Panel: The State of AI in Cybersecurity....
Zachary Hanif, Senior Director of Machine Learning, Capital One
Matt Hayden, Assistant Sec
Leveraging Active Defense for AI/ML based Cyb....
Amin Tora, Distinguished Engineer, ARAMCO
Adversaries are actively engaged to compromise
Get out of my cloud! Detecting cloud enumerat....
Samira Eisaloo, Security Research, Advanced Threat Analytics, eSentire
Tim Steinbach, Mana
Predictive Cyber Risk....
V.S. Subrahmanian, The Dartmouth College Distinguished Professor in Cybersecurity, Technology and So
Using AI for Third-Party Risk Management....
JJ Asongu, VP Supplier Assurance Services, JP Morgan Chase & Co
Many companies are realiz
Panel: Protecting Remote Workers with AI....
Parthasarathi Chakraborty, Associate VP, Cloud Security, Cyber Innovation and R&D, Humana
Home Grown Machine Learning Implementation fo....
Brennan Lodge, Data Scientist Team Lead, Goldman Sachs
Security Incident Response Teams (
Guard Against Cybersecurity Threats with Grap....
Gaurav Deshpande, VP, Marketing, TigerGraph
Abhishek Mehta, Director Field Engineering, Ti
Panel: Staying Secure While Maintaining Priva....
Vaibhav Garg, Sr. Director, Comcast Cable
Lisa Barksdale, SVP, Business Privacy Officer,
Panel: Data Security and Risk Management....
Kyle Reidell, Cyber Warfare Operations Officer, United States Air Force
Gary Jones, Assoc
General AI Risks from a Legal and Regulatory ....
Erin Kubota, VP and Senior Counsel, Wells Fargo
This talk discusses general AI risks from a legal a
Secure and Private Data Collaboration Across ....
Robin Roehm, Chief Executive Officer, APHERIS
In this session, we explain how to empower organizati
Transfer Learning Applications and Deep Fake ....
Mark Sherman, Director, Software Engineering Institute, Carnegie-Mellon University
The Use of Quantum-Enabled Deep Learning Algo....
Raul Rodriguez, Dean, School of Business, Woxsen University
The use of quantum computing
Brain Waves Authentication....
Prasanth Nandanuru, Engineering Manager, Wells Fargo
Today, consumers across different ma
Motion Based Behavioral Biometrics: Implicit ....
John Whaley, Founder & CEO, UnifyID
How do you identify people? What is it that makes you,
Simultaneously Reducing Costs and Cyber Risk ....
Paulo Shakarian, CEO, CYR3CON
In the age of COVID-19, many enterprises are experiencing b
Protecting IAM - Graphs, AI and Zero Trust....
Gal Diskin, CTO and Co-Founder, Authomize
The identity perimeter era is here. Protecting
Hunters XDR - Accelerating Detection and Resp....
Michael Persechini, VP Sales, Hunters
The surge in attack surfaces and silos between dete
Adversary Infrastructure: A New Approach to U....
Jonathan Candee, Chief Revenue Officer, HYAS
Cyber adversaries are repeat offenders that
DataDistiilr: Making any Data Easy to Query a....
Charles Givre, CEO, DataDistillr
One of the biggest challenges in data analytics, and cyber securit
Self Service Cloud Environments - With Infras....
Ohad Maislish, CEO, env0