Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this insightful session, Brendan Clace of The Mosaic Company will explore a practical framework to modernize OT vulnerability management by aligning risk scoring with operational realities and building consensus across teams.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.
Sharul Rashid of Petronas examines cybersecurity challenges in oil and gas, covering interconnected device risks, safety consequences and best practices for critical infrastructure.
Marco Rottigni of SentinelOne discusses creating integrated security ecosystems where multi-source data becomes actionable intelligence through platform consolidation and generative AI automation workflows.
Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.
Francesco Puccioni of Credem Banca, Pasquale De Rinaldis of Iccrea Banca and Giovanni Lamberti of Mooney share practical DORA implementation experiences across different financial institution sizes.
Phil Englert, Samantha Jacques and Stephen Goudreault discuss expanded technical controls, medical device inventories, PHI data flow mapping, universal encryption and third-party risk attestation challenges.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Paolo Tagliaferri of Cloudflare and Lorenzo Eusepi of Groupama Assicurazioni demonstrate how to overcome traditional WAF limitations through adaptive defense mechanisms against evolving AI-driven attack vectors.
Susanna Cecchetti of OneTrust and Nunzio Bucello of Sara Assicurazioni explore strategic cybersecurity approaches, NIS2/DORA compliance and evidence-based risk management in digital transformation.
Josh Martin explores flexible zero trust frameworks that adapt to unique industrial settings while providing centralized oversight and control.
Ravikumar Mukkamala, Bryce Carter and Chris Bunton examine autonomous AI systems, secure integration strategies and emerging vulnerabilities in the third wave of AI.
Giulio Puri of Sysdig explores how AI multiplies security team effectiveness, bridging skills gaps and improving decision-making in cloud-native architectures through intelligent incident response automation.
Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.
AI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Matt Cerny, Murad Dikeidek, Rick Doten, Neal Dennis, Lisa Bazis and Edward Higgins discuss emerging AI threats, agentic AI attacks, governance committee structures and defensive AI implementation.
Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.
Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.
Robert Golladay of U.S. Secret Service leads an immersive simulation demonstrating how AI amplifies insider threats through psychological manipulation and provides proven defense strategies for systematic compromise.
Colin Bell of HCLSoftware explores AI-driven cybersecurity challenges including privacy concerns, data misuse and regulatory compliance, focusing on practical privacy-by-design implementation in AI systems.
Josh Iroko shares Mandiant's latest threat intelligence on exploit vectors, advanced persistent threat techniques and cloud misconfigurations requiring targeted monitoring approaches.
Gaetan Houle of Fortinet and Owen Key of KPMG outline the five essential pillars for AI readiness - strategy, data, technology, workforce and governance - and offer a road map to help organizations build a secure, scalable and effective AI strategy.
Syed Belal of Hexagon examines automated remediation in cybersecurity, separating hype from practical reality for critical infrastructure ecosystems.
Kevin Holcomb of Cisco discusses software-based segmentation options and virtual segmentation to overcome traditional network modification roadblocks.
Rainer Rodler, Claudio Sangaletti, Jose Seara and Kai Thomsen explore how automation and human-centric approaches can work in synergy for effective cyber risk management in manufacturing plants.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Balázs Izso, Naveen Ullikashi, Florian Augthun, Dennis Pokupec and George Sokolsky explore how CISOs can transform security into a business enabler through influence, negotiation and cultural change strategies.
Ramzi Naouali explores security-by-design principles, human-centric AI approaches and policy frameworks balancing innovation with regulatory compliance in healthcare AI implementation.
Lip Keong Yap of ISACA Singapore Chapter addresses balancing strong authentication with seamless user experiences and designing user-friendly security systems.
Edward Higgins of Quisitive exposes the critical gap between regulatory alignment and real-world resilience, covering zero trust implementation, phishing prevention and tech debt remediation for clinical environments.
Carlos-Raul Sanchez of Fortinet addresses cybersecurity challenges in cyber-physical healthcare systems, covering network segmentation for medical devices, OT visibility frameworks and AI governance for infrastructure security.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Frank Lange of Anomali discusses how generative AI transforms SOC capabilities from reactive incident response to proactive threat hunting, optimizing SIEM performance and addressing response speed challenges.
Urvish Acharya of Birla Carbon and Sriranga Narasimha of Reliance Industries debate breach accountability, examining AI-powered deepfakes, detection systems and proactive defense strategies against emerging threats.
Gil Levonai of Hunters and Morten Østergaard of The Berner Group discuss practical AI implementation in SOCs, automation, transparency, and balancing AI benefits with human oversight and analyst development.
Mohsan Tanvir of Magnet Forensics shares actionable tips on aligning DFIR teams with organizational objectives, measuring return on security investment, and demonstrating how digital forensics delivers tangible business value.
Explore the OWASP Top 10 for LLM Applications!
Zain Abdurehman discusses comprehensive employee awareness training strategies to strengthen organizations' first line of defense against cyberattacks and change mindsets toward security.
Zechariah Akinpelu of Unity Bank, Everett Bates of Crunchyroll and Tarek Ahmed of Cenlar FSB explore multi-faceted protection strategies, AI-powered anomaly detection and adaptive access controls for hybrid and cloud-native environments.
Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.
Uday Deshpande of Larsen & Toubro explores maximizing internal talent, bridging IT-OT silos and embedding zero trust principles for cohesive security operations.
Charmaine Valmonte, Mario Demarillas and David Siah outline key steps for developing AI governance frameworks, covering responsible AI guidelines, appropriate human oversight and effective governance structures for deploying AI.
Shishir Kumar Singh, Vinay Simha and Matthias Yeo discuss strategies for moving beyond AI pilot projects to full integration, aligning initiatives with strategic objectives and leveraging AI for sustainable innovation.
Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.
Meghan Hollis-Peel, Shuchi Agrawal and Elena Michaeli discuss intelligent systems for operational efficiency, embedded security measures and flexible infrastructure for complex workloads.
Mike Manrod, Andres Andreu and Phillip Davies explore integrating AI into daily security functions, data management for AI models and best practices for implementing AI within security architecture while maintaining scalability.
1 2 3 4 5 Next