Lior Div, former CEO and co-founder of Cybereason, discusses how hackers use artificial intelligence to become smarter and more effective. He also emphasizes that cybersecurity defenders need to harness the power of AI more than ever to stay ahead of attackers.
As cyberthreats continue to evolve, organizations are increasingly turning to advanced technological solutions to mitigate risks. Kris Burkhardt, CISO, Accenture, discusses how organizations are adopting passwordless systems and using generative AI to bolster their defenses.
Mickey Bresman, co-founder and CEO of Semperis, discusses why ransomware actors increasingly target identity systems and backup files. He explains the importance of securing these systems to prevent attackers from crippling organizations and extorting ransom payments.
As generative AI races into boardrooms, Datta Junnarkar, CIO of Maritime at Boeing, champions training and harnessing employee innovation to master rapid technological advances. "We wanted to listen to what our employees are trying to do," Junnarkar said.
As businesses increasingly integrate artificial intelligence into their cybersecurity strategies, they encounter a double-edged sword. At the World Economic Forum this year, more than 55% of respondents believed attackers benefit more from AI, which is alarming, said Nayaki Nayyar, CEO of Securonix.
Edgard Capdevielle, president and CEO, Nozomi Networks, discusses how new SEC disclosure regulations are reshaping cybersecurity strategies in industrial organizations. He also shares insight on legacy OT systems, IT-OT convergence and the need for industry collaboration.
Lou Fiorello, vice president and general manager, security products, ServiceNow, highlights how automation and emerging AI technologies can significantly improve security operations. Firms that have leaned in on automation aspects can see upward of 90% to 95% improvement in some metrics.
The widespread use of internet of things devices today presents challenges, as most of those devices are insecure. IoT devices are different from IT devices, but artificial intelligence can address IoT security challenges, said May Wang, CTO of IoT security at Palo Alto Networks.
HackerOne CEO Marten Mickos discussed assessing the risks associated with generative AI and the role of red teaming exercises and bug bounty programs in securing AI implementations. "AI is good, but only when the human is the steward and governing it," he said.
As CISO at Arista Networks, Rahul Kashyap oversees cybersecurity operations and incubates business initiatives. If you look back to 10 years ago, it was a different monolithic enterprise network, Kashyap said, emphasizing the complexity of contemporary networks.
Hackers are using generative AI to boost their malicious activities and are making progress toward autonomous, AI-driven internet exploitation. Casey Ellis, founder of Bugcrowd, highlights that while bias is a key AI concern, integrating AI safely into existing processes is a bigger challenge.
Secure code has been a hot topic among cybersecurity practitioners. Even today, developers are struggling to produce fast and secure code - a problem that's been around for 20 to 25 years, said Pieter Danhieux, CEO of Secure Code Warrior. The Developer Trust Score may just be the solution.
While critical infrastructure operators have historically focused on securing their operational technology networks by preventing intrusions, the ongoing increase in nation-state attacks demands they master the ability to "identify, detect, respond and recover," said Robert M. Lee, CEO of Dragos.
Edna Conway, CEO, EMC Advisors, and Wendy Nather, director, strategic engagements, Cisco, discuss the persistent challenges and evolving dynamics in cybersecurity. They emphasize the importance of historical awareness, effective information sharing and leveraging AI for predictive risk management.
As threats become more sophisticated, the demand for integrated security platforms is at an all-time high. This demand is driven by the operational inefficiencies of traditional security models, said Shlomo Kramer, co-founder and CEO, Cato Networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.