chat
expand_more

The Convergence of AI + Cybersecurity: Announcing Season 3

Join us for Season 3 of The Convergence of AI + Cybersecurity as we explore deepfakes, the evolving role of the SOC, and the intricacies of AI-native security.
September 3, 2024

The rapid proliferation of AI continues to reshape the digital landscape, making both its promise and peril more apparent. We've seen how generative AI tools like ChatGPT can revolutionize workflows and empower businesses. But with that power comes a darker side, as cybercriminals increasingly harness AI to craft sophisticated, large-scale attacks that threaten organizations worldwide.

In response to these growing concerns, we are excited to bring you the third season of our web series, The Convergence of AI + Cybersecurity. This season will dive even deeper into the transformative intersection of AI and cybersecurity—exploring the latest challenges and strategies needed to safeguard your organization.

Season 3 will feature the following sessions and speakers:

  • Chapter 7 | Diving Into the Deep: How Deepfakes Will Change Cybercrime
    • Tyler Cohen Wood, Cofounder of Dark Cyptonite and Former Senior Intelligence Officer at the U.S. Defense Intelligence Agency
    • Mike Britton, CISO at Abnormal Security
  • Chapter 8 | Sock It to the SOC: How AI Will Change the Role of the SOC Team
    • David Kennedy, Founder & Chief Hacking Officer at TrustedSec and Binary Defense

    • Mick Leach, Field CISO at Abnormal Security

  • Chapter 9 | Analyzing the Black Box: A Crash Course in AI-Native Cybersecurity
    • Dr. Rumman Chowdhury, Responsible AI Fellow at Harvard University; Former Director of AI Ethics at Twitter

    • Dan Shiebler, Head of AI at Abnormal Security

Register Now

Don’t Miss the Most Popular Web Series on Cybersecurity + AI

If you joined us for the first two seasons, you know all about the invaluable insights offered by industry leaders. If you haven’t had the opportunity to attend previous sessions, now is your chance to catch up and prepare for the AI-powered future.

Here are a few more details on what you can expect from this season:

Chapter 7 | Diving Into the Deep: How Deepfakes Will Change Cybercrime

Wednesday, September 11, 2024 | 1:00 pm ET

Deepfake technology is poised to revolutionize cybercrime, blending reality and digital manipulation. In this session, cybersecurity expert Tyler Cohen Wood and Abnormal CISO Mike Britton discuss how cybercriminals weaponize deepfakes, from phishing schemes to eroding trust in digital content. They’ll also share predictions on when deepfakes will become an unavoidable threat. Join us to understand the risks and learn how to protect against the growing dangers of deepfakes.

Chapter 8 | Sock It to the SOC: How AI Will Change the Role of the SOC Team

Wednesday, September 25 | 1:00 pm ET

AI is transforming the security operations center (SOC), automating tasks and enhancing threat detection. In this webinar, seasoned SOC experts explore how AI-driven technologies are reshaping the SOC's role, from evolving skill sets to the potential for AI to augment or replace human intelligence. Learn how your SOC team can adapt to these changes and thrive in an AI-driven cybersecurity world.

Chapter 9 | Analyzing the Black Box: A Crash Course in AI-Native Cybersecurity

Wednesday, October 9, 2024 | 1:00 pm ET

AI is becoming central to cybersecurity, which makes understanding its complexities crucial. This session demystifies the "black box" of AI-driven security, covering essential concepts, the risks of opaque AI models, and strategies for transparency and accountability. Learn from leading AI security experts how to navigate AI algorithms and better protect your organization in this rapidly evolving landscape.

As a reminder, all three sessions qualify for CPE credits from ISC2. To claim your credits, you can join live or watch on-demand after the event.

Explore the Future of AI and Cybersecurity

In this ever-transforming cyber frontier, understanding the dual nature of AI—both as a tool for innovation and a weapon for exploitation—is crucial for security leaders everywhere.

Don’t miss your chance to learn practical insights about this critical topic. Whether you're new to the series or continuing the journey, Season 3 of The Convergence of AI + Cybersecurity will equip you with the knowledge needed to protect your organization from emerging threats.

Secure your spot for Season 3 by registering today.

The Convergence of AI + Cybersecurity: Announcing Season 3

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Manufacturing Industry Attack Trends Blog
New data shows a surge in advanced email attacks on manufacturing organizations. Explore our research on this alarming trend.
Read More
B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More