leaders ensure a smooth transition, empower employees with new skills, and foster effective collaboration? This session will delve into strategies for seamlessly integrating emerging technologies into government operations while cultivating a culture that is resilient. Moderator: Zach Thorn, Senior National Conference Director, Government Technology Jennifer Fix, Deputy Chief Information Security Officer, Department of Information Technology, State of North Carolina Robert Hiett, Executive Director, Upper Coastal Plain Council of Governments (UCPCOG), North Carolina Billy Whitehead, Smart City Program Manager, Town of Morrisville The Future of Identity Access ManagementMeeting Room 302BIdentity and Access Management (IAM) is no longer just about passwords and permissions—it’s becoming the frontline of cybersecurity in an AI-driven world. As threat actors harness AI to scale their attacks, agencies are responding with smarter, adaptive IAM strategies that leverage AI for continuous authentication, real-time risk detection, and seamless user experience. This session explores how the convergence of cybersecurity and artificial intelligence is reshaping IAM. Moderator: Debora Chance, State IT Business Continuity Management Program Manager, Enterprise Security & Risk Management Office, Department of Information Technology, State of North Carolina Brian Dickerson, Director of Identity Management and Converged Platforms, North Carolina Department of Information Technology Chris Morris, Chief Information Security Officer, Town of Chapel Hill Neal Gallucci, Sr Manager, Solution Consulting, Socure Ransomware in the Age of AIMeeting Room 302ARansomware has evolved from crude lockouts to highly targeted, business-crippling attacks - and now artificial intelligence is raising the stakes. As threat actors adopt AI to automate reconnaissance, craft convincing phishing lures, and accelerate encryption tactics, public sector organizations face a new level of risk. At the same time, defenders are leveraging AI for real-time threat detection, predictive analytics, and faster incident response. This session explores how ransomware is changing in the AI era, what this means for government cybersecurity strategies, and how agencies can harness AI’s power to stay one step ahead. Moderator: Dan Kempton, IT Enterprise Architecture Director, Department of Information Technology, State of North Carolina Crystal Pitts, Chief Information Security Officer, Department of Commerce, Division of Employment Security Al Roethlisberger, Chief Information Security Officer, Department of Transportation, State of North Carolina Jared Thomas, Chief Information Security Officer, Town of Cary The Privacy Imperative: Protecting Data and Building TrustMeeting Room 302CIn an era of increasing digital transformation, public sector organizations must navigate the complex landscape of privacy while maintaining transparency, ensuring compliance, and fostering public trust. With evolving regulations, growing cybersecurity threats, and the expanding use of AI and data-driven decision-making, safeguarding sensitive information is more critical than ever. This session will explore key privacy challenges in government, including data protection strategies, compliance with federal and state regulations and best practices for creating a “privacy-first” culture. Moderator: Hugh Harris, Chief General Counsel, NC Dept of Information Technology Zerek D. Olson, Governance, Risk, and Information Privacy Officer, University of North Carolina Wilmington Martha Wewer, Chief Privacy Officer, Department of Information Technology, State of North Carolina Reid Rose, VP for Data Platform, Public Market, IBM |
3:10 pm Eastern |
Networking BreakBallroom A |
3:30 pm Eastern |
General Session – Securing the Region: North Carolina’s Collaborative Approach to Threat IntelligenceBallroom BAs federal support for threat intelligence and information sharing declines, North Carolina’s cybersecurity community has stepped up. Leaders from local government have been working together to close the gap, forming a coalition designed to strengthen coordination, improve situational awareness, and share critical cyber insights in real time. This session explores the evolution of collaboration across North Carolina, reflecting a growing spirit of partnership, resilience, and shared commitment to strengthening and protecting local government’s digital infrastructure. Lisa Jones, Chief Information Security Officer, Wake County Marina Kelly, Chief Information Security Officer, City of Raliegh |
3:50 pm Eastern |
General Session - Modern, Secure, Accessible: Wake County’s Blueprint for Digital Government ExcellenceBallroom BWake County recently earned 1st place in the 2025 Government Experience Awards for its resident-first approach to digital innovation—anchored by a strong commitment to security, privacy, and public trust. This session explores how the county built a secure digital foundation that protects sensitive information while delivering modern, intuitive, and accessible services. While some security functions are where dreams go to die, Wake proactively engages departments to ensure that dreams don't become nightmares. And, through continuous user feedback, inclusive design standards, and creative storytelling tools like interactive “story maps,” Wake County has made government more transparent and engaging—without compromising protection. Moderator: Zach Thorn, Senior National Conference Director, Government Technology Lisa Jones, Chief Information Security Officer, Wake County Emily Lucas, Deputy County Manager, Wake County Sandra Oliver, Deputy Chief Information Officer, Wake County |
4:20 pm Eastern |
Networking ReceptionBallroom ANetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:00 pm Eastern |
End of Day One |
Thursday, December 4 |
|
8:00 am Eastern |
Registration and Morning RefreshmentsBallroom Lobby |
9:00 am Eastern |
WelcomeBallroom BTeena Piccione, Secretary and Chief Information Officer, Department of Information Technology, State of North Carolina |
9:10 am Eastern |
Keynote – Spy vs. AI: Defending Against Artificial Intelligence's Threats to Your Life, Loved Ones and LivelihoodBallroom BHave you heard of a deep fake? Would you or your family fall for one? Dive into the dynamic world of artificial intelligence and its intricate relationship with the insider threat landscape. As AI continues to reshape industries, it simultaneously introduces new dimensions of vulnerabilities within organizations that insiders can exploit. In this engaging and insightful keynote, we’ll explore the evolving threats of AI, from deepfakes to voice cloning, and how they can impact individuals, families, and businesses. With real-world examples and case studies, we'll break down the tactics malicious actors use and, more importantly, provide practical tips on how to protect yourself and your loved ones from these emerging dangers. By the end, you'll not only understand the risks but walk away empowered with actionable strategies to safeguard your digital lives in an increasingly AI-driven world. Shawnee Delaney, Founder and CEO, Vaillance Group |
10:10 am Eastern |
General Session – SecureNC – Autonomous IT for All!Ballroom BJoin us to explore how NCDIT and Tanium are transforming cybersecurity across the state. This session will highlight strategies for autonomous endpoint management, real-time risk visibility, and automated remediation that empower public sector organizations to reduce cyber risk and improve operational efficiency. Learn how this partnership drives business outcomes faster, strengthens compliance, and builds workforce capabilities to secure communities statewide. Bernice Russell-Bond, Chief Information Security Officer, Department of Information Technology, State of North Carolina James Thaxton, Director of Strategic Accounts, Tanium |
10:40 am Eastern |
Networking BreakBallroom A |
11:10 am Eastern |
Concurrent SessionsAsset Management in the Modern Era: Visibility, Value, and VigilanceMeeting Room 301BYou can’t secure or optimize what you can’t see. From laptops and servers to cloud resources, IoT devices, and shadow IT, the modern public-sector environment is overflowing with assets that demand oversight. Effective asset management is no longer just an IT housekeeping task - it’s a critical foundation for cybersecurity, compliance, cost control, and service delivery. This session explores how agencies can modernize their asset management practices to gain full visibility, track lifecycle value, and reduce risk. Moderator: Martha Wewer, Chief Privacy Officer, Department of Information Technology, State of North Carolina Todd Hamrick, Enterprise Architect, NC Dept of Information Technology Robert Reynolds, Chief Information Officer, Orange County Unlocking the Power of Agentic AI in GovernmentMeeting Room 302BArtificial intelligence is evolving from a supportive tool into an active collaborator. Agentic AI—systems capable of reasoning, planning, and taking initiative within defined boundaries—offers governments a chance to reimagine how work gets done. From automating routine tasks and coordinating workflows to surfacing insights for faster decision-making, agentic AI can help agencies boost efficiency, improve constituent services, and free up staff to focus on high-value priorities. This session will explore how public-sector organizations can harness agentic AI responsibly, highlight early use cases, and outline strategies for integrating these systems while maintaining transparency, security, and trust. Moderator: Arvind Wathore, Director, Solution Architecture, NC Dept of Information Technology Justin Sherwood, Chief Information Officer, Franklin County Mark Wittenburg, Chief Information Officer, City of Raleigh Cameron Groves, Director, Google Cloud AI for Budget Analysts: Smarter Forecasting, Safer DataMeeting Room 302AAs AI becomes more embedded in public sector operations, Budget Analysts have a unique opportunity to harness its power for smarter forecasting, anomaly detection, and resource optimization - while also navigating the risks of data exposure and algorithmic bias. This session will explore practical, real-world applications of AI tools that can enhance budget planning and financial oversight. Attendees will walk away with a clearer understanding of how to responsibly integrate AI into their workflows, and how to evaluate tools for transparency, security, and ethical use. Moderator: Glenn Poplawski, State Solutions Director, Department of Information Technology, State of North Carolina Vijay Ramanujam, Chief Information Officer, NC Department of Health and Human Services Ehren Whitmore, IT Finance and Operations Manager, Department of Health and Human Services, State of North Carolina Sarah Taylor, CPA, CMA, Chief Financial Officer, MCNC Harsha Musunuru, Managing Director, Deloitte The People Problem + Social EngineeringMeeting Room 302CSocial engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks - and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat. Moderator: Debora Chance, State IT Business Continuity Management Program Manager, Enterprise Security & Risk Management Office, Department of Information Technology, State of North Carolina Jennifer Fix, Deputy Chief Information Security Officer, Department of Information Technology, State of North Carolina Mike Ware, Chief Information Officer, Department of Transportation, State of North Carolina Helen Patton, Cybersecurity Executive Advisor, Cisco Systems |
12:10 pm Eastern |
LunchBallroom B |
1:10 pm Eastern |
General Session – Architecting Secure AI from the Ground UpBallroom BAI promises transformative capabilities, but without strong governance, innovation can quickly become a liability. Governance is not just policy—it’s the backbone of secure AI systems. This session explores how embedding governance principles into infrastructure design creates the guardrails necessary for safe, responsible, and scalable AI. We’ll discuss why security must start at the data layer, ensuring integrity, privacy, and compliance are built in—not bolted on. By aligning infrastructure strategy with governance-driven controls, agencies can confidently experiment and innovate without sacrificing trust or resilience. Secure-by-design systems enable limitless innovation with peace of mind, knowing every step forward is grounded in responsibility and security. Attendees will leave with practical insights into architecting environments where governance and security converge, enabling AI systems that are secure by design and ready for the future. Cecile Kellam, Senior Solutions Architect (AI), NetApp |
1:40 pm Eastern |
Closing Keynote - Why Do Security Pros and Teams Fail, and What Can You Do About It?Ballroom BWhy do cybersecurity and technology professionals and their teams fail? Drawing on years of experience as Michigan’s former CISO and enterprise level CIO, CTO, and CSO, Dan Lohrmann explores this question through surprising real-world stories and insights from leading award-winning government teams. While many believe the solution lies in more training, certifications, higher salaries, bigger budgets, better leadership skills, or stronger executive buy-in, Lohrmann reveals why even well-resourced teams can still fall short and what truly drives success. This keynote outlines seven ways to revitalize your role, your team, and your professional outlook, offering practical, actionable guidance along with interactive table discussions designed to help attendees personally apply the lessons learned. Dan Lohrman, Senior Fellow, Center for Digital Government |
2:40 pm Eastern |
Closing RefreshmentsBallroom A |
3:00 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
500 S Salisbury St
Raleigh, NC 27601
(919) 996-8500
Zachary Thorn
Sr National Conference Director
Government Technology
Open to Public Sector only.
Registration - Free
If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Need help registering, or have general event questions? Contact:
Sherri Tidwell
Government Technology
A division of e.Republic
Phone: (916) 932-1382
E-mail: stidwell@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com