Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Prashant Prashant and Rajat Kumar Kundu demonstrate realistic cyberattack simulation using Graphic Realism Framework, showing how attackers exploit vulnerabilities in industrial control systems.
Josh Iroko shares Mandiant's latest threat intelligence on exploit vectors, advanced persistent threat techniques and cloud misconfigurations requiring targeted monitoring approaches.
Ramzi Naouali explores security-by-design principles, human-centric AI approaches and policy frameworks balancing innovation with regulatory compliance in healthcare AI implementation.
Anirban Ghosh of Black & Veatch explores shifting from vulnerability management to consequence-driven cybersecurity, covering all-vector protection, process safety integration and holistic approaches for critical infrastructure.
Brendan Clace presents a practical framework for high-functioning remote cybersecurity teams, covering communication optimization, collaboration methods and recognition systems.
Anton Kouznetsov explores risk-based approaches for converged environments, building collaborative IT-OT relationships and lessons from real-world critical infrastructure deployments.
Michael Schwab outlines AI governance frameworks for government entities, covering data accountability, human-in-the-loop requirements and executive support for enterprise AI programs.
Leonardo Ovidio, Bernadette Silva-Nguyen, Kashif Parvaiz and Shelly Davidson discuss business acumen, stakeholder management and talent development for future cybersecurity leaders.
Richard Larose analyzes sophisticated state-sponsored actors like Volt Typhoon, ransomware's impact on essential services, and exploitation of edge devices for cyberwarfare positioning.
Chris Johnson presents a four-phase framework for building OT cyber resilience, covering threat landscapes, regulatory requirements and implementation strategies for critical infrastructure sectors.
Brendan Clace, Henry Bosch and Leonardo Ovidio address cybersecurity's mental health crisis, sharing strategies for preventing burnout, maintaining morale and creating psychological safety.
Mark Brosseau shares real-world experiences implementing reinforcement learning AI for industrial control, covering practical strategies, cybersecurity considerations and future implications.
Kashif Parvaiz demonstrates how to secure third-party relationships through procurement integration, risk assessment methods and evaluation approaches for healthcare and critical infrastructure.
Craig Seidler examines how generative AI transforms ransomware tactics through deepfake social engineering, polymorphic malware and AI agent hijacking for sophisticated attacks.
Amogh Bhosle shares real-world insights from pharmaceutical smart factory transformation, covering cyberthreats, patch management and workforce training for digitalized operations.
Keith Lawson, Roger Dery, Richard Larose, Renny Kochubaby and Martin Laberge discuss Bill C-26's status, regulatory frameworks and OT scope definitions for critical infrastructure.
Manolito Liwanag and Lina Dabit reveal how AI-driven bots weaponize networks for disinformation, conduct sophisticated attacks and target healthcare data for dark market sales.