Securing Operational Technology with Cyber-Informed Engineering

Cyber-Informed Engineering (CIE) is an initiative by Idaho National Laboratory with funding from the Department of Energy (DOE). The goal of CIE is to secure physical operations through the combination of cybersecurity and engineering approaches. Today, engineering mitigations are used from time to time to address cyber risks but are used neither universally nor systematically. CIE recognizes the importance and necessity of using both engineering tools and conventional cybersecurity designs to secure operational technology (OT) networks.

Protecting Critical Infrastructure

Access to OT information in IT networks, very often through PI servers, is essential to many kinds of business automation, such as automatically ordering spare parts or scheduling maintenance crews. However, because all modern automation involves computers, as businesses continue to automate processes more targets for cyberattacks are created. In addition, data in motion is the lifeblood of modern automation, but all cyber-sabotage attacks on OT systems are information, and every connection between systems and IT/OT networks is an opportunity for attacks to spread. Thus, the more automation is deployed, the more opportunities are created to attack the ever-increasing number of targets. Cybersecurity is an issue that becomes steadily more pressing as businesses automate.

The IT/OT boundary, where PI servers tend to be deployed, is very often a consequence boundary. Worst-case consequences on the OT network are very often dramatically different and more severe than consequences on IT networks. Worst-case business consequences often include expensive incident response costs, such as businesses having to buy identity fraud insurance for customers whose information was leaked into the Internet. On the other hand, worst-case consequences for OT networks in a power plant or a high-speed passenger rail switching system often include threats to worker and public safety, or to the availability of critical infrastructure services to the nation. When worst-case OT consequences are unacceptable, engineering-grade protections must be deployed at the IT/OT interface to prevent worst-case scenarios from being realized.

Waterfall Security OT and Cyber-Informed Engineering Blog Embedded Image 2024

Conventional OT Security Programs

Using exclusively IT style mitigations to protect critical OT networks is often not enough—when public safety or critical infrastructures are at risk, it is not enough to hope that cyberattacks can be detected before they compromise critical infrastructure. It is not enough to hope that if detected in time, an incident response team can be assembled fast enough to prevent consequences. Engineering-grade designs are expected to reliably perform critical physical operations within a specified threat environment until the next scheduled opportunity to upgrade defenses, with a large margin for error.

The Threat Landscape

Remote-controlled attacks are the modern attack pattern used by hacktivists, ransomware criminals and nation-states. Modern remote-controlled attacks use social media research and clever phishing emails to trick potential victims into revealing passwords or opening malicious attachments. Once remote attackers gain a foothold in their target network, they control the compromised machine remotely, using it to attack other machines through layers of firewalls, including the IT/OT firewalls deployed to send OT data into PI servers to enable IT/OT integration. Attackers then repeat, spreading further until they reach essential OT systems or valuable information that a business would be willing to pay to recover.

‘Living off the land’ is another type of remote-controlled attack seen recently. After gaining a foothold in an IT network, attackers erase all hint of their presence, including any malware that was used to gain their foothold. Eventually compromising the IT domain controller, attackers create their own remote access and credentials. These new accounts look like a normal employee logging in; no alarms are raised as the attackers use normal operating system tools in their attacks, making them extremely difficult to detect.

Unbreachable Protection with Unidirectional Gateways

In the face of sophisticated remote-control attacks, safe integration of critical OT networks with PI servers and other business automations must involve network engineering. The most common approach to network engineering is to protect the IT/OT consequence boundary with a Unidirectional Gateway. The gateways are a combination of hardware and software; the software makes copies of PI and other OT servers from OT networks, while the hardware allows information to travel in only one direction, from the OT network out to the IT network. The gateways move OT data out to where the enterprise can use it while preventing any remote-control attacks or attack information getting back through into the OT network. Even if a deceived insider carries a piece of malware into an OT network and inadvertently activates it, that malware cannot connect out to the Internet through the gateway, much less receive any attack commands from the Internet.

Increasingly, critical infrastructures are expected to have OT networks that operate reliably and independently of the IT network, even when the IT network is compromised. A Unidirectional Gateway provides OT data to PI servers and other business automation, with no ability for malware, remote-control commands or other attack information to penetrate the gateway into operations. By eliminating the risks associated with firewalls at the IT/OT consequence boundary, industrial enterprises can be confident of the integrity of their OT systems, even in the face of the most sophisticated of modern, network-based attacks.

As Cyber-Informed Engineering emerges as the most important change in OT security in a decade, Waterfall Security’s Unidirectional Security Gateways, certified to be truly unidirectional, are leading the world in safe IT/OT and OT/cloud integration, even in the face of the most sophisticated of cyber threats. Watch Waterfall’s webinar “Cyber-Informed Engineering for OT Security and AVEVA PI Users” (May 14, 2024) to see how Waterfall’s solutions enable safe IT/OT integration and protect safe and reliable physical operations, especially for AVEVA PI installations.

Enterprise Service Management in the Physical Realm: Understanding PPESM

Public sector organizations face a unique challenge: efficiently managing a vast array of property, plant, and equipment (PP&E) while adhering to strict regulations and budgetary constraints. Traditional methods, relying on siloed systems like spreadsheets and paper forms, create a tangled web of inefficiency. Here’s where Plant, Property & Equipment Service Management (PPESM) steps in, offering a modern, extensible solution for the entire asset lifecycle.

PPESM: A Real-World Example

Imagine a U.S. Navy shipyard bustling with activity. A complex web of stakeholders — the yard, contractors, the Navy, the ship’s crew, and various regulatory bodies — collaborate on critical repairs to ensure a ship’s timely return to service. Traditionally, this process has been plagued by paper forms, communication silos, and the high cost of mistakes. Let’s see how PPESM can revolutionize this environment.

PPESM replaces paper forms and carbon copies with a centralized digital platform. Work requests, inspections, condition found reports, and corrective actions are all electronically submitted and tracked, ensuring real-time visibility. Automated workflows keep everyone informed and expedite the repair process, and digital forms with pre-populated fields and data validation minimize the potential for errors and rework.

But there’s more. Plant, Property & Equipment Service Management goes beyond process improvements; it delivers tangible business and strategic results with on-time availability completion, continuous yard improvement, and increased stakeholder satisfaction.

How PPESM works

PPESM: A Holistic Approach to Asset Management

PPESM builds upon the foundation of Enterprise Service Management (ESM), extending its capabilities to address the specific needs of PP&E.  Imagine a single, user-friendly system that seamlessly tracks assets from acquisition request to decommissioning. PPESM delivers this vision, empowering government agencies with:

Centralized Asset Register: Consolidate data from disparate sources into a central repository, providing a clear view of all assets, their locations, specifications, and maintenance history.

Streamlined Acquisition Process: Manage acquisition requests electronically, eliminating paper trails and streamlining approvals.

Automated Workflows: Automate routine tasks like scheduling preventive maintenance, generating work orders, and sending notifications for certification renewals.

Mobile Functionality: Empower field service technicians with mobile access to asset data, work orders, and service manuals, allowing for real-time updates and improved efficiency.

Enhanced Reporting and Analytics: Gain valuable insights into asset health, utilization rates, and maintenance costs. Use this data to optimize resource allocation and make data-driven decisions.

How PPESM Bolsters Security and Compliance

PPESM strengthens your organization’s security posture by centralizing asset data and access controls. User permissions can be tailored to specific roles, minimizing unauthorized access to sensitive information. Additionally, by automating document management and streamlining compliance workflows, PPESM ensures critical certifications and approvals are never missed, reducing the risk of being out of compliance and operational disruptions. This centralized, auditable system provides a clear picture of your assets and compliance activities, fostering transparency and accountability.

Addressing the Challenges of Smaller Asset Pools

PPESM offers particular benefits for organizations with smaller asset pools (under a few hundred). These agencies often struggle with inefficient ad-hoc methods. PPESM provides:

Reduced Breakdowns: Preventative maintenance becomes a breeze with automated scheduling and reminders. Early detection of issues minimizes equipment failures and extends lifespans.

Compliance Made Easy: Never miss a certification deadline again. PPESM tracks upcoming renewals and simplifies document management, ensuring smooth compliance audits.

Optimized Scheduling: Eliminate scheduling conflicts with a centralized, accessible system. Prioritize critical projects with ease and improve overall operational efficiency.

Faster Approvals: Mobile access and electronic workflows expedite the approval process for maintenance requests, ensuring timely repairs and minimizing downtime.

Beyond Efficiency: The Power of PPESM

PPESM goes beyond streamlining processes. It empowers government agencies to:

Reduce Costs: Minimize breakdowns, optimize resource allocation, and decrease administrative burdens, leading to significant cost savings.

Improve Service Delivery: Faster response times, efficient maintenance scheduling, and readily available asset information enhance service delivery to citizens.

Increase Transparency: A centralized system fosters accountability and improves visibility into asset management practices.

Enhanced Decision-Making: Data-driven insights empower informed decisions about asset acquisition, maintenance, and eventual decommissioning.

A User-Centered Approach

Traditional PP&E management systems often suffer from poor usability and accessibility, hindering user adoption and data accuracy. PPESM prioritizes a user-friendly experience with:

Intuitive Interface: A modern, easy-to-navigate interface ensures user acceptance and facilitates quick adoption across departments.

Mobile Accessibility: Empower staff with on-the-go access to information and tools, fostering real-time updates and improving field service effectiveness.

Offline Functionality: Ensure uninterrupted operations even in areas with limited connectivity.

The Key to Streamlined Operations, Cost Savings & Better Decision Making

PPESM is not just a software solution; it’s a catalyst for the transformation of PP&E management. By leveraging a centralized, user-friendly system with automated workflows and mobile accessibility, PPESM empowers agencies to streamline processes, optimize resource allocation, and ensure regulatory compliance. This holistic approach ultimately translates to improved service delivery, increased cost savings, and better decision-making. As your agency strives for operational excellence, consider PPESM as the key to unlocking a future of efficient and effective asset management.

Schedule a demo with our Atlassian team to learn how you can equip your organization with service management solutions.

Elevating State and Local Government Services in California Through Transformative Technology

State and Local Government agencies are constantly seeking ways to improve their services and processes to better serve their constituents and must embrace new technologies, prioritize cybersecurity and ensure data privacy to achieve this goal. These important topics were discussed by Government IT and industry leaders at the Carahsoft Digital Transformation Roadshow in San Jose, California. Speakers covered how to implement emerging technologies, enhance customer experience and protect constituents’ privacy and security through innovation, artificial intelligence (AI), cybersecurity and data privacy solutions.

Innovating Service Delivery to Constituents

Using advanced technologies can significantly elevate service delivery to constituents in several ways. Firstly, it can enhance the speed and efficiency of Government services, allowing constituents to access information and services more quickly and easily. Secondly, advanced technologies improve the accuracy and quality of Government services through data analytics that help identify patterns and trends, reduce errors and improve outcomes. Finally, advanced technologies increase transparency and accountability, allowing constituents to track the progress of their requests and hold agencies accountable for their actions.  

State and Local agencies are often faced with a lack of resources, making it imperative to leverage new technologies and processes to save time and money. The updated systems must also be secured to protect their constituents’ data which requires significant planning, resources and collaboration to achieve successful implementation. Additionally, agencies must ensure that any changes they make comply with legal and regulatory requirements, such as data privacy laws and accessibility standards.

State and Local Government Roadshow Series California Blog Embedded Image 2024

AI solutions are just one of the successful implementations that has enabled agencies to streamline processes and upgrade service offerings to constituents. The adoption of innovative technologies has facilitated faster and more efficient interactions with constituents, leading to improved customer service and satisfaction. The integration of AI technology for real-time data analysis has also empowered agencies to make informed decisions and respond promptly to community needs.

Assessing the Impact of AI

Generative AI is a type of AI that can create new content, such as images, videos and text based on data it has compiled. By studying generative AI, State and Local agencies can develop policies and guidelines for the responsible use of this technology, including measures to prevent the creation and dissemination of harmful or misleading content.

Additionally, studying generative AI helps Government agencies identify potential applications for this technology that can benefit society, such as creating realistic simulations for training purposes or prompting new scientific discoveries. By understanding the potential benefits and risks of generative AI, agencies can make informed decisions about incorporating this technology in their operations.

If leveraged for services and processes, AI could provide many benefits to State and Local agencies through several means:

  • Chatbots and Virtual Assistants: handle citizen inquiries, provide information about Government services and assist with simple transactions.
  • Data Analysis and Predictive Modeling: analyze large volumes of data to identify patterns and trends, enabling State and Local agencies to make data-driven decisions in areas such as public safety, resource allocation and urban planning.
  • Automation of Routine Tasks: automate repetitive and time-consuming data entry and document processing, freeing up employees to focus on more complex and high-value activities.
  • Fraud Detection and Prevention: detect and prevent fraudulent activities, such as tax evasion and benefit fraud, thereby safeguarding Government resources and taxpayer funds.
  • Accessibility and Inclusivity: improve accessibility for individuals with disabilities by providing speech-to-text and text-to-speech capabilities, as well as other assistive technologies.

Cybersecurity and the Current Threat Landscape

State and Local Government agencies play a crucial role in national security, and their systems and data must be protected to prevent potential vulnerabilities that could be exploited by malicious actors. The current threat landscape includes sophisticated cyber threats such as ransomware, phishing attacks and advanced persistent threats. Robust cybersecurity measures are necessary to defend against these evolving threats and prevent disruptions to Government services.

Sensitive citizen data, including personal, financial and health information is often handled by State and Local agencies. Therefore, it is important for agencies to maintain strong cybersecurity and data privacy to uphold the public’s trust and confidence. By adhering to data protection regulations and compliance requirements, such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR), agencies can preserve the integrity of Government operations.

Several agencies have successfully implemented cybersecurity and data privacy measures:

  • Multi-Factor Authentication (MFA) to strengthen access controls and protect sensitive systems and data from unauthorized access.
  • Data encryption to protect sensitive information both at rest and in transit.
  • Incident response planning to effectively address and mitigate cybersecurity incidents.
  • Compliance with data protection regulations such as HIPAA, GDPR and the Payment Card Industry Data Security Standard (PCI DSS).
  • Cybersecurity training and awareness programs to educate employees about cybersecurity best practices, phishing awareness and the importance of data privacy.
  • Collaboration and information sharing with other agencies, law enforcement and cybersecurity organizations to stay informed about emerging threats and best practices in cybersecurity.

The path to elevating State and Local Government services requires a strategic incorporation of transformative technologies, notably AI, cybersecurity and data privacy. Leveraging advanced technologies can enhance interactions with constituents, fostering efficiency and transparency. Amidst resource constraints, agencies must implement AI solutions while also prioritizing robust cybersecurity measures. Agencies must navigate digital transformation with responsibility, ensuring the delivery of efficient, secure and privacy-focused services, thereby forging a future where technology elevates governance while upholding public trust.

Explore more resources and learn more about Carahsoft’s State and Local Roadshow Series: Digital Transformation by visiting our Roadshow portfolio.

EdTech Talks: A Comprehensive Look at Security in Education for Safe Learning Environments

Emerging technologies today are providing K-12 schools and higher education institutions with the capabilities to support seamless and secure campus efforts, which ensures protection of academic environments as well as students, faculty and staff. Remaining vigilant, versatile and adaptable in the current education landscape, especially when it comes to security and student safety, are the most important considerations for education leadership when deciding what new solutions and integrations to incorporate into their schools.

Carahsoft’s annual EdTech Talks Summit brought together industry and education thought leaders to explore three tactical learning tracks: safety for the learning environment, the impact of technology on student growth and development, and modernizing education with artificial intelligence (AI) and machine learning. During the first day’s discussion, speakers provided insights into building safe learning settings with a comprehensive look at both cyber and physical security in education.

Analyzing Current Security Risks

Carahsoft EdTech Talks Summit Blog Series-Part 1 Security and Safety Blog Embedded Image 2024Education institutions face a myriad of cybersecurity challenges such as ransomware, third-party access to school systems, internal bad actors and stolen credentials. One of the most impactful vulnerabilities is a lack of awareness across school communities regarding security. For example, individuals who are unable to recognize a phishing text message that asks the receiver to click on an unsafe link because an account has been frozen may potentially put their own data and their school’s data at risk of exposure.

While cybersecurity is one of the most important aspects of cultivating a successful learning environment, it is just as important to consider physical security for a safe learning environment. Building and campus surveillance, visitor management monitoring, lock down and fire drills, active shooter and crisis management are among some of the ways schools provide personal security for students and staff. With so many aspects of security to manage, schools also must balance being open, inclusive and engaging with communities and culture to provide more expansive learning opportunities while simultaneously protecting against threats on limited budgets.

Protecting Against Cyber Threats in the Modern World

For improved security, educators and industry leaders must collaborate to take proactive measures to safeguard digital infrastructure, data and physical campuses. The best place to start is by ensuring the fundamental standards of cyber defense are in place, functioning properly and are continuously monitored and modernized. This includes solutions and processes such as:

  • Utilizing multi-factor authentication (MFA) whenever possible
  • Email and phishing security to avoid ransomware
  • Maintaining a high standard of digital hygiene through services such as patching and vulnerability management
  • Creating robust and resilient backup strategies for all data at endpoints and in the cloud
  • Performing recovery testing to ensure backups and other operations are working accordingly
  • Providing resources and trainings to engage with school communities to raise awareness of ways students and teachers can defend themselves against physical and cybersecurity threats
  • Implementing a “see something, say something” mentality across school communities to ensure all potential risks are reported and mitigated
  • Hiring IT staff and educators who are passionate about the security and safety mission set forth by an institution and allow them to provide new ideas and innovation
  • Investing in quality cyber insurance to protect institutions against setback from a ransomware attack
  • Conducting frequent audits to ensure school’s systems are compliant with the latest policy requirements and standards in the case a claim must be made

Security Implementation for Institutions

Industry and education experts alike understand the importance of providing a safe space for all students, whether inside schools or online, and continuously aim to make sure their experience is as productive and valuable as possible. Particularly within higher education, many universities and colleges have individual point solutions that they have integrated into their systems to solve very specific problems, creating a disconnected mixture of security infrastructure. Security must be designed with students in mind and a way that provides optimal learning, collaboration and inclusion—technology can help achieve this imperative goal.

As Government and education sectors continue to move toward cloud environments, managing a multitude of products and solutions can become cumbersome and difficult to regulate security. To combat this, consolidation of products to create increased visibility, automation and agility are key for transforming a current infrastructure to be more successful and produce actionable insights.

Visit the EdTech Talks Conference Resource Center to view panel discussions and other innovative insights surrounding security, AI and student success from Carahsoft and our partners.

 

About Carahsoft in the Education Market  

Carahsoft Technology Corp. is The Trusted Education IT Solutions Provider™.  

Together with our technology manufacturers and reseller partners, we are committed to providing IT products, services and training to support Education organizations.  

Carahsoft is a leading IT distributor and top-performing E&I Cooperative Services, Golden State Technology Solutions, Internet2, NJSBA, OMNIA Partners and The Quilt contract holder, enhancing student learning and enabling faculty to meet the needs of Higher Education institutions.  

To Learn more about Carahsoft’s Education Solutions, please visit us at http://www.carahsoft.com/education

To learn more about Carahsoft’s Cybersecurity Solutions please, visit us at https://www.carahsoft.com/solve/cybersecurity

EdTech Talks: Modernizing Education with Artificial Intelligence and Machine Learning

Schools must embrace change alongside their growing generations to equip students for the future. Artificial intelligence (AI) and machine learning (ML) are two evolving, expansive technologies that are creating a monumental impact in the private and Public Sector, with education institutions being no exception. At Carahsoft’s annual EdTech Talks Summit, education leaders explored how AI and ML are changing the way teachers instruct, the way students learn and the way administrators approach technology in schools.

As a baseline, when considering AI for K-12 and higher education, administrators should follow several guiding principles for responsible and trustworthy use of AI.

  • Human-centricity: Promote human well-being, individuality and equity
  • Inclusivity: Ensure accessibility and diverse perspectives
  • Accountability: Proactively identify and mitigate adverse impacts
  • Transparency: Instruct students and teachers on proper usage, including potential risks and how decisions are made
  • Robustness: Operate reliably and safely while enabling mechanisms that assess and manage potential risks
  • Privacy and security: Respect the privacy of data subjects

Generative AI in Education

Carahsoft EdTech Talks Summit Blog Series-Part 3 Artificial Intelligence and Machine Learning Blog Embedded Image 2024Generative AI is still fairly new to the education space and educators are on both sides of the spectrum of acceptance—some prefer to erase it from their schools while others are open to embracing the up-and-coming technology for use cases not only in the classroom, but also to prepare students for the future workforce.

For example, one of the first technologies educators may be inclined to use when adopting AI in the classroom is detection tools. Dr. Anand Rao, Professor of Communications Chair of the Department of Communications and Digital Studies at the University of Mary Washington in Virginia recommends against this technology implementation because it could negatively affect vulnerable students. AI detection is not 100% correct in every instance. For some students, English may not be their first language and a detection tool could potentially identify their work as AI generated because it may be more formulaic. While detection tools can be utilized in a positive way to ensure honesty is upheld within students’ work, teachers and professors should use their discretion to determine the results of detection tools.

AI literacy is one of the most important principles for instructors to explore, deliberate and establish guidelines for. Since generative AI platforms such as ChatGPT and other tools like detection programs are still modernizing, students and faculty should go through a test period to learn how they work and understand whether they are comfortable utilizing them. As a next step, IT teams must be prepared to begin implementation and consider cybersecurity in that process.

Analytics and Data in AI

Education data grows exponentially with each new school year; however, collecting, evaluating and taking action based on the insights of that data is a long yet vital process. Instructors and administrators must leverage platforms that can help automate and analyze new and archived data to make the most informed decisions for their schools using the AI analytics lifecycle. This includes managing data efficiently, interpreting observations made about data and finally, creating a plan to incorporate constructive action to address needs discovered via the data. Using this strategy, schools can be better prepared to tackle real world questions and scenarios and provide students and teachers with the tools and processes they need to be successful.

This year’s EdTech Talks Summit event aimed to educate academic IT decision makers and end users about the current challenges and solutions surrounding student growth and development, security, AI and ML and cost-saving, modernization benefits of today’s leading EdTech solutions. The Education sector faces new challenges every school year, and it is imperative now more than ever that the IT industry and Government work together to provide the most safe and successful learning environments for all students.

Visit the EdTech Talks Conference Resource Center to view panel discussions and other innovative insights surrounding security, AI and student success from Carahsoft and our partners.

 

About Carahsoft in the Education Market  

Carahsoft Technology Corp. is The Trusted Education IT Solutions Provider™.  

Together with our technology manufacturers and reseller partners, we are committed to providing IT products, services and training to support Education organizations.  

Carahsoft is a leading IT distributor and top-performing E&I Cooperative Services, Golden State Technology Solutions, Internet2, NJSBA, OMNIA Partners and The Quilt contract holder, enhancing student learning and enabling faculty to meet the needs of Higher Education institutions.  

To Learn more about Carahsoft’s Education Solutions, please visit us at http://www.carahsoft.com/education

To learn more about Carahsoft’s AI Solutions, please visit us at https://www.carahsoft.com/solve/ai-machine-learning

The Evolution of Technology in the Defense Industry at DoDIIS

Innovation in Government benefits the changing and growing needs of the nation, and the Department of Defense (DoD) leads the way in both innovation and security. The Department of Defense Intelligence Information System (DoDIIS) is a conference for the nation’s top military and technology specialists to share insights revolving around the show’s theme – ‘Chaos to Clarity: Leveraging Emerging Technologies.’ Fed Gov Today joined Carahsoft on the show floor to discuss IT and OT updates, artificial intelligence (AI) and machine learning (ML) and priority technology updates with military thought leaders.

Departmental Shift to Information Technology

Carahsoft DoDIIS Defense Recap Blog 2023 Embedded Image 2024The DoD aims to refresh technology and standardize user experience across the department as a response to employee feedback. These standards are partially inspired by Zero Trust models and codifying existing standards. Through the implementation of office management and hiring defense digital service experts, agencies will update hardware and endpoints, refresh outdated technology and enhance overall IT capabilities. Executing these standards will require time and financial resources, and to properly utilize all acquired resources, a new generation of industry professionals will need to be onboarded. By building off effective processes from previous initiatives and hiring new talent that is optimally suited for these processes, the department can make strides in software such as cloud computing, generative AI and Zero Trust. The introduction of the Joint Operational Edge Cloud (JOEC) is also critical in accelerating cloud computing for combat tactical edge usage during the interim shifts in technology. At record speeds, the DoD must move from hardware defined enterprise towards modifying software.

AI Evolution

While AI is in its infancy, prototypes show a promising and interesting future where machines are trained to complete work. With more than 1,200 AI applications across civilian agencies, and various similarities and differences in the way AI is used by Government and commercial agencies, there is a lot the Federal sphere can learn from commercial agencies. In the private sector, companies tend to build back-end architecture for AI, providing fast access to all data. The Federal Government can optimize this plan by automating AI/ML to gain tactical advantage against machine adversaries. AI can also aid in predicting component failure. This helps agencies get hardware and software back on track as soon as possible, as well as help with mission planning. The private sector offers a myriad of ideas the Government can leverage for efficiency, such as AI in healthcare, sustainable energy and creative component and finance management.

DIA Initiatives

The Defense Intelligence Agency (DIA), a service provider on behalf of the defense industry, has a comprehensive IT strategy made up of five key priorities:

  1. Among both classified and unclassified networks, the DoD should implement top secret connection.
  2. With the transition to working from home, employers must enable workplace inclusivity through technology, especially for employees with disabilities.
  3. Enable workers to access data applications from one fully integrated place by consolidating network systems, such as desktop environments.
  4. As internally shared information becomes more complex, the DIA must update technology to strengthen intelligence sharing.
  5. Authorize worldwide connectivity for the Joint Worldwide Intelligence Communications System (JWICS), the DoD’s house for sensitive information. This means a reliable and secure connection regardless of environment and its proximity to data centers.

By maintaining pace with world class technology such as the cloud and AI, the DoD will lead the nation in secure communication and strategies.

Check our more resources, interviews and highlights from the event floor at DoDIIS at FedGovToday.com.

Applications of Technology in Higher Education at EDUCAUSE

Technology advancement has resulted in many potential usages for university students and faculty, educational and research institutions and Government agencies. For agencies focused on higher education, taking advantage of new technology can help bolster security and ease student and faculty daily procedures. Industry and education experts joined together at the EDUCAUSE Annual Conference for an immersive experience that facilitated collaboration and discussion to promote the advancement of higher education by using information technology (IT).

Leveraging Security Technology Against Ransomware

With the increasing technology usage in everyday life, many higher education agencies are susceptible to cybersecurity threats like ransomware. The education sector is no exception, with attacks ranging from exploited vulnerabilities, to compromised credentials, malicious emails, phishing attempts, brute force attacks and malicious downloads. As ransomware comes with financial loss, it is important for higher education agencies to invest accordingly in cybersecurity. According to industry statistics, 70% of organizations have successfully recovered data using backup mechanisms. This data recovery is not only much simpler than paying the ransom, but it also removed the attack incentive since paying the ransom encourages bad actors to continue attacks. Higher education institutions own and maintain a significant amount of intellectual property as a source of data wealth and research. To protect this information and ensure the safety and financial success of educational institutions, higher education must focus on creating backups and position IT security staff as trusted advisors, fortify their cybersecurity infrastructure and foster a vigilant culture amongst students and faculty.

Digital Services in Education

Carahsoft EDUCAUSE Recap 2023 Blog Embedded Image 2024With a strong cybersecurity base, universities can reap the benefits of both external and internal digital services. External market data can be used to predict internal performance. Data can help define popular markets, from student demand for majors, future employment opportunities and university competitor information. Educational institutions can utilize technology to analyze data and make millions of calculations in a minimal amount of time. With these predictive analytics, education administrations can make informed decisions when forecasting program sizes, enrollment numbers, scholarships and revenue margins.

Universities can utilize digital applications to offer user-friendly functions to support faculty and students with daily tasks such as helping locate class schedules, campus maps, facility wait times, task notifications and other essential remedies for success. Digital applications with collaboration tools and platforms can connect peers and faculty members in a simple and pragmatic way, facilitating communication on projects and learning objectives. On the administrative side, digital services can reduce time spent by automating functions such as credit transfers and transcript evaluations. Institutions can also utilize digital applications to offer automated aid for student requested services, which reduces call center wait times, manual processing errors and delayed accommodations.

The Varied Applications of AI

In the educational space, AI has a multitude of use cases:

  • AI can detect cyber threats and vulnerabilities, thus protecting student, faculty and stakeholder sensitive information.
  • By facilitating the automation of routine security tasks, patches and system updates, AI can free up more time for cybersecurity professionals to focus on more complex initiatives, thus creating a more robust security infrastructure.
  • Schools can utilize AI’s advanced authentication mechanism to prevent unauthorized access to sensitive data and provide seamless account access for students, faculty and staff.
  • Institutions are currently using AI to understand the best methods for student retention, a common concern in higher education. Methods such as text-based chat apps are designed to send encouraging messages, tutoring or counseling to students who have been identified as needing additional resources. Text applications can also be used to connect students to enrollment services, tutoring or counseling.
  • AI’s use of data analytics can facilitate customized learning experiences based on each student’s strengths, weaknesses and learning pace. This includes tailored content, question and answer chatbots and virtual assistants.
  • Adaptive learning platforms powered by AI can assess individual student performance and deliver tailored content, allowing students to grasp complex concepts at their own pace. This personalized approach enhances student engagement and motivation, ultimately leading to improved academic outcomes.

Since AI will always contain human bias, it is important to apply AI as an additional tool, and not a standalone operation. In maintaining the priority for equality and privacy in the educational sphere, each individual institution must find where AI best fits into their respective organization.

Technology can be utilized to enhance cybersecurity infrastructure, detect compromised systems, analyze data to improve common educational institution functions and improve student performance and morale. By partnering with the IT industry, higher education institutions can posture students and faculty to lead the way to success for the next generation of learners.

To learn more about utilizing IT for education initiatives, view Carahsoft’s Education Technology Solutions Resources.

 

About Carahsoft in the Education Market 

Carahsoft Technology Corp. is The Trusted Education IT Solutions Provider™. 

Together with our technology manufacturers and reseller partners, we are committed to providing IT products, services and training to support Education organizations. 

Carahsoft is a leading IT distributor and top-performing E&I Cooperative Services, Golden State Technology Solutions, Internet2, NJSBA, OMNIA Partners and The Quilt contract holder, enhancing student learning and enabling faculty to meet the needs of Higher Education institutions. 

Learn more at http://www.carahsoft.com/education

5 Ways to Protect Your Organization from a Cyberattack in 2024

As we say goodbye to 2023, we need to prepare to say hello to new cybersecurity threats in 2024. The Department of Homeland Security is already there, having published its annual Homeland Threat Assessment, which predicts “more evasive cyberattacks” thanks to cyber actors using artificial intelligence (AI) and other modern technologies to circumvent company defenses.

Protecting your organization will require a sound strategy that wards off threats and takes the fight to the attackers. Here are five best practices to help you do both.

1. Develop a playbook of response strategies and tactics

Your playbook should include detailed instructions on how to handle a cybersecurity incident, from start to finish, and who’s responsible for what. Key components of a cybersecurity playbook include:

  • Descriptions of potential attack methods
  • Steps required to effectively respond to and contain an attack
  • Roles and responsibilities of response team members
  • Remediation procedures
  • Details on how to handle media inquiries, customer, and partner communications, etc.
  • Processes for a post-incident review and analysis

Hopefully, you will never have to use your playbook. If you do, it will provide you with a standardized blueprint that will allow you to respond to an attack methodically and effectively.

2. Conduct fast and effective diagnostics

Time is of the essence during a cyberattack. Therefore, it is essential to conduct accurate and effective diagnostics as fast as possible.

SolarWinds 5 Protections Against Cyberattacks Blog Embedded Image 2024Not only will you want to identify where the attack originated, but you’ll also need to quickly ascertain where it has or could spread. This requires finding gaps and vulnerabilities in your network where a virus or piece of malicious code could take root. Unfortunately, network complexity gives attackers better cover and more opportunities to hide.

Observability solutions cut through the noise and provide visibility across your entire ecosystem. Observability is different from traditional network monitoring; whereas the latter is more reactive, observability proactively detects anomalies before they become real issues. Plus, with complete visibility into the entire ecosystem, there’s no need to waste time sifting through alerts or hunting down problems. Teams can respond quickly, ensuring high resiliency.

3. Communicate openly, honestly, quickly, and continuously

Effective communication is critical to cybersecurity threat mitigation. When a threat manifests, alert impacted internal departments through secure channels so as not to tip off the attackers that you know they’re in your network. Then, communicate with law enforcement, including the FBI. Finally, reach out to customers and partners. Keep all parties apprised in the weeks and months following the attack.

If you have created a playbook, you will know who to contact and how—because you will have planned for it. You will know, for example, that it will be up to your communications team for outreach to the press, customers, and other third parties.

Your communication must be clear and honest. Tell your stakeholders what you know when you know it. Inevitably, someone is going to ask, “Am I affected?” You may not know, and that is OK—just tell them what you do know. Likewise, you will likely be fighting misinformation. Do not get sidetracked. Continue to tell the truth and communicate openly as much as possible.

4. Enlist third-party partners for help

There are many reasons why you should not take on a cyberattack alone. First, an attack can be too complex and far-ranging for your internal team to handle on its own. It is better to have an outside party that can help with auditing your networks to ensure gaps have been remediated in the wake of an incident. Second, third-party cybersecurity experts can be invaluable in providing guidance, investigative support, and consultation as you navigate through the attack. Your team is going to be busy handling any number of tasks and will appreciate their perspectives.

Outside parties can also help get your truth out to the public. Following the SUNBURST attack, we enlisted the help of reputable organizations like the Cybersecurity and Infrastructure Agency (CISA), the Krebs Stamos Group, and others. In addition to assisting in the investigation, they helped us tell the story of what happened, which went a long way toward combatting misinformation.

5. Implement a “Secure by Design” approach

You have likely heard about shifting left—building security into the foundation of your products, rather than adding it on later. I recommend taking this mindset a step further and adopting a Secure by Design approach, where security becomes a cornerstone of your entire organization.

Secure by Design includes all the best practices listed here, as well as building out your cybersecurity team, auditing applications throughout their development, and engaging with the broader community to learn and share information. It also entails adopting an “assume breach” mindset, where you assume that an asset has already been breached, determine the possible implications, and come up with fixes to limit exposure.

As we turn the calendar page, attackers may have the advantage, but it doesn’t have to be that way. Hopefully, these best practices will help gain the upper hand—and protect your organization in 2024 and beyond.

Reach out to the SolarWinds team to learn more about how you can prepare your organization.

The 12 Artificial Intelligence Events for Government in 2024

Carahsoft 10 Artificial Intelligence Events for the New Year Blog Embedded Image 2024Last year set a landmark standard for innovation in artificial intelligence (AI). Federal, State, and Local Governments and Federal Systems Integrators are eager to learn how they can implement AI technology within their agencies. With the recent Presidential Executive Order for AI, many Public Sector-focused events in 2024 will explore AI modernizations, from accelerated computing in cloud to the data center, secure generative AI, cybersecurity, workforce planning and more.

We have compiled the top AI events for Government for 2024 that you will not want to miss.

1. AI for Government Summit

May 2, 2024, Reston, VA | In-Person Event

The AI for Government Summit is a half-day event designed to bring together Government officials, AI experts and industry leaders to explore the transformative potential of AI in the public sector. As Governments worldwide increasingly adopt AI technologies to enhance efficiency, improve services and address complex challenges, this summit will serve as a platform for collaboration, discussion and sharing knowledge on the latest advancements and best practices in AI deployment within Government organizations.

Sessions to look out for: Cybersecurity & AI – Safeguarding the Government and Generative AI Government Use Case Panel 

Carahsoft is proud to host this inaugural event alongside FedInsider. Join us and over 100 of our AI & machine learning technology and solution providers as they speak towards AI adoption in our Public Sector and how they are using AI to solve our government’s most critical challenges. Attendees will also hear from top government decision-makers as they share unique insights into their current AI projects. 

2. NVIDIA GTC 

March 18 – 21, 2024, San Jose, CA | Hybrid Event

Come connect with a dream team of industry luminaries, developers, researchers, and business strategists helping shape what’s next in AI and accelerated computing. From the highly anticipated keynote by NVIDIA CEO Jensen Huang to over 600 inspiring sessions, 200+ exhibits, and tons of unique networking events, GTC delivers something for every technical level and interest area. Whether you join us in person or virtually, you are in for an incredible experience at the conference for the era of AI.

Sessions to look out for: What’s Next in Generative AI and Robotics in the Age of Generative AI 

Carahsoft serves as NVIDIA’s Master Aggregator working with resellers, systems integrators, and consultants. Our team provides NVIDIA products, services, and training through hundreds of contract vehicles.

Carahsoft is proud to be the host of the GTC Public Sector Reception on Tuesday, March 19th.  

Please visit Carahsoft and our partners at the following booths:

  • Government IT Solutions: Carahsoft (#1726), Government Acquisitions (#1820), World Wide Technology (#929)
  • AI/ML & Data Analytics: Anaconda (#1701), Dataiku (#1704), Datadog (#1033), DataRobot (#1603), Deepgram (#1719), Domino Data Labs (#1612), Gretel.AI (G130), H2O.AI (G124), HEAVY.AI (#1803), Kinetica (I132), Lilt (I123), Primer.AI (I126), Red Hat (#1605), Run:AI (#1408), Snowflake (#930), Weights & Biases (#1505 & G115)
  • AI Infrastructure: Dell (#1216), DDN (#1521), Edge Impulse (#434), Lambda Data Lab (#616), Lenovo (#1740), Liqid (#1525), Pure Storage (#1529), Rescale (#1804), Rendered.AI (#330), Supermicro (#1016), Weka (#1517)
  • Industry Leaders: AWS (#708), Google Cloud (#808), HPE (#408), Hitachi Vantara (#308), IBM (#1324), Microsoft (#1108), VAST Data (#1424), VMware (#1604)

3. 5th Annual Artificial Intelligence Summit  

March 21, 2024, Falls Church, VA | In-Person Event  

Join the Potomac Officers Club’s 5th Annual AI Summit, where federal leaders and industry experts converge to explore the transformative power of artificial intelligence. Discover innovative AI advancements, engage in dynamic discussions, and forge strategic collaborations with key partners at this annual gathering of the movers and shakers in the AI field. Hosted by Executive Mosaic, this summit will be held in Falls Church, Virginia.  

Sessions to look out for: Leveraging Collaboration to Accelerate AI Adoption in the DoD and Operationalizing AI in Government: Getting Things Done with Automation  

Carahsoft is the master aggregator for Percipient AI, a Silver Sponsor, and Primer AI, the Platinum Sponsor. Mark Brunner, President of Federal at Primer AI, will also be speaking at the event. 

4. INSA Spring Symposium: How AI is Transforming the IC

April, 4, 2024, Arlington, VA | In-Person Event

Join 300+ intelligence and national security professionals at INSA’s Spring Symposium, How Artificial Intelligence is Transforming the IC, on Thursday, April 4, from 8:00 am-4:30 pm at the INSA/NRECA Conference Center in Arlington, VA. Key leaders from government, academia, and industry will discuss cutting-edge AI innovations transforming intelligence analysis, top priorities and concerns from government stakeholders, developments in ethics and oversight, challenges and opportunities facing the public and private sector and more!

Session to look out for: AI Ready? Challenges from a Data-Centric Viewpoint

Meet with Carahsoft partners AWS, Google Cloud, Intel, and Primer.

5. Google Next ‘24  

April 9 – 11, Las Vegas, NV | In-Person Event  

Explore new horizons in AI at Google Cloud Next ’24 in Las Vegas, April 9–11 at Mandalay Bay Convention Center. Dive into AI use cases, learn how to stay ahead of cyberthreats with frontline intelligence and AI powered security and boost data and thrive in a new era of AI. Plus, see our latest in AI, productivity and collaboration, and security from Google Public Sector.  

Carahsoft will be a sponsor of Google Next ‘24 with a significant public sector presence and plans to host a reception as well. 

6. SC24  

November 17 – 22, 2024, Atlanta, GA | Hybrid Event  

Supercomputing (SC) is the longest running and largest high performance computing conference. SC is an unparalleled mix of thousands of scientists, engineers, researchers, educators, programmers, and developers. Hosted by The Association for Computing Machinery & IEEE Computer Society, SC24 is hosted in Atlanta, Georgia.   

Carahsoft is proud to attend SC24 for a fourth year as the master aggregator serving the public sector. Carahsoft will be hosting an extensive partner pavilion showcasing daily demos of our technology and solution partners, demonstrating use-cases in AI and HPC intended for higher-ed organizations, research institutions, government agencies, and more.  

Join us at our public sector reception for a night of networking with leading decision-makers and solution experts on November 20. 

7. Elastic Public Sector Summit ‘24  

March 13, 2024, Pentagon City, VA | In-Person Event  

Join top Federal program executives and IT leaders to learn firsthand how advances in data management, search and analytics capabilities are helping agencies turn data into mission value faster and more productively for citizens and Government employees. Learn how agencies are leveraging these capabilities for cybersecurity, operational resilience, and preparing for the new era of generative AI. FedScoop, Elastic and Carahsoft will co-host this summit in Pentagon City, Virginia.   

As a top-level sponsor of Elastic’s Public Sector Summit, Carahsoft will host a pavilion on the exhibit floor that features Elastic’s foremost technology partners for the hundreds of projected government attendees.

8. CDAO Government

September 17 – 19, 2024, Washington DC | In-Person Event  

This event brings together the latest technological advancements and practical examples to apply key data-driven strategies to solve challenges in Government and greater society. Join a unique mix of academia, industry and Government thought leaders at the forefront of research and explore real-world case studies to discover the value of data and analytics. Located in Washington, D.C., CDAO Government will be hosted by Corinium Intelligence.   

Carahsoft was proud to be a Premier Sponsor at the 2023 CDAO Government, involving numerous of our vendor partners, Cloudera, and HP, Alation, Informatica, Progress|MarkLogic, Snowflake, and Tyler Technologies, Alteryx, Coursera, DataRobot, Databricks, Elastic, Immuta, Primer AI, and Qlik. 

Carahsoft looks forward to participating as a leading sponsor again at the 2024 CDAO Government.  

9. OODACON

November 5 – 6, Reston, VA | In-Person Event 

The world is at a transition point where technology is enabling rapid changes that can drive both positive and negative outcomes for humanity. It is also empowering many bad actors and poses new threats. The essence of OODAcon lies in its capacity to forge a robust community of leaders, experts, and practitioners that serve as a collective force that can propel us towards a brighter future.  

Join us at the Carahsoft Conference and Collaboration Center to discuss how disruptive technology can solve the most pressing issues of today. 

10. AWS Public Sector Summit 

June 26-27, 2024, Washington DC | In-Person Event 

Join Carahsoft and our partners for two days on innovation, collaboration and global representation. Designed to unite the global cloud computing community, AWS Summits are designed to educate customers about AWS products and services, providing them with the skills they’ll need in order to build, deploy, and operate their infrastructure and applications. 

As a top-level sponsor of AWS’ Public Sector Summit, Carahsoft will host a pavilion on the exhibit floor that features AWS’ foremost technology partners for the thousands of projected government attendees. 

Learn More About Previously Held Events

11. CDAO Advantage DoD24 Defense Data & AI Symposium  

Carahsoft was at CDAO’s inaugural Advantage DoD 2024: Defense Data & AI Symposium from February 20th to 22nd at the Washington Hilton in Washington, DC. The symposium provided a platform for over 1000 government officials, industry leaders, academia, and partners to converge and explore the latest advancements in data, analytics, and artificial intelligence in support of the U.S. Department of Defense mission. Carahsoft had a small tabletop partner pavilion, featuring our vendor partners Alteryx, DataRobot, Collibra, Elastic, Databricks, PTFS, EDB, Weights & Biases, and Clarifai.

Throughout the symposium, attendees from diverse backgrounds, including technical programmers, policymakers, and human resources professionals, gained valuable insights into emerging technologies and best practices for integrating data-driven strategies into organizational frameworks. Attendees also enjoyed two networking receptions hosted by Booz Allen Hamilton and C3.ai.

The agenda featured compelling speaking sessions including topics such as:

  1. Task Force Lima – The Way Forward (Goals and Progress)
  2. LLMs and Cybersecurity: Practical Examples and a Look Ahead
  3. DoD GenAI Use Cases and Acceptability Criterias

12. Using Generative AI & Machine Learning in the Enterprise  

This intimate one-day 500-person conference curated data science sessions to bring industry leaders and specialists face-to-face to educate one another on innovative solutions in generative AI, machine learning, predictive analytics, and best practices. Attendees saw a mix of use-cases, technical talks, and workshops, and walked away with actionable insights from those working on the frontlines of machine learning in the enterprise. Hosted by Data Science Salon, the event was held in Austin, Texas.

Carahsoft partners NVIDIA and John Snow Labs were in attendance; two leading AI and Machine Learning solution providers. Carahsoft serves as the master aggregator for both NVIDIA and John Snow Labs to provide government agencies with solutions that fulfill mission needs from trustworthy technology and industry partners.

While the landscape of government events has always been in flux, the pace of change in 2024 feels downright dizzying. From navigating hybrid gatherings to crafting data-driven experiences, the pressure is on to connect, inform, and engage. This is where the power of AI steps in, not as a silver bullet, but as a toolbox brimming with innovative solutions. Carahsoft’s curated list of Top 12 AI for Government Events is just the starting point. So, do not let the future intimidate you; embrace it. Dive into the possibilities, explore these AI tools, and get ready to redefine what a government event can be. Your citizens—and your data—will thank you.  

To learn more or get involved in any of the above events please contact us at AITeam@carahsoft.com. For more information on Carahsoft and our industry leading AI technology partners’ events, visit our AI solutions portfolio and events page. 

Mobilizing Law Enforcement Agencies Through Technology and Security Innovations at IACP 2023

Law enforcement professionals provide a crucial function in society. By leveraging modern technology advancements, agencies can achieve that quality of service and keep the American people safe from ongoing threats. The International Association of Chiefs of Police (IACP) Annual Conference and Exposition 2023 offered law enforcement agencies and security professionals the opportunity to learn from experts in the top fields, develop partnerships and get access to technologies that will aid in navigating the current landscape.

Securing Sensitive Law Enforcement Data 

A reoccurring challenge for law enforcement is an increase in ransomware attacks against them. Agencies reported a significant jump in attacks in the last two years, from 34% of departments reporting a ransomware hack in 2021, to nearly 69% in 2023. The average ransomware payment increased 500% in 2023 to over $1 million and over 25% of these attacks began with a phishing or malicious email. To combat this, agencies and departments must strengthen their cybersecurity postures and align with the NIST Cybersecurity Framework. Speakers at IACP provided five themes of questions agencies should ask to evaluate their cyber readiness: 

  1. Identify: Is our agency able to find weak spots, prioritize our response to them and track them? Have we done asset management, risk assessments and supply chain risk management? 
  2. Protect: Is our “front door” locked? Are we taking proactive measures to protect our data today? Have we implemented identity and access management (IAM), awareness and training and overall data security procedures? 
  3. Detect: Can we tell when something goes wrong? Can we identify issues confidently and quickly in the case of an anomaly? 
  4. Respond: How do we respond when bad things happen? Have we instituted clear communication, analysis, mitigation and response planning? 
  5. Recover: Are we ready to recover and learn from an incident and make the necessary changes to ensure it does not happen again? 

Carahsoft IACP 2023 Law Enforcement Tradeshow Recap Blog Embedded Image 2024Addressing these questions and acting on them means committing to fostering a culture of security and secure best practices. There are many technologies that can aid in this endeavor including artificial intelligence (AI) Ops, which assesses system patterns and behaviors to identify and surface anomalies; IAM, which provides an extra layer of authentication through biometrics and contextual authorization; and cloud and virtual environments, which agencies can employ in combination with infrastructure-as-a-service to enhance security. 

The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) has released two new updates to its security policy, Versions 5.9.1 and 5.9.2, based on the key pillars of data confidentiality, integrity and availability. These policies now require initial security training for personnel who need access to Department of Justice (DOJ) materials as well as the completion of yearly training for the extent of their access time. In conjunction with these policies are key technologies to safeguard data such as IAM, multi-factor authentication (MFA), system monitoring and others. Employing these solutions and safety measures boost community trust in law enforcement and the security of digital evidence. CJIS policies also reiterate to law enforcement officers the importance of doing their due diligence in securing both the data and their vital tools that otherwise could be rendered obsolete in the event of an attack. The Cybersecurity and Infrastructure Security Agency (CISA) has dedicated funding for state agencies to help with this endeavor of protecting the LE cyber space. 

Rising Innovative Technologies for Law Enforcement Agencies 

Implementation of body worn cameras (BWC) has been a growing initiative for law enforcement (LE) agencies for the last several years. With the Bureau of Justice Assistance’s Body Worn Camera Policy and Implementation Program (BWCPIP) more departments are able to receive grant funding and training for BWCs allowing more widespread usage of the technology especially in small, rural or tribal LE agencies. So far, this program has provided over $180 million in funding towards this effort. To support these BWC data advancements and further the technology benefits, LE agencies are looking for cloud storage and organization solutions, interoperability for data sharing, AI algorithms to efficiently tag videos and analytics software to pull relevant insights. 

AI in the law enforcement field also provides many other time saving benefits including automating some procedures and everyday tasks like report writing. Before implementing AI, agencies must audit their current processes to assess the specific use cases and preemptively address any challenges. Establishing guidelines for AI usage by law enforcement, not only assists internally with governance and accountability, but also helps build public trust by delineating the technology capabilities. 

Drones are another up-and-coming technology displaying value across public safety and emergency response. In the aftermath of Hurricane Ian in 2022, LE agencies deployed unmanned aircraft systems (UAS) and, through these drones, were able to conduct situation assessments, wide area searches, mapping of critical roadways to expedite the movement of resources and more. This UAS teaming approach has increased the speed and efficiency of first responders, as well as the ability to easily share the information with other agencies. 

 

Whether it is body worn cameras and drones, or AI, cloud and other solutions, security must be baked into the technology and operational processes. As partners in this current landscape, every party involved both in law enforcement and industry has the responsibility to educate themselves and maximize collaboration and the technologies available to continue to make the United States a safe place.  

To learn more about Carahsoft’s Law Enforcement Technology Solutions, visit our vertical portfolio and start your journey to enabling a safer tomorrow. 

 

*The information contained in this blog has been written based off the thought-leadership discussions presented by speakers at the IACP Annual Conference and Exposition 2023.*