Securing the Mission: AI, Zero Trust, and the Next Phase of Cyber Defense - Home
Register    ➤

Hero

Securing the Mission: AI, Zero Trust, and the Next Phase of Cyber Defense

Count Down

49 DAYS
17 HOURS
41 MINUTES
39 SECONDS
Start: Thursday, June 04 2 PM EDT
End: Thursday, June 04 3 PM EDT

Tune In Thursday, June 4 at 2pm EDT

Department leaders are navigating a critical shift in how trust is established and enforced across the enterprise. Initiatives like Comply-to-Connect (C2C) are bolstering identity verification, device visibility, and access control, accelerating the Department of War’s (DoW) transition to a Zero Trust architecture. Concurrently, artificial intelligence is transforming decision-making, risk identification, and mission execution. By integrating AI into cybersecurity operations, teams can enhance threat detection, streamline investigations, and automate responses, effectively managing complexity with greater speed and precision.

Despite these advancements, many public sector organizations still face a "cyber confidence gap"—characterized by limited visibility, resource constraints, and difficulties in interpreting actionable data. Compounded by a persistent workforce shortage, there is an urgent need for mission-ready talent, particularly veterans who possess experience in high-stakes, dynamic environments. The current opportunity lies in understanding these intersections: specifically, how AI can evolve C2C from a static compliance framework into a system of continuous, intelligent trust enforcement.

In this webcast, defense and technology leaders will explore the practical, mission-driven applications of AI across the DoW, with a focus on cybersecurity operations, workforce readiness, and organizational resilience. Speakers will discuss how initiatives like C2C are evolving from rigid access control policies into dynamic systems for managing trust across users, devices, and environments. The panel will examine how AI facilitates real-time decision-making—from detecting anomalous behavior to automating responses and mitigating alert fatigue.

Participants will explore strategies to bridge the cyber confidence gap by:

  • Improving visibility
  • Integrating cross-system data 
  • Leveraging AI-enabled tools for proactive threat intelligence

Finally, the discussion will address strengthening the cyber workforce—highlighting the vital role of veterans—and shifting from "best practices" to "best fit" strategies that tailor AI and automation to specific mission needs while maintaining rigorous security, governance, and accountability.

 

Promo Image

Speakers

Speaker

Mick Baccio

Global Security Advisor
Splunk
read more

Mick Baccio

Global Security Advisor

Splunk

Mick Baccio is a globally recognized security strategist with a career spanning offensive operations, threat intelligence, and national-level incident response. He currently advises organizations around the world through his role at Splunk. helping security leaders improve operations through data-informed approaches. Mick was the first Chief Information Security Officer for a U.S. presidential campaign (2020) and previously served in the Obama White House as the Chief of the Threat Intelligence Branch. Mick's work blends deep technical knowledge with a strong belief in team culture and institutional learning - bringing a unique perspective to the intersection of human and machine decision-making in security operations.
In his spare time, Mick is the THRUNT®️ Corp President, IANS Faculty, and a KC7 Foundation board member.