{"id":10869,"date":"2025-06-04T15:25:49","date_gmt":"2025-06-04T20:25:49","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=10869"},"modified":"2025-06-04T16:32:39","modified_gmt":"2025-06-04T21:32:39","slug":"key-insights-from-global-cyber-innovation-forum-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/","title":{"rendered":"Key Insights from Global Cyber Innovation Forum 2025\u00a0"},"content":{"rendered":"\n<p>The 2025 Global Cyber Innovation Forum served as a premier gathering where cybersecurity\u2019s most pressing challenges meet collaborative solutions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Hosted by &nbsp;<a href=\"https:\/\/forgepointcap.com\/HYPERLINK%20%22https:\/\/forgepointcap.com\/%22\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Vendor 1\" rel=\"noreferrer noopener\">Forgepoint<\/a> <a href=\"https:\/\/forgepointcap.com\/\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Vendor 2\" rel=\"noreferrer noopener\">Capital<\/a>, <a href=\"https:\/\/www.snowflake.com\/en\/\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Vendor 3\" rel=\"noreferrer noopener\">Snowflake<\/a>, <a href=\"https:\/\/www.forescout.com\/\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Vendor 4\" rel=\"noreferrer noopener\">Forescout<\/a>, <a href=\"https:\/\/cloud.google.com\/\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Vendor 6\" rel=\"noreferrer noopener\">Google Cloud<\/a> and <a href=\"https:\/\/carahsoft\/\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Carahsoft Home Page\" rel=\"noreferrer noopener\">Carahsoft<\/a> at the Embassy of Canada in Washington, D.C., the Forum brought together a curated audience of influential cyber leaders from across the globe, including industry executives, Government officials, policy leaders, venture capitalists and thought leaders from academia and the non-profit sector. &nbsp;<\/p>\n\n\n\n<p>This annual event provided a platform for critical discussions on emerging threats, technological innovation and strategic partnerships essential for securing our digital infrastructure. Five key themes stood out throughout the sessions:&nbsp;<\/p>\n\n\n\n<ul>\n<li>National Security Threats with Supply Chain Vulnerabilities&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Rise and Race to AI Dominance&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Edge of Quantum Transformation&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Typhoon of Attacks on Critical Infrastructure&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Streamlining Cybersecurity Compliance&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">National Security Threats with Supply Chain Vulnerabilities&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"954\" height=\"629\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel.png\" alt=\"\" class=\"wp-image-10874\" style=\"width:406px;height:auto\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel.png 954w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel-300x198.png 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel-768x506.png 768w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel-640x422.png 640w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Panel-455x300.png 455w\" sizes=\"(max-width: 954px) 100vw, 954px\" \/><\/figure><\/div>\n\n\n<p>The digital <a href=\"https:\/\/www.carahsoft.com\/solve\/supply-chain-management\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Supply Chain Solve\" rel=\"noreferrer noopener\">supply chain<\/a>, specifically software and applications civilians use, have increasingly become a source of critical national security vulnerabilities. Government officials and industry leaders warn that software and digital platforms sourced from foreign adversaries have reshaped the threat landscape by implanting foreign influence in the U.S. technology ecosystem.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Technology serves as a funding mechanism for adversaries and comes with a hidden price of mass data collection, making it easier for threat actors to access sensitive information and transform traditional cyberattacks. The lack of transparency in certain nation-states raises concerns on regulatory consequences, potentially giving adversaries a strategic edge in information warfare and creating a blind spot in the global tech supply chain.&nbsp;&nbsp;<\/p>\n\n\n\n<p>U.S. leaders emphasize the necessity for regulated technology supply chains and accelerated Federal certifications, specifically <a href=\"https:\/\/www.carahsoft.com\/solve\/fedramp\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - FedRAMP Solve\" rel=\"noreferrer noopener\">FedRAMP<\/a>, to ensure innovation does not come at the cost of national security.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2025\" height=\"1350\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-2025x1350.jpg\" alt=\"\" class=\"wp-image-10884\" style=\"width:350px;height:auto\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-2025x1350.jpg 2025w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-300x200.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-768x512.jpg 768w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-1536x1024.jpg 1536w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-2048x1365.jpg 2048w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-640x427.jpg 640w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-6-002-450x300.jpg 450w\" sizes=\"(max-width: 2025px) 100vw, 2025px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Rise and Race to AI Dominance&nbsp;<\/h2>\n\n\n\n<p>With the rise of <a href=\"https:\/\/www.carahsoft.com\/solve\/ai\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - AI Solve\" rel=\"noreferrer noopener\">artificial intelligence (AI)<\/a>, data has become the modern form of power. Foreign adversaries are striving to build or gain access to data pipelines to fuel their AI models, bypassing privacy in a way that allows them to train AI models much faster than has been possible in America. The U.S. must counter this by accelerating our own AI model training and innovation, while safeguarding privacy and data integrity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Government and industry experts state that AI is being underutilized across U.S. operations. The current administration has streamlined AI usage through Executive Order 14179<em>: Removing Barriers to American Leadership in Artificial Intelligence<\/em> and Executive Order 14277: <em>Advancing Artificial Intelligence Education for American Youth<\/em>. Additionally, AI should be deployed when combating advanced cyberattacks and automating routine cybersecurity efforts such as threat detection, incident response and vulnerability identification.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Edge of Quantum Transformation&nbsp;<\/h2>\n\n\n\n<p>Emerging technologies such as <a href=\"https:\/\/www.carahsoft.com\/solve\/quantum-technologies?subtopic=Quantum+Security\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Quantum Solve\" rel=\"noreferrer noopener\">quantum computing<\/a> are rapidly approaching mainstream adoption. The massive amount of encrypted data currently stored in secret could be vulnerable to decryption within the next 5 to 10 years. This hovering threat has made the development and deployment of post-quantum cryptography a top priority for the U.S. Government. The race to post-quantum cryptography and quantum computers has not just been an urgency for the U.S. and its allies, but also for adversarial nation-states.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Embedded.jpg\" alt=\"\" class=\"wp-image-10893\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Embedded.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Embedded-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Typhoon of Attacks on Critical Infrastructure&nbsp;<\/h2>\n\n\n\n<p>Advanced persistent threat (APT) groups such as Salt Typhoon, Volt Typhoon and Flax Typhoon have already infiltrated critical infrastructure systems, often using \u201cliving off the land\u201d techniques. These public and well documented attacks are considered digital terrorism, disrupting U.S. critical infrastructure operations and stealing intellectual property.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In response, the U.S. Government is prioritizing cyber hygiene, secure-by-design and the development of an integrated and robust defense system. Agencies, technology providers and critical infrastructure operators are heavily encouraged to collaborate through information sharing, adoption of emerging technologies and routine threat assessments. The severity of these cyberattacks have increased substantially, highlighting the urgency for a more proactive and coordinated national response from the U.S. Government.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Streamlining Cybersecurity Compliance&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"520\" height=\"374\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-3-002.jpg\" alt=\"\" class=\"wp-image-10885\" style=\"width:364px;height:auto\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-3-002.jpg 520w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-3-002-300x216.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/5.20-Global-Cyber-Innovation-Forum-3-002-417x300.jpg 417w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><\/figure><\/div>\n\n\n<p>The current cybersecurity regulatory landscape presents a fragmented maze of overlapping requirements that hinder both innovation and effective security implementation. Government and industry security teams are overwhelmed by conflicting standards across Federal, State and agency-specific frameworks. Organizations must navigate multiple compliance frameworks\u2014<a href=\"https:\/\/www.carahsoft.com\/solve\/fedramp\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - FedRAMP Solve\" rel=\"noreferrer noopener\">FedRAMP<\/a>, National Institute of Standards and technology (NIST) requirements, <a href=\"https:\/\/www.carahsoft.com\/cmmc\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - CMMC Solve\" rel=\"noreferrer noopener\">Cybersecurity Maturity Model Certification (CMMC)<\/a> and various state requirements\u2014creating redundant processes that drain resources without enhancing security.&nbsp;<\/p>\n\n\n\n<p>To address this, industry leaders are advocating for regulatory harmonization initiatives. Federal agencies are working to align various compliance frameworks while updating modernization strategies to build interoperability. By aligning around core standards like NIST 800-53 and implementing automated compliance tools, agencies can reduce complexity while maintaining robust cybersecurity postures. Forum participants agreed: harmonized regulations are essential to enabling secure innovation without compromising oversight.&nbsp;<\/p>\n\n\n\n<p>The Global Cyber Innovation Forum demonstrated that securing America&#8217;s digital future requires unprecedented coordination between Government agencies, private industry and international allies. As adversaries continue exploit emerging technologies, the U.S. must respond with unified strategies that streamline regulations, accelerate innovation and sustain global cyber leadership. The insights shared offer a critical roadmap for defending against tomorrow\u2019s threats in a rapidly evolving digital landscape.&nbsp;<\/p>\n\n\n\n<p><strong><em>Visit <a href=\"https:\/\/carah.io\/GCIF2025-ResourceHub\" target=\"_blank\" data-track=\"Carahsoft - Global Cyber Innovation Blog 2025 - Bottom CTA\" rel=\"noreferrer noopener\">Carahsoft\u2019s Resource Hub<\/a> to dive deeper into the key takeaways, expert perspectives and resources from the 2025 Global Cyber Innovation Forum.&nbsp;<\/em><\/strong><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/key-insights-from-global-cyber-innovation-forum-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>The 2025 Global Cyber Innovation Forum served as a premier gathering where cybersecurity\u2019s most pressing challenges meet collaborative solutions.&nbsp;&nbsp; Hosted by &nbsp;Forgepoint Capital, Snowflake, Forescout, Google Cloud and Carahsoft at the Embassy of Canada in Washington, D.C., the Forum brought &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":10894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,1421,2,1590,633,1423],"tags":[605,790,545,611,72,1486],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft<\/title>\n<meta name=\"description\" content=\"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-04T20:25:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T21:32:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"Key Insights from Global Cyber Innovation Forum 2025\u00a0\",\"datePublished\":\"2025-06-04T20:25:49+00:00\",\"dateModified\":\"2025-06-04T21:32:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\"},\"wordCount\":888,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg\",\"keywords\":[\"Artificial Intelligence\",\"CMMC\",\"Cybersecurity\",\"Federal Government\",\"FedRAMP\",\"Quantum Computing\"],\"articleSection\":[\"Artificial Intelligence\",\"CMMC\",\"Cybersecurity\",\"Events\",\"FedRAMP\",\"Quantum Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\",\"name\":\"Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg\",\"datePublished\":\"2025-06-04T20:25:49+00:00\",\"dateModified\":\"2025-06-04T21:32:39+00:00\",\"description\":\"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Insights from Global Cyber Innovation Forum 2025\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft","description":"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft","og_description":"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-06-04T20:25:49+00:00","article_modified_time":"2025-06-04T21:32:39+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"Key Insights from Global Cyber Innovation Forum 2025\u00a0","datePublished":"2025-06-04T20:25:49+00:00","dateModified":"2025-06-04T21:32:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/"},"wordCount":888,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg","keywords":["Artificial Intelligence","CMMC","Cybersecurity","Federal Government","FedRAMP","Quantum Computing"],"articleSection":["Artificial Intelligence","CMMC","Cybersecurity","Events","FedRAMP","Quantum Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/","name":"Key Insights from Global Cyber Innovation Forum 2025 | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg","datePublished":"2025-06-04T20:25:49+00:00","dateModified":"2025-06-04T21:32:39+00:00","description":"Explore insights from the 2025 Global Cyber Innovation Forum, where cyber leaders tackled AI, quantum tech, infrastructure attacks and supply chain threats.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/06\/Global-Cyber-Innovation-Forum-Blog-Graphics_Blog-Post-Preview.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/key-insights-from-global-cyber-innovation-forum-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Key Insights from Global Cyber Innovation Forum 2025\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10869"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=10869"}],"version-history":[{"count":16,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10869\/revisions"}],"predecessor-version":[{"id":10895,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10869\/revisions\/10895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/10894"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=10869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=10869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=10869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}