October 25, 2023 10:00 am - 10:50 am
Join Abnormal Security to discuss recent trends in advanced accounting attacks that have been uncovered utilizing a real-time behavioral modeling platform. Work backward from the threat actor's point of view to better understand an attack from inception to payout.
David Wolf, Vice President, CISSP, CEH
Just Solutions, Inc.
October 25, 2023 10:00 am - 11:50 am
In today's rapidly evolving digital landscape, ensuring the security and resilience of your business has never been more critical. The role of a Chief Security Officer (CSO) is pivotal in safeguarding your organization against a multitude of threats, from cyberattacks to physical security breaches. However, many businesses, especially smaller ones, struggle with the challenges of hiring a full-time CSO.
Enter the concept of a Virtual Chief Security Officer (vCSO). This innovative approach leverages the expertise of seasoned security professionals to provide tailored, on-demand security guidance without the need for a permanent, in-house CSO.
Join us for our presentation, "Unlocking the Power of a Virtual Chief Security Officer," as we delve into the world of vCSOs and explore how this virtual role can transform your organization's security posture and overall resilience.
Mark Brozek, Director of Product Marketing
October 25, 2023 1:00 pm - 1:50 pm
AI giveth and AI taketh away: the growing accessibility of AI empowers businesses as well as cybercriminals, increasing both opportunities and risks. IT leaders must develop strategies that allow the business to thrive while also controlling data privacy and stopping increasingly advanced (and damaging) cyberattacks.
Join us to learn about:
October 25, 2023 2:00 pm - 2:50 pm
There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This talk will explore: