InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From Misuse to Abuse - AI Risks and Attacks (Cyber Security Master Class: Episode 19)

Presented by

Etay Maor, Vitaly Simanovich

About this talk

Cybercriminals are not only looking into ways they can utilize AI but also how they can abuse AI systems and circumvent AI-based security controls. Cato CTRL’s (Cyber Threats Research Lab) latest Cybersecurity Masterclass takes you into the tactics threat actors use to misuse and abuse AI. Join Cato Networks’ Etay Maor, Chief Security Strategist, and Vitaly Simonovich, Threat Intelligence Researcher, as they explore the tactics and techniques threat actors use and which AI weak points they target. What’s covered: Beyond the headlines - how cybercriminals are really using AI How Generative AI is being exploited by threat actors Real-world examples of Generative AI in attacks and under attack The dangers of private GPTs and how they can be targeted
Cato Networks | SASE

Cato Networks | SASE

23277 subscribers336 talks
Weekly webinars on NG network & security architecture
Cato Networks provides organizations with a cloud-based and secure global SD-WAN that replaces rigid and expensive MPLS and network security point products -- to power the digital business. Cato connects all data centers, branches, mobile users, and cloud resources into a global, optimized cloud network that is tightly secured by a cloud-based network security stack and backed by expert managed security services. Cato cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users and cloud datacenters into the WAN.
Related topics