Carahsoft hosted a variety of informative briefings at 2022 SOFIC sponsored by our valued technology partners. If you weren't able to join them onsite, catch up on what you missed with the recordings and presentations below. 
 
The Future of Cyber Warfare 
 

The future of cyber warfare will run at machine speed, algorithm vs. algorithm, with humans by exception. Learn how a single AI-powered tool (NodeZero) took only 7 minutes 19 seconds to compromise a large financial institution. No humans were involved. No custom scripts were written. This was a successful algorithmic cyberattack that leveraged the same tactics as ransomware agents and other emerging threats.

Hear from Snehal Antani, CEO and Co-founder of Horizon3.ai, as he presents The Future of Cyber Warfare: the evolution of attack. During this session, you will learn how:
  • Attackers don’t “hack in,” they log in
  • Autonomous ai-driven pentesting continuously identifies possible attack paths and ineffective security controls to ensure your limited resources are spent fixing problems that can actually be exploited
  • Continuous attack paired with continuous defense, executes an integrated learning loop that gets smarter with every interaction
CEO & Co-founder
Horizon3.ai
 
Horizon3.ai’s Autonomous Pentesting-as-a-Service (APTaaS) lets you see your network through the eyes of an attacker to help find, fix, and verify exploitable vulnerabilities before attackers do. This self-service SaaS offering is safe to run in production, available on-demand, and requires no persistent or credentialed agents. Not just a compliance checkbox; this is effective security.
Brought to you by Horizon3.ai
Consumable AI/ML for Open Source Exploitation
 

Watch this session to learn more on the following:

  • Automatic prioritization of targets in large networks using Machine Learning
  • Automated collation of entities from text and images using Artificial Intelligence
  • Single-button Augmented Intelligence for detecting unique attributes of entities and patterns in data
Brought to you by Tableau
 
Principal Solutions Engineer
 Tableau
 
Forescout and Zscaler Lunch and Learn 
 

Forescout and Zscaler help enable Enterprise-Wide Zero Trust Architectures (ZTA). Implementing Zero Trust doesn’t stop at the data center, identity, or safeguarding legacy applications. ZTA is about securing everything, everywhere. 

Forescout and Zscaler:

  • Help you adopt a NIST 800-207-based ZTA based on best practices, from identifying, continuously monitoring, and controlling connected assets to orchestrating security across your enterprise. 
  • Support the EO for Zero Trust establishing a maturity framework that takes you from a ‘traditional’ to an ‘optimal’ state of maturity for any organization. 
  • Allow for the adoption and enforcement of ZTA based on your specific organizational needs, with the flexibility and scalability needed in an ever-changing digital landscape.
DoD Systems Engineer
Forescout 
 
Federal Solutions Architect
Zscaler
Sr. DoD Systems Engineer
Forescout 
 
Brought to you by 
Forescout
 
Mission Readiness:
Utilizing Data Analytics to Increase Readiness
 

Tableau’s data visualization technology will help the special operations forces to combine data from multiple systems to create a single pane of glass to provide a consistent view of operational readiness. Watch this session to learn more on the following:

  1. Transportation Maintenance Readiness
  2. Mission Support
    • TPFDD
    • GPS Spoofing Analysis
    • Certification Readiness
3. Personnel
  • Human Optimization
  • Reserve Eligibility
  • Civilian Workforce At Risk Attrition
Brought to you by Tableau 
 
 
Director, 
Customer Solution Architects
Tableau
 
Zero Trust Tech Talk
 

Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S. Department of Defense (DoD) to expand cybersecurity across its global enterprise as the initial phase of a multi-million dollar contract award through 2020.

Brought to you by    Forescout
 
Unlocking Data to Drive Smarter and Safer Weapons
 

Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn’t you have at least the same observability into a $100M weapon system as you do for a $500 laptop?

Planes, tanks, and other weapon systems are composed of thousands of digital components, each emitting valuable data that can be collected and transformed into useful intelligence. In this presentation, learn how to enable crew, maintainer, and CPT observability of key weapon system cyber terrain.

Watch this session to learn:

  • What happens when organizations don’t have the right level of visibility into onboard operational technology networks
  • Why achieving observability into these networks is so difficult
  • Techniques for gaining proper visibility and observability into these systems
  • About use cases and case studies
Brought to you by 
 
CTO
Shift5
 
Senior Sales Engineer
Splunk
 
Google-Looker: Using Data to Build a Strategic Advantage
 

Information is power. Now more than ever, data is critical to enhancing military effectiveness. However, only data that is visible, accessible, understandable, linked, trustworthy, interoperable, and secure can power decision-making and information sharing, AI, and Department of Defense objectives. By leveraging data as a strategic operational asset, the DoD can build advantages on the battlefield, strengthen management, and power informed decisions at all echelons. 

By watching this session, you will receive an overview of Looker and see it in action. We demonstrate how to harness power from the exponentially increasing volumes of SOF data.

Looker is Google Cloud's enterprise platform for business intelligence, data applications, and embedded analytics. With Looker, organizations can deliver actionable insights and infuse data into mission workflows to provide a strategic advantage. Looker's modern platform was built to break down the siloed barriers caused by legacy tools. With Looker, the DoD can confidently supply secure, self-service data to the people who need it - whether that's via a dashboard, embedded within another application, or powering a mission workflow.

 Brought to you by      
 
Data Governance: 
Intelligence and Discovery Using MetaData in the SOF Community
 

You have your data cataloged, now what?

Improve data transparency and discoverability by establishing an enterprise-wide repository of assets, so every user can easily understand and discover data relevant to them. Follow along with the recorded session for topics related to:

  • Implementation guidance for a data intelligence platform
  • Fundamentals of connecting to source data for metadata collection
  • User search capabilities
  • How to gain visibility into mapping assets to data sharing agreements
 
 Brought to you by      
Principal Sales Engineer
Collibra
 
Sales Engineer
Collibra