In this exclusive one-on-one discussion, we will hear from Chris Calvert, Co-Founder and Product VP for Respond Software, to get his insights on:
Is AI falling short?
How do we successfully balance human and machine approaches to security?
How do we get on the right path?
A new defense company has been formed in United Arab Emirates, combining three government-owned and 22 independent companies in an effort to develop technologies to help thwart cyberattacks and repel military drones.
Elizabeth Denham, the U.K.'s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition. She also calls on the government to create a statutory code of practice for police use of the technology.
In the new world of ubiquitous connected devices and myriad cybersecurity alerts, artificial intelligence and machine learning can enable autonomous response - a boon to overworked security teams, says Darktrace's Mariana Pereira.
The enterprise has embraced the public cloud. But tension and misalignment between CloudOps and business stakeholders impedes your organization from achieving all that it can.
Moreover, customers expect speed, scale and business agility from the cloud. CloudOps require continuous governance of security,
in this session we'll first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We'll then dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world...
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.
Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.
The Cyber Exposure Score is an objective rating of cyber risk derived through data science-based measurement. The score is automatically generated daily through machine-learning algorithms that combine vulnerability data with other risk indicators such as threat intelligence and asset criticality. The Cyber Exposure...
Cybersecurity has become a popular agenda item with the board. But, conveying the complexities of cyber risk management to senior executives and the corporate board isn't easy.
To communicate cyber risk effectively, you must find a common business language grounded in risks, opportunities and business impact. Save...
U.S. senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy.
In this presentation, hear about the recent history and the future of technology and consumer patterns and drivers. This session explores the continued proliferation of social media, IoT and artificial intelligence and the implications of this technology. The huge rise in cybercrime and fraud highlights the challenges...
Airports across the globe are increasingly leveraging facial recognition technology to verify and authenticate passengers. But some privacy advocates have raised concerns, especially in India, where several airports are ramping up facial recognition programs.