TSD16 - Defending Complex Systems in the A.I. Era
Program Description
Gain practical experience identifying, prioritizing, and mitigating cyber threats in A.I.-integrated complex systems. In this workshop, you’ll complete exercises designed to teach you how to identify, prioritize, and mitigate cyber risks, culminating in a final exercise where you’ll defend a virtualized rover platform, overcome cyber threats, and achieve mission objectives in a hands-on, live, and gamified experience. Not in the tech field? No problem! The skills you learn in this workshop are transferable across industries seeking to reduce risk while safely integrating A.I. into their systems.
Learning Objectives:
After completing the program, you will be able to:
- Analyze vulnerabilities in interconnected and A.I.-enabled systems
- Explain how increased connectivity contributes to emergent security threats
- Discuss real-world examples of attacks on A.I.-integrated systems, interpreting the implications for current and future security strategies.
- Apply essential principles of secure system design, implementing foundational techniques from the earliest stages of development.
- Conduct system risk assessments to identify, analyze, and evaluate vulnerabilities based on potential impact and likelihood.
- Select appropriate secure design mitigations tailored to system type, data sensitivity, and identified vulnerabilities.
Who Should Attend:
- Cybersecurity Practitioners
- IT professionals
- A.I. Solutions Architects
- Systems Engineers
- Software engineers
- Product Owners
- Risk and Resource Managers
- Government & Policy Professionals - Responsible for developing or assessing information systems security plans and policies
- Anyone Involved in Product Design - Professionals contributing to the development, security, or integration of complex systems.

Adam Scheuer is the Chief Technology Officer at CT Cubed Inc. He is an Air Force veteran and has more than 20 years of extensive experience in planning, executing, and leading offensive and defensive cyber operations. His military education includes graduating from the US Air Force Weapons School’s Cyber Warfare Operation Instructor Course (like Top Gun for Hackers). Beyond his operational expertise, Adam is an accomplished educator in the field of cybersecurity. He has developed and delivered specialized training courses, significantly enhancing the skill sets of professionals in several industries, including aerospace, defense, and operational technology. His academic credentials include a Master of Science in Telecommunications Management and a Bachelor of Science in Computer & Information Science. Additionally, Adam has obtained several certifications in various areas, including Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), AWS Security Specialty, and Associate Systems Engineering Professional (ASEP).