Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
Hitesh Pathak explores how AI has transformed cybersecurity landscapes, sharing strategies for implementing cloud-native security frameworks and threat intelligence.
Pravin Savant, Nishant Pradhan, Girish Hadkar, Dishika Tandon and Prasanna Lohar address the disconnect between boardroom strategy and execution realities.
Rakesh Bhardwaj discusses building data-first strategies, transitioning from project to product management, and democratizing data capabilities across organizations.
Bhavit Bhatt maps organizations across the AI maturity spectrum and shares strategies for building simplified, high-performance AI foundations with cloud-agnostic platforms.
Damian Stephenson examines the dramatic shift from AI skepticism to adoption, exploring strategic transformation approaches across the AI capability spectrum.
Atul Jayawant shares three fundamental principles for CIO success: ownership mindset, comprehensive competency and simplicity in business communication.
Aparna Kumar explores how CIOs can transform technology from cost center to valuation multiplier through strategic boardroom storytelling and cybersecurity resilience.
Mohit Agarwal and Pankaj Bhargava explore supplier risk assessment platforms, demand sensing capabilities and traceability systems for volatile supply chains.
Nim Nadarajah and Sandra Pesic examine AI-driven cyberthreats, resilience strategies, automation benefits and post-quantum security preparations for modern organizations.
Dr. Amiruddin Abdul Wahab of Cybersecurity Malaysia explores strategic human-AI interaction in cybersecurity operations and real-world threat detection applications.
Kenneth Townsend of Ingredion explores how AI-driven leadership balances business innovation with data governance, operational efficiency and responsible security practices.
Sateesh Kumar Challa examines how synthetic identity fraud leverages cutting-edge AI to bypass traditional detection systems.
Taka Ariga and Brennan Lodge discuss how Retrieval Augmented Generation transforms threat detection and compliance operations by grounding AI responses in trusted organizational data rather than public sources.
Varun Shrivastava of UBS, Armani Ibrahim of DeepAI and Darren Grayson Chng of Electrolux discuss leveraging agentic AI for threat simulation, managing AI bias risks and balancing automation with human intuition.
Sudhir Tiku of KEENFINITY Group shares governance frameworks for multi-agent AI ecosystems, regulatory expectations and building interdisciplinary teams for responsible AI development.
Steven J. Davis of Data Center Association of the Philippines explores the country's digital infrastructure transformation, cybersecurity's role in digital growth and AI innovation positioning in APAC.
Vrijesh Pandey and Daryl Pereira discuss how offensive AI transforms threat landscapes and how defensive AI accelerates detection, in addition to strategic implications of AI vs. AI security paradigms.
Kshitija Joshi, Kam Karaji and Priyanka Dank discuss building AI steering groups, implementing bias detection frameworks and creating scalable compliance toolkits under EU AI Act.
Stuart Frost, Jose Soares and Alexander Ermakovich explore AI-human collaboration, governance frameworks and managing executive expectations in cyber defense.
Kunal Sehgal of Security Decoded and Akmal Nizam Abdul Halim of LTAT explore using AI to modernize IT operations, building quantum resilience and aligning IT strategies for quantum threat readiness.
Mohd Hanapi Bisri of Petra Energy Berhad and Leng Wee of Seatrium share insights on AI-powered application risks, making AI ubiquitous for cyber resiliency and redefining cybersecurity with AI integration.
Thom Schiltmans of Signify discusses building AI governance frameworks, managing AI tool sprawl, maintaining regulatory compliance and securing AI-enabled OT environments using zero trust.
Tomvie Ozi of Access Bank Gambia shares insights on building hybrid security operations with AI automation, overcoming cultural barriers, and moving from reactive to predictive capabilities.
Sarah Mathews, Eduardo Luis Arana and Seth Frimpong-Manso discuss global governance frameworks, cross-functional teams and ethical AI implementation.
Devvret Rishi of Rubrik provides blueprints for production-ready gen AI architectures that balance security, performance and cost through fine-tuned models and governance frameworks.
Truman Kain and Aimee Simpsonof Huntress expose how criminals weaponize AI for deepfakes and voice cloning while revealing defensive strategies to stay ahead of evolving threats.
Bharath Nagaraj of Cohesity transforms backup systems into active intelligence platforms, using AI to detect ransomware patterns and unlock historical data for strategic insights.
Clinton Herget of Snyk outlines AI Trust Ops as the next evolution beyond DevSecOps, addressing novel vulnerabilities in AI-native development and agentic applications.
Matt Fangman of SailPoint addresses the emerging challenge of governing AI agents and machine identities that operate beyond traditional access controls and security oversight.
Dave Stapleton of ProcessUnity shows how AI transforms third-party risk management through predictive analytics, automated evidence validation and intelligent assessment completion workflows.
Sharat Ganesh of WitnessAI reveals how intent-based classification systems replace traditional DLP approaches, providing network-level visibility and real-time governance for AI data interactions.
Wendy Willner of Google Cloud demonstrates how autonomous AI agents revolutionize SOC operations by creating custom investigation plans and executing dynamic searches.
Sekhar Nagasundaram of Elevance Health demonstrates how to balance AI innovation with risk management while establishing governance frameworks for secure AI adoption.
1 2 3 Next