We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Cybersecurity Implications of AI Summit 2024

Search

Clear Expand Collapse

Accelerating Scams & Deepfakes in the AI Era

Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.

Price
Course duration Duration: 30 minutes

AI & Supercomputing: The Power of Duo Driving the Future of Tech

Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.

Price
Course duration Duration: 40 minutes

AI Value Simplified

Kush Sharma, Dr. Denise Turley and Sergio Trindade share strategies for effectively communicating AI value to boards, covering realistic expectations, quantifiable benefits, strategic metrics and best practices for articulating ROI to stakeholders.

Price
Course duration Duration: 30 minutes

AI vs. AI: The Battle for Cybersecurity's Future

Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.

Price
Course duration Duration: 30 minutes

AI-Powered Cyberattacks: Facing the Future of Threats

Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.

Price
Course duration Duration: 20 minutes

Building an AI Governance Framework: Essential Steps

Charmaine Valmonte, Mario Demarillas and David Siah outline key steps for developing AI governance frameworks, covering responsible AI guidelines, appropriate human oversight and effective governance structures for deploying AI.

Price
Course duration Duration: 35 minutes

Building an AI-First Organization: Realistic or Hype?

Shishir Kumar Singh, Vinay Simha and Matthias Yeo discuss strategies for moving beyond AI pilot projects to full integration, aligning initiatives with strategic objectives and leveraging AI for sustainable innovation.

Price
Course duration Duration: 30 minutes

Building Stronger Defenses With AI

Mike Manrod, Andres Andreu and Phillip Davies explore integrating AI into daily security functions, data management for AI models and best practices for implementing AI within security architecture while maintaining scalability.

Price
Course duration Duration: 30 minutes

Collaborating With AI to Enhance Security

Arielle Baine and Mario Rivas explore how AI and human expertise complement each other in cybersecurity, covering the optimization of workflows that integrate AI tools with human intuition and training security teams to work effectively with AI.

Price
Course duration Duration: 25 minutes

Ethical AI in Cybersecurity

Jayant Narayan and Pedro Tavares examine ethical considerations in AI-powered cybersecurity, focusing on identifying and mitigating bias, enhancing transparency in AI models, and balancing robust security with privacy protection.

Price
Course duration Duration: 35 minutes

Integrating AI Into Cybersecurity Operations

Wan Roshaimi Bin Wan Abdullah discusses AI governance structures, unique security risks of AI-powered applications, and methods to implement AI across organizations to build cyber resiliency in today's rapidly evolving threat landscape.

Price
Course duration Duration: 30 minutes

Mitigating AI Supply Chain Risks

Patrick Bangert, Noah Ringler and Rick Doten explore AI supply chain risks, focusing on vendor security assessment, implications of commercial AI solutions, and strategies to mitigate risks across converging OT and IT ecosystems.

Price
Course duration Duration: 35 minutes

Preparing Tech Infrastructure for Gen AI

John Chan and Aaron Hand discuss foundational infrastructure requirements for successful generative AI adoption, covering cloud computing resources, advanced security measures and strategies for addressing technology integration challenges.

Price
Course duration Duration: 35 minutes

Resilience and Trust at AI and Cybersecurity's Crossroads

Mary Purk and Brian Brackenborough examine AI's role in strengthening cyber defenses, the importance of human oversight, ethical challenges of automated decisions and key strategies for developing AI-resilient security frameworks.

Price
Course duration Duration: 45 minutes

Secure AI 2025: Lessons We've Learned

Dr. Anton Chuvakin of Google Cloud shares insights on securing AI in production environments, adversarial AI use, emerging governance best practices, agentic AI risks, and AI's impact on cybersecurity resilience in 2025 and beyond.

Price
Course duration Duration: 25 minutes

Simplifying Threat Detection and Response Using AI

Kunal Sehgal and Steven Sim Kok Leong explore predictive threat intelligence frameworks, AI-powered security operations orchestration, and implementing Detection-as-Code solutions to combat increasingly sophisticated AI-driven cyberattacks.

Price
Course duration Duration: 35 minutes

Solving the Supply Chain Security Puzzle Through AI

Sudhir Tiku and Abid Adam discuss AI-driven supply chain visibility, early vulnerability detection and frameworks for ensuring accountability in AI-based threat detection systems to address growing supply chain security challenges.

Price
Course duration Duration: 25 minutes

The Future of Digital Identity in an AI-Powered World

Jeremy Grant and Dennis Gamiello explore how financial firms must embrace public key cryptography and digitally signed credentials to enhance verification and counter sophisticated AI-enabled identity attacks in an increasingly AI-powered world.

Price
Course duration Duration: 40 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement