90-Day Threat Pulse Webinar: Evaluating the Cyber & Advanced Technology Threat Landscape

90-Day Threat Pulse Webinar: Evaluating the Cyber & Advanced Technology Threat Landscape

Thursday, April 3, 2025 (2:00 PM - 3:30 PM) (EDT)

Description

We at Homeland Security Today have once again reached out to our Editorial Board, columnists, and community of subject-matter experts to ask for their assessment of the threats facing the nation in 2025. As our readers know, our experts come from a unique cadre with practical experience who have devoted their careers to defending and protecting America. In this three-part series, we share their assessments of the risks and vulnerabilities that should be at the forefront of our community.

This webinar is from Law Enforcement and Homeland Security Professionals only. 


Join us for a webinar dissecting the identified terrorist threat trends from our contributors Takeaways from the threat forecast include:

  1. State-Sponsored Cyber Attacks: Nations like China and Russia are conducting sophisticated cyber campaigns targeting U.S. critical infrastructure, including power grids and communication networks.

  2. Ransomware 3.0: This evolution of ransomware employs multifaceted extortion techniques, such as encrypting data, threatening to leak sensitive information, and disrupting operations, affecting both public and private sectors.

  3. Artificial Intelligence (AI) Exploitation: Adversaries are using AI to create convincing deepfakes, enhance phishing attacks, and automate malware development, increasing the sophistication and scale of cyber threats.

  4. Quantum Computing Threats: As quantum computing advances, there is a risk of adversaries decrypting sensitive data, prompting the need for quantum-resistant encryption methods.

  5. Supply Chain Vulnerabilities: Cybercriminals are exploiting weaknesses in third-party vendors to infiltrate organizations, leading to significant data breaches and operational disruptions.

  6. Internet of Things (IoT) Vulnerabilities: The proliferation of IoT devices has expanded the attack surface, with hackers targeting interconnected systems in sectors like healthcare, manufacturing, and smart cities.

  7. Unmanned Aerial Systems (UAS) Threats: The use of drones for surveillance and potential attacks on critical infrastructure poses new security challenges.

  8. Shadow AI Systems: Unauthorized or unmonitored AI tools within organizations can introduce vulnerabilities, as they may bypass established security frameworks and expose sensitive data.

  9. Cyber Crime-as-a-Service (CaaS): The availability of sophisticated cyber-attack tools and services for hire has lowered the barrier for less-skilled actors to execute complex cyber operations.

  10. Convergence of Physical and Digital Threats: The blending of cyber and physical attacks, such as cyber-induced power outages or drone-enabled data breaches, requires integrated security strategies.



Virtual

Zoom information will be sent out at 10 AM on the day of the webinar. Please reach out and check spam if you do not receive it. 

Event Contact
Kalyna White
(571) 318-7313
Send Email
Thursday, April 3, 2025 (2:00 PM - 3:30 PM) (EDT)
Registered Guests
3
Powered By GrowthZone