Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Martin Peters and Phillip Davies lead an interactive tabletop simulation of a deepfake-driven cyberattack, focusing on organizational readiness and response strategies.
Prof. D Janakiram from IIT Madras explores AI-powered defense mechanisms against deepfakes, covering threat patterns, detection techniques, and multi-layered security approaches.
Business email compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises.
Explore the OWASP Top 10 for LLM Applications!
Recognize and prevent AI-driven cyber threats before they strike. Stay one step ahead—stay informed, stay secure!
Sumant Mauskar of Pindrop covers multifactor voice authentication frameworks, device fingerprinting, synthetic voice detection, real-time fraud detection and ROI analysis for healthcare contact centers.
Tony Fergusson of Zscaler examines why zero trust must evolve to verify data authenticity in deepfake era and how adversaries exploit trusted platforms and use prompt injection to evade AI detection.