During this panel, industry experts (showed above) discussed the changing roles within the cybersecurity industry due to AI. We’ve included a short transcription of the panel, beginning at 28:38 of the webinar. https://youtu.be/QWzprtSHMpg?t=1718 Watch the full webinar here. Brennan Lodge, Goldman Sachs: Are there roles within your certain SOCK that… Read More
During this panel, industry experts (showed above) discussed how COVID-19 is affecting cybersecurity. We’ve included a short transcription of the panel, beginning at 6:56 of the webinar. https://youtu.be/QWzprtSHMpg?t=416 Watch the full webinar here. Brennan Lodge, Goldman Sachs: Let’s get right into it. The first question is, and this is apropos… Read More
Artificial Intelligence has many benefits to offer to the finance industry. But in this article, we will only talk about how it can ensure secure payments across financial transactions. Securing Payments Intelligently It has been almost 20 years since the early ecommerce websites were launched. At that time, very limited… Read More
During this panel, industry experts (showed above) discussed how hackers are using AI and the changes that they’ve noticed. We’ve included a short transcription of the panel, beginning at 15:05 of the webinar. https://youtu.be/2ZwxHHHczEA?t=905 Watch the full webinar here. Raffael Marty, Forcepoint: Now that we talk a little bit about… Read More
During this panel, industry experts (showed above) discussed AI in the Context of Cyber Adversaries. We’ve included a short transcription of the panel, beginning at 7:34 of the webinar. https://youtu.be/2ZwxHHHczEA?t=454 Watch the full webinar here. Raffael Marty, Forcepoint: How do you define AI/artificial intelligence because there is a wide variety… Read More
Serge VilvovskyCybersecurity & Big Data EngineerMIT Startup Exchange Overview In this presentation, Serge Vilvovsky, a Cyber Security and Big Data Engineer for MIT Startup Exchange, discusses some of the obstacles and solutions to protecting private and sensitive data in the cloud. Oftentimes accompanying cloud storage is cloud computing… Read More
Eliezer KanalTechnical Manager, Cyber Security Foundations, CERT DivisionCarnegie Mellon University Software Engineering Institute Introduction In this presentation Eliezer Kanal, a Technical Manager at CERT, talks about the possibilities involved with writing secure software that is not vulnerable to cyber-attacks. Developers have created many techniques to help write secure… Read More
Christopher Novak Director, Threat Advisory Research Verizon Wireless Introduction Originally, there was a poor understanding of why cyber breaches were happening. In the early 2000s, Verizon began developing standardized methodology for describing breach incidents. This helped to prioritize which breaches were most troubling or urgent. Challenge: most businesses… Read More
Mark Sherman Technical Director, Cyber Security Foundations, CERT Division Carnegie Mellon University Software Engineering Institute Introduction MITRE‘s Common Vulnerabilities and Exposures (CVE) list — nearly 150,000 incidents (and growing) — is a testament to the fact that building software that is resistant and resilient to attack remains… Read More
Wayne Chung CTO FBI Introduction The field of cybersecurity has slowly progressed from an art to a science. It has been a long and complicated journey that is still punctuated by misunderstandings and lack of rigor. The field of artificial intelligence, however, has further transformed from a science… Read More
Stay Connected
Sign up now to stay connected. Ensure you never miss an update about an event.