Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Join Ari Redbord in an exploration of how TRM Labs aids law enforcement in tracking crypto fraud and financial crime. Learn about crypto's dual role as a tool for illicit actors and investigators, the challenges of noncompliant VAPs, and the need for regulation to enhance compliance and user safety.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
Learn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.
Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Nathan Swain of Binance, Max Kington of BNP and Surinder Lall of Paramount analyze AI-driven cyberthreats, from deepfakes to automated phishing, sharing real-world examples and practical defense strategies.
David Tsao, Nicole Ford and Suha Can share insights on integrating AI into security operations, addressing CISO challenges and developing risk mitigation strategies.
Jake Gillen of Expel shares insights on ethical AI decision-making in cybersecurity, regulatory challenges, and cross-industry collaboration against AI-enhanced threats.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
Join Rajeev Batra and Sumit Gupta in an exploration of ChatGPT’s potential, limitations and business use cases.
Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.
David Dechaux of Technip and Anthony Chiapello of Snyk share insights on implementing AppSec in a non-software company, addressing challenges across distributed teams, multiple languages and varying expertise levels.
Explore the OWASP Top 10 for LLM Applications!
Shishir Kumar Singh, Vinay Simha and Matthias Yeo discuss strategies for moving beyond AI pilot projects to full integration, aligning initiatives with strategic objectives and leveraging AI for sustainable innovation.
Mike Manrod, Andres Andreu and Phillip Davies explore integrating AI into daily security functions, data management for AI models and best practices for implementing AI within security architecture while maintaining scalability.
Arielle Baine and Mario Rivas explore how AI and human expertise complement each other in cybersecurity, covering the optimization of workflows that integrate AI tools with human intuition and training security teams to work effectively with AI.
Jayant Narayan and Pedro Tavares examine ethical considerations in AI-powered cybersecurity, focusing on identifying and mitigating bias, enhancing transparency in AI models, and balancing robust security with privacy protection.
Wan Roshaimi Bin Wan Abdullah discusses AI governance structures, unique security risks of AI-powered applications, and methods to implement AI across organizations to build cyber resiliency in today's rapidly evolving threat landscape.
John Chan and Aaron Hand discuss foundational infrastructure requirements for successful generative AI adoption, covering cloud computing resources, advanced security measures and strategies for addressing technology integration challenges.
Dr. Anton Chuvakin of Google Cloud shares insights on securing AI in production environments, adversarial AI use, emerging governance best practices, agentic AI risks, and AI's impact on cybersecurity resilience in 2025 and beyond.
Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.
Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.
Charmaine Valmonte, Mario Demarillas and David Siah outline key steps for developing AI governance frameworks, covering responsible AI guidelines, appropriate human oversight and effective governance structures for deploying AI.
Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.
Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.
Jeremy Grant and Dennis Gamiello explore how financial firms must embrace public key cryptography and digitally signed credentials to enhance verification and counter sophisticated AI-enabled identity attacks in an increasingly AI-powered world.
Sudhir Tiku and Abid Adam discuss AI-driven supply chain visibility, early vulnerability detection and frameworks for ensuring accountability in AI-based threat detection systems to address growing supply chain security challenges.
D Parthasarathy shares insights on transitioning from vulnerability management to comprehensive risk management, with a focus on building risk operations centers and implementing proactive security approaches.
Soumya Datta, Bastin Robin and Sathyan Murugesan explore AI's cybersecurity transformation, discussing the unique security risks of AI applications, making AI ubiquitous for cyber resiliency, and redefining security practices.
Ganesh Chellappa of ManageEngine explores how adaptive access controls use AI to balance security and user experience, discussing solutions beyond traditional measures and integrating AI into zero trust strategies.
Pragatheesh B and Utkarsh Sawant discuss strategies for addressing IoT vulnerabilities, leveraging AI and automation in threat response, and building resilience against future IoT attacks.
Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.
Deepak Kumar, IDRBT director, explores cyberthreats in India's banking sector, discussing digital risks, DPDP Act implications and strategies to strengthen cyber resilience in financial systems.
Avneesh Pandey, CGM and CISO at SEBI, addresses complex compliance demands facing organizations, exploring automation strategies and risk-based approaches to enhance cyber resilience.
Ravindra Ramnani from Elastic demonstrates how AI-powered security analytics accelerates threat detection and response, improving alert triage and investigations through automation.
Urvish Acharya of Birla Carbon and Sriranga Narasimha of Reliance Industries debate breach accountability, examining AI-powered deepfakes, detection systems and proactive defense strategies against emerging threats.
Ramesh Gurram, CISO at BSE India, examines securing modern payment rails against emerging threats like AI fraud and deepfakes while addressing regulatory challenges in fragmented financial ecosystems.
Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.
Colin Bell of HCLSoftware explores AI-driven cybersecurity challenges including privacy concerns, data misuse and regulatory compliance, focusing on practical privacy-by-design implementation in AI systems.
Vinai Kumar Kanaujia of NSCS discusses integrating AI with cybersecurity policy frameworks that balance innovation, compliance and data privacy, while ensuring global collaboration against evolving threats.