AI is rapidly transforming cybersecurity - used by both attackers and defenders to outsmart one another in real time. Ethical hackers now face a new frontier where AI-driven threats demand AI-powered defenses. A 60-minute live session exploring how AI is reshaping ethical hacking, evolving tactics of cybercriminals, and the strategies you need to safeguard organizations in this new era. What you’ll learn:\n1. How AI is being weaponized in modern cyberattacks.\n2. Defensive use cases of AI in ethical hacking.\n3. Real-world examples of AI vs. AI in action.\n4. Skills and tools every ethical hacker should master.
talk-data.com
Topic
cybersecurity
28
tagged
Activity Trend
Top Events
Before launching an attack, cybercriminals exploit OSINT to map your digital and physical world. From crafting convincing spear phishing emails to enabling real-world intrusion, they turn public data into powerful weapons.
Discussion by consortium members on the CIISAp apprenticeship program that links rigorous academic classes and training with real-world job rotations at leading industrial companies to help students identify and prevent cyber vulnerabilities and attacks on industrial control systems and OT, IT networks, and platforms run on the Industrial Internet of Things (IIoT).
Discussion by members of the ICS Village consortium about the design and launch of the CIISAp apprenticeship program that links rigorous academic classes and educational training with real-world job rotations at leading industrial companies to help students identify and prevent cyber vulnerabilities and attacks on industrial control systems (ICS) and operational technologies (OT).
Cyber Data Platform - A greenfield platform protecting Tesco group from the ever-growing threats in cybersecurity
Join expert-led webinar to explore the latest trends in network security—from AI-powered threat detection to resilient network architectures and shifting compliance standards. Gain practical insights to strengthen your defenses and future-proof your systems.
This session will provide actionable insights into the impact of deepfakes on business security and share effective tools and techniques to protect against these AI-powered threats.
Online webinar exploring how AI is transforming ethical hacking and cybersecurity, including AI-driven innovations, proactive threat detection, ethical dilemmas, and actionable strategies.
Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events — have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.
Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector and ask them your questions!
This session explains why ICS/OT-directed ransomware is not likely to happen and covers IT and OT–related cyber incidents, helping attendees understand potential impacts on industrial processes and how to select cost-effective cyber defense solutions to ensure facility operating safety, reliability, and performance (SRP).
Join our Complimentary webinar, 'AI in Cybersecurity: Defending Against Tomorrow’s Threats Today' to discover how integrating AI into your security framework can streamline threat detection, improve response times, and foster a proactive security culture. This exclusive webinar explores the use of AI in cybersecurity. Equip your team with this exclusive opportunity to learn how to harness the power of AI to effectively defend against cyber threats and safeguard your organization’s digital landscape. What You Will Learn: How AI boosts cybersecurity defenses; Integrating AI into business security framework; Streamlining threat detection and response times; Combating emerging threats with AI; Fostering a proactive AI-driven security culture.
Date: 2024-08-29. Exclusive webinar exploring the latest upgrades in cybersecurity with CompTIA Security+ SY0-701 from SY0-601, equipping your team with advanced cybersecurity skills and knowledge, elevating your organization's skills in risk assessment, incident response, and security controls. What You Will Learn: 1) Key Updates from SY0-601 to SY0-701 2) Cyber Attack Identification and Mitigation 3) Secure Virtualization & Application Deployment 4) Protocols and Encryption Best Practices 5) Regulatory Compliance in Cybersecurity.
Panel discussion on whether medical devices and healthcare/building control systems are designed with cybersecurity in mind, safe updating and upgrading, legacy systems, and relevant regulations. Features four industry panelists.
Panel discussion on cybersecurity design for medical devices, healthcare and building control systems, safe updating and upgrading, legacy systems, and applicable regulations.
Overview of LOGFORCE's AI technology in cybersecurity and beyond, covering Real-Time Correlations of Non-Linear Events, Enhancing Transparency in AI, Future-Proof Solutions, and SynA: The Synthetic Analyst. Hosted by Gio Pecora.
This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.
Examines the use of a model-driven framework for ICS/OT cybersecurity, how it defines the requirements for tools, and where AI can fit into this mix.
Date: 2024-03-06. This talk discusses why GPS and AIS signals are attacked, including spoofing and jamming, and explores the geopolitical implications. It covers how GPS and AIS underpin critical infrastructures and digital networks, and the strategic risks for maritime and global systems.
This talk discusses why GPS and AIS attacks are occurring, including spoofing and jamming, and explores the geopolitical implications for critical infrastructure and maritime operations.