25.12.6
This website uses cookies to ensure you get the best experience on our website. Learn more

CyberSmart 2025: From A to Z

The cyber world is becoming increasingly complex as new technologies, policies and expectations come into play. Artificial intelligence (AI) is making inroads into applications, network management, and more, while identity management and zero trust architectures are altering the threat landscape. Agencies are embracing the many varied cloud deployments, such as multi-cloud, hybrid, private, etc.

All new technologies introduce new elements of risk, even if they also can be used to mitigate that risk. Incorporating AI includes those two aspects, for instance – creating new dangers and preventing them – but emphasis can and should be placed on the safety side of that equation. Similarly, zero trust (ZT) architectures are increasingly important as a foundation for cybersecurity, but they also require a rethinking around identity, credential and access management (ICAM) since identity can be fluid.

Issued on

May 2, 2025

Expires on

Does not expire