  {"id":11434,"date":"2025-10-20T13:15:57","date_gmt":"2025-10-20T18:15:57","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11434"},"modified":"2025-10-22T10:00:33","modified_gmt":"2025-10-22T15:00:33","slug":"broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/","title":{"rendered":"Billington CyberSecurity Summit: AI Takes Center Stage"},"content":{"rendered":"\n<p><em>Premier U.S. Government cyber conference previews AI on offense, on defense and as a target<\/em><\/p>\n\n\n\n<ul>\n<li>While adversaries can boost the quality and volume of attacks with artificial intelligence (AI), defenders will apply AI to counter attacks with predictive and proactive defenses.<\/li>\n\n\n\n<li>The advent of Agentic AIs will accelerate this trend and provide more avenues for attack, but defenders will always have the advantage by being able to train AIs with proprietary information and use them to identify vulnerabilities before attackers do.<\/li>\n\n\n\n<li>The transition to post-quantum cryptography will be an industry-wide heavy lift, with extensive rewriting of code to meet post-quantum standards.<\/li>\n<\/ul>\n\n\n\n<p>Recently, I had the opportunity to share some of my experience and insights at the <a href=\"https:\/\/billingtoncybersummit.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Event Link\">Billington CyberSecurity Summit<\/a> in Washington, D.C. Moderated by Chris Townsend, Global Vice President of Public Sector at Elastic, our <a href=\"https:\/\/billingtoncybersummit.com\/agenda\/2025-agenda\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Panel Sessions\">panel session<\/a>, <em>\u201cThe Future of Cyber Threat: Anticipating Threat Actors\u2019 Next Steps,\u201d <\/em>explored how threat actors are evolving and what organizations can do now to prepare. Not surprisingly, AI was a hot topic. We also discussed quantum computing, emerging threats and the cybersecurity staffing shortage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Attackers Will Leverage AI<\/h2>\n\n\n\n<p>Attackers are already using AI to power their attacks, but it is important not to over-sensationalize the impact that AI is having because the proportion of AI-driven attacks is still quite small relative to the overall amount of malicious activity we are seeing. However, we expect that proportion to grow quickly.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_300x300-1.jpg\" alt=\"\" class=\"wp-image-11445\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_300x300-1.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_300x300-1-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>One of the main ways attackers are using it now is to create phishing materials, because it addresses what is a weak point for many threat actors, who often are not native English speakers. Attacks that are technically sophisticated can fail because they begin with a spear phishing email whose spelling or grammar is wrong. Large Language Models (LLMs) solve that problem brilliantly because if there is one thing they are good at, it is creating plausible narratives in perfect English.<\/p>\n\n\n\n<p>The other area we see attackers using it is to automate their work. We have <a href=\"https:\/\/www.security.com\/threat-intelligence\/malware-ai-llm\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Documented Examples\">already documented examples<\/a> of code that appears to have been written by an AI.<\/p>\n\n\n\n<p>In the short term, AI will not enable adversaries to do anything new, but we expect it to enhance the quality and volume of their attacks. AI is lowering the entry bar for threat actors. They do not even need to know how to code anymore. Naturally, the number of attacks will begin to go up.<\/p>\n\n\n\n<p>In the medium term, the arrival of Agentic AI is likely to accelerate malicious activity levels, since agents can act autonomously, further minimizing the level of input needed from attackers.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.security.com\/threat-intelligence\/ai-agent-attacks\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Research Link\">We have already done some research<\/a> on how agents could be abused and proven that they can already be used to carry out a basic spear phishing attack and deliver malicious code to a target. Agents are still in their infancy, and it is only a matter of time before they become capable of carrying out more sophisticated attacks with minimal instruction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preparing For the Quantum Era<\/h2>\n\n\n\n<p>The advent of <a href=\"https:\/\/www.youtube.com\/watch?si=dzrqzYm97fn6Mnor&amp;v=dUJkxYOGsbA&amp;feature=youtu.be\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Video Link\">quantum computing<\/a> presents another significant challenge for cybersecurity. Quantum computers have the potential to break current encryption standards, making it imperative for organizations to transition to post-quantum encryption algorithms.<\/p>\n\n\n\n<p>Adversaries are already preparing for this shift. The \u201charvest now, decrypt later\u201d strategy involves stealing encrypted data today with the intention of decrypting it once quantum computing becomes viable.<\/p>\n\n\n\n<p>This process of transitioning to post-quantum encryption is not without its challenges. Decades of work have gone into refining and protecting the implementation of existing encryption methods, and we now face the task of revising and rewriting code using new, post-quantum standards. This will inevitably introduce a new generation of bugs, but we will have the benefit of AI to mitigate them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It Does Not Stop Here<\/h2>\n\n\n\n<p>Conferences such as Billington are essential as we navigate this complex landscape. It embodies the Public and Private Sector collaboration that will be key to realizing better cyber defense outcomes moving forward. Together, with partners like 探花视频 delivering mission-critical industry expertise to U.S. Federal and Public Sector agencies, we can anticipate and counter the next generation of cyber threats, ensuring the safety and resilience of our digital ecosystems.<\/p>\n\n\n\n<p><strong><em>Learn more about how industry icons like Symantec and Carbon Black are putting AI on the <\/em><\/strong><a href=\"https:\/\/www.security.com\/feature-stories\/ai-front-lines-cybersecurity-defense\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Bottom CTA\"><strong><em>front lines of cybersecurity<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Want to learn how <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/broadcom\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Bottom CTA 2\"><strong><em>Symantec, Carbon Black and 探花视频<\/em><\/strong><\/a><strong><em> can strengthen your cybersecurity posture? Contact us at <\/em><\/strong><a href=\"mailto:Broadcom@探花视频.com\"><strong><em>Broadcom@探花视频.com<\/em><\/strong><\/a><strong><em> for more information.<\/em><\/strong><\/p>\n\n\n\n<p><em>探花视频. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including <a href=\"https:\/\/www.carahsoft.com\/broadcom\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Broadcom Microsite\">Broadcom<\/a>, we deliver\u202f<\/em><a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - 探花视频 Solve\"><em>solutions<\/em><\/a><em>\u202ffor Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the <\/em><a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - 探花视频 Blog\"><em>探花视频 Blog<\/em><\/a><em> to learn more about the latest trends in Government technology markets and solutions, as well as 探花视频\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n\n<p><em>This post originally appeared on <a href=\"https:\/\/www.security.com\/expert-perspectives\/billington-cybersecurity-summit-ai-takes-center-stage\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom - Billington CyberSecurity Summit Blog - 2025 - Original Blog\"><em>security.com<\/em><\/a>, and is re-published with permission.<\/em><\/p>\n\n\n<p><head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>Premier U.S. Government cyber conference previews AI on offense, on defense and as a target Recently, I had the opportunity to share some of my experience and insights at the Billington CyberSecurity Summit in Washington, D.C. Moderated by Chris Townsend, &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":10,"featured_media":11444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,1248,1590,157,1426,1493,153],"tags":[605,1659,1227,196,611,1440,613],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频<\/title>\n<meta name=\"description\" content=\"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频\" \/>\n<meta property=\"og:description\" content=\"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-20T18:15:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T15:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cmalec@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cmalec@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\"},\"author\":{\"name\":\"cmalec@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/171d66cd2a4dd3f91f827486b2242ba4\"},\"headline\":\"Billington CyberSecurity Summit: AI Takes Center Stage\",\"datePublished\":\"2025-10-20T18:15:57+00:00\",\"dateModified\":\"2025-10-22T15:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\"},\"wordCount\":866,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Billington CyberSecurity Summit\",\"Broadcom\",\"Department of Defense\",\"Federal Government\",\"National Security and Intelligence\",\"State and Local Government\"],\"articleSection\":[\"Artificial Intelligence\",\"Department of War\",\"Events\",\"Federal Government\",\"National Security and Intelligence\",\"Partners\",\"State and Local Government\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\",\"name\":\"Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg\",\"datePublished\":\"2025-10-20T18:15:57+00:00\",\"dateModified\":\"2025-10-22T15:00:33+00:00\",\"description\":\"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Billington CyberSecurity Summit: AI Takes Center Stage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/171d66cd2a4dd3f91f827486b2242ba4\",\"name\":\"cmalec@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8535c3b92756b241abafae44ee710b0b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8535c3b92756b241abafae44ee710b0b?s=96&d=mm&r=g\",\"caption\":\"cmalec@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频","description":"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频","og_description":"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/","og_site_name":"| 探花视频","article_published_time":"2025-10-20T18:15:57+00:00","article_modified_time":"2025-10-22T15:00:33+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg","type":"image\/jpeg"}],"author":"cmalec@carahsoft.com","twitter_misc":{"Written by":"cmalec@carahsoft.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/"},"author":{"name":"cmalec@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/171d66cd2a4dd3f91f827486b2242ba4"},"headline":"Billington CyberSecurity Summit: AI Takes Center Stage","datePublished":"2025-10-20T18:15:57+00:00","dateModified":"2025-10-22T15:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/"},"wordCount":866,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg","keywords":["Artificial Intelligence","Billington CyberSecurity Summit","Broadcom","Department of Defense","Federal Government","National Security and Intelligence","State and Local Government"],"articleSection":["Artificial Intelligence","Department of War","Events","Federal Government","National Security and Intelligence","Partners","State and Local Government"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/","name":"Billington CyberSecurity Summit: AI Takes Center Stage | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg","datePublished":"2025-10-20T18:15:57+00:00","dateModified":"2025-10-22T15:00:33+00:00","description":"Explore insights from Billington CyberSecurity Summit on how threat actors are evolving and what organizations can do now to prepare.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/10\/Broadcom-Guest-Blog-Billington-CyberSecurity-Summit_875x635-1.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-billington-cybersecurity-summit-ai-takes-center-stage-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Billington CyberSecurity Summit: AI Takes Center Stage"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/171d66cd2a4dd3f91f827486b2242ba4","name":"cmalec@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8535c3b92756b241abafae44ee710b0b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8535c3b92756b241abafae44ee710b0b?s=96&d=mm&r=g","caption":"cmalec@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11434"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11434"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11434\/revisions"}],"predecessor-version":[{"id":11448,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11434\/revisions\/11448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11444"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}