Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.
Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.
Kush Sharma, Dr. Denise Turley and Sergio Trindade share strategies for effectively communicating AI value to boards, covering realistic expectations, quantifiable benefits, strategic metrics and best practices for articulating ROI to stakeholders.
Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.
Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.
Charmaine Valmonte, Mario Demarillas and David Siah outline key steps for developing AI governance frameworks, covering responsible AI guidelines, appropriate human oversight and effective governance structures for deploying AI.
Shishir Kumar Singh, Vinay Simha and Matthias Yeo discuss strategies for moving beyond AI pilot projects to full integration, aligning initiatives with strategic objectives and leveraging AI for sustainable innovation.
Mike Manrod, Andres Andreu and Phillip Davies explore integrating AI into daily security functions, data management for AI models and best practices for implementing AI within security architecture while maintaining scalability.
Arielle Baine and Mario Rivas explore how AI and human expertise complement each other in cybersecurity, covering the optimization of workflows that integrate AI tools with human intuition and training security teams to work effectively with AI.
Jayant Narayan and Pedro Tavares examine ethical considerations in AI-powered cybersecurity, focusing on identifying and mitigating bias, enhancing transparency in AI models, and balancing robust security with privacy protection.
Wan Roshaimi Bin Wan Abdullah discusses AI governance structures, unique security risks of AI-powered applications, and methods to implement AI across organizations to build cyber resiliency in today's rapidly evolving threat landscape.
Patrick Bangert, Noah Ringler and Rick Doten explore AI supply chain risks, focusing on vendor security assessment, implications of commercial AI solutions, and strategies to mitigate risks across converging OT and IT ecosystems.
John Chan and Aaron Hand discuss foundational infrastructure requirements for successful generative AI adoption, covering cloud computing resources, advanced security measures and strategies for addressing technology integration challenges.
Mary Purk and Brian Brackenborough examine AI's role in strengthening cyber defenses, the importance of human oversight, ethical challenges of automated decisions and key strategies for developing AI-resilient security frameworks.
Dr. Anton Chuvakin of Google Cloud shares insights on securing AI in production environments, adversarial AI use, emerging governance best practices, agentic AI risks, and AI's impact on cybersecurity resilience in 2025 and beyond.
Kunal Sehgal and Steven Sim Kok Leong explore predictive threat intelligence frameworks, AI-powered security operations orchestration, and implementing Detection-as-Code solutions to combat increasingly sophisticated AI-driven cyberattacks.
Sudhir Tiku and Abid Adam discuss AI-driven supply chain visibility, early vulnerability detection and frameworks for ensuring accountability in AI-based threat detection systems to address growing supply chain security challenges.
Jeremy Grant and Dennis Gamiello explore how financial firms must embrace public key cryptography and digitally signed credentials to enhance verification and counter sophisticated AI-enabled identity attacks in an increasingly AI-powered world.