Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Click here to purchase
Theresa Lanowitz reveals key findings from LevelBlue's 2024 research on healthcare cyber resilience, exploring barriers, priorities and strategic solutions for the evolving digital landscape.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Pierre Noel and Xandra Uth will explore the top cybercrime trends of the year, including AI-driven attacks, the impact of emerging technologies, the rise of hacktivism, and the growing complexity of phishing threats.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Don Gibson, CISO of Kinly, shares insights on preventing burnout in cybersecurity teams and maintaining balance during periods of rapid transformation.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.
Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Dr. Ram Kumar, Sreeni Venugopal and Sridhar Sidhu debate AI's role in cybersecurity leadership and risk management, exploring accountability and innovation balance.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
Jon Washburn of Stoel Rives, Erika Voss of DAT and Eric Sanchez of Kyowa Kirin share cross-industry perspectives on AI implementation challenges and solutions.
Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.
Cory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Kush Sharma, Dr. Denise Turley and Sergio Trindade share strategies for effectively communicating AI value to boards, covering realistic expectations, quantifiable benefits, strategic metrics and best practices for articulating ROI to stakeholders.
Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.
Prof. D Janakiram from IIT Madras explores AI-powered defense mechanisms against deepfakes, covering threat patterns, detection techniques, and multi-layered security approaches.
Abhijit Chakravarty, Khushbu Jain, and Ritesh Bhatia discuss AI-powered cybersecurity, real-time threat detection, and future challenges. Learn how AI enhances security frameworks and mitigates cyber risks.
Join Sujith Immanuel Pellican in an exploration of AI maturity, cyber exercises, and identity protection strategies.
Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.
Rohit Bajpai, Hussain AlKhalsan, Sagar Sethi, Irshad Syed, Dr. Sharique Raza, and Hossam Elshenraki examine AI's dual role in both creating and mitigating cybersecurity challenges in the Middle East.
Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.
Deval Mazmudar, Pawan Chawla, Abhishek Jha, and Sandesh Jadhav discuss API security challenges, breach prevention, and risk management. Learn how CISOs can balance API security with innovation in digital enterprises.
Dr. N Rajendran of MCX, Kiran Belsekar of Aegon, Rajat Sen of FS-ISAC and Apurva Dalal of Adani discuss API security challenges and risk management strategies.
Pramod Dubey and Vikram Danda discuss CISO strategies for AI governance, data security, and compliance. Learn how to prevent data leaks, enforce AI policies, and adapt to evolving AI technologies.
Washington State Attorney General Bob Ferguson discusses the Congressional AI Task Force's mandate, bipartisan collaboration and efforts to maintain equity in AI advancement.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.
Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Cisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.
Shane Hasert of ProcessUnity details strategies for efficient zero-day vulnerability response, including vendor ecosystem management and automated assessment campaigns for rapid threat mitigation.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Sachin Khalap and Shivani Arni discuss CISO strategies for breach management, reputation recovery, and cyber resilience. Learn how to handle post-breach response, mitigate risks, and safeguard customer data.
Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Mohsan Tanvir of Magnet Forensics shares actionable tips on aligning DFIR teams with organizational objectives, measuring return on security investment, and demonstrating how digital forensics delivers tangible business value.
Dom Lucas of British International, Don Gibson of Kinly and Milos Pesic of ABB discuss strategic resource allocation and ROI maximization in cybersecurity investments.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
1 2 3 4 5 6 7 8 Next