Hi [[ session.user.profile.firstName ]]

Is AI Being Weaponized by Cyber Criminals?

As security threats and their defenses evolve, the role of AI, ML and Big Data continue to be a debate among threat intelligence experts. Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology?

In this security webinar, CyberProof’s CEO, Tony Velleca, and VP Bruce A. Roton, debate what advanced capabilities hackers have today, how — or if — it’s evolving with the AI landscape, and what enterprises can do to defend themselves.
Recorded Apr 14 2020 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
Presentation preview: Is AI Being Weaponized by Cyber Criminals?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building a Smarter SOC in The New Normal Recorded: Sep 15 2020 64 mins
    Cyril Voisin, Sinu Peter, Moderated by Benjamin Chant
    Speakers are:
    Cyril Voisin
    Sinu Peter
    Moderated by Benjamin Chant
  • Introduction to Pro-Active Intruder Hunting - Part 1 Recorded: Sep 8 2020 48 mins
    Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
  • Using Automation and Data Analytics to Combat Increasing Cyber Threats Recorded: Sep 2 2020 49 mins
    Richard Telleria, Anand Trivedi, Halim Santoso, Abbas Kudrati
    With cyber threats increasing in quantity and complexity, what strategy should CISOs adopt in order to be prepared and protected from constant and new-age attack tactics?

    In this webinar CyberProof and Microsoft Australia security leaders will team up to discuss how the cyber security landscape has been altered due to COVID-19 and how using automation and data analytics can combat increasing cyber threats.

    Hear from security experts:

    Richard Telleria - Managing Director, UST Global
    Anand Trivedi - Head of Cyber Security Business, CyberProof
    Halim Santoso - Head of Business Development, Microsoft Australia
    Abbas Kudrati - CISO,CISM,CPDSE,CSX-P, Chief Cyber Security Advisor, Microsoft APAC
  • Best Practices Using Attack Simulations To Improve SOC Efficiency Recorded: Aug 18 2020 53 mins
    Gus Evangelakos, XM Cyber Director of Field Engineering, and R. Teall Rist, CyberProof Principal Security Architect
    When it comes to cyber attacks the speed in which you are able to respond is of equal importance as time to detect. While SIEM solutions improve visibility into attack paths, security teams also need to be able to continuously refine their cyber defense.

    In this webinar CyberProof's Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how you can improve SOC efficiency using attack simulations to:

    - Identify new attack paths
    - Optimize and automate playbooks
    - Rapidly contain and eradicate validated threats
    - Ensure potential threats are understood within the context of your business
    - Continuously validate the exposure of an asset as attacker techniques and patterns change

    Join R. Teall Rist and Gus Evangelakos on August 18th to discover how your organization can expand detection coverage and remediate risks as they emerge. Register today!
  • Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework Recorded: Aug 10 2020 45 mins
    CyberProof's CEO, Tony Velleca and VP of Security Strategy, Bruce Roton
    In this webinar CyberProof CEO, Tony Velleca and VP of Security Strategy, Bruce Roton, will shed light on how and why CyberProof uses this framework for better threat detection mapping, and how companies can benefit from implementing it into their cyber security strategy.
  • Security & Privacy Trends in the COVID-19 Era Recorded: Jul 28 2020 54 mins
    Enza Iannopollo, Senior Analyst, Security & Risk, Forrester
    Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.

    In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.

    Listen and discover how your cyber security strategy can contend with:

    - Expansion of cloud services
    - Rapid development of new applications and products
    - Increased IT complexity
    - Global privacy laws compliance
  • Focusing time, money and effort on the vulnerabilities that matter most Recorded: Jul 21 2020 49 mins
    Skybox VP of Channels - Mike Heredia, CyberProof UK - Craig Saunderson, Moderated by Howard Silverman
    Multi-layered security tools can be expensive with many struggling to understand how, or if, these investments are properly managing vulnerabilities and improving security posture. A threat-centric approach can help provide an accurate and continuous view of risk exposure to organizations.

    In this webinar CyberProof's Director of Cyber Security Sales, Craig Saunderson and Skybox Security's VP of Integrator Channels, Mike Heredia will discuss:
    • Common mistakes when trying to understand high risk vulnerabilities
    • How to prioritize vulnerabilities and speed up remediation efforts
    • What good vulnerability management should look like
    • How a threat-centric approach can help you get an accurate and continuous view of your risk exposure
  • The Essentials of a Smarter SOC in The New Normal Recorded: Jun 24 2020 61 mins
    Aman Malhotra, CyberProof Security Solutions Architect & Iftekhar Hussain, Cyber Defense Analyst, Microsoft Asia Pacific
    CISOs are facing a myriad of challenges as businesses scale down, and cyber threats escalate. While some organizations had already started adapting their SOCs for the digital transformation pre-pandemic, COVID-19 has accelerated the need.

    Join this webinar to hear from the following security experts:

    Terence Gomes, Enterprise Cyber Security Executive, Microsoft India
    Anand Trevedi, Head of Cyber Security Business, CyberProof India
    Iftekhar Hussain, Global Black Belt - Cyber Defense and Threat Analytics, Microsoft Asia Pacific
    Aman Malhotra, Cyber Security Solutions Architect, CyberProof
    Register now for insights on how your organization can adapt to the new normal amid budgetary constraints - without sacrificing security.
  • Cracking the Code: Quality Engineering Models for Continuous Delivery Recorded: Jun 16 2020 62 mins
    Featuring guest speaker, Forrester analyst, Diego Lo Giudice and UST's Head of Testing & Quality Engineering, George Ukkuru
    As continuous delivery practices accelerate the volume of releases, test teams must find ways to validate software performance faster without compromising quality. Traditional testing practices can’t keep pace with modern application developments, and scaling testing for efficiency, accuracy and speed is critical. Test Automation has become an essential element of the end to end test lifecycle in every organization. Most tool-based testing approaches fall short of addressing test lifecycle automation needs or make it quite challenging. This has paved the way to platform-centric Quality Engineering.

    Join Forrester’s expert on SDLC processes and practices--our guest speaker, Vice President and Principal Analyst Diego Lo Giudice – and UST Global’ s Head of Testing and Quality Engineering Services, George Ukkuru, for a webinar discussing the modern methods and techniques around quality engineering. Learn about how UST’s quality engineering platform, NoSkript™ can improve quality, efficiency, and cost while accelerating cycle time.

    What you will learn:
    - How to apply Shift Left and Shift Right practices for early defect identification and to minimize business risks
    - Why should a quality engineering team focus on an API-led automation approach
    - How can automated test design help to optimize test cases and reduce maintenance efforts
    - How to use prefabricated test data to improve the accuracy of Artificial Intelligence Solutions
  • Security & Privacy Trends in the COVID-19 Era Recorded: May 14 2020 55 mins
    Enza Iannopollo, Senior Analyst, Security & Risk, Forrester
    Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.

    In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.

    Listen and discover how your cyber security strategy can contend with:

    Expansion of cloud services
    Rapid development of new applications and products
    Increased IT complexity
    Global privacy laws compliance
  • Infosec in India – before, during, and after COVID-19 Recorded: May 12 2020 49 mins
    Anand Trivedi, CyberProof India's Head of Cyber Security Business
    The scope of the coronavirus pandemic, and its global and regional impacts are coming to light. The attack surface has expanded in tandem with the spread of the virus, posing higher risks for remote employees and the organizations they work for.

    COVID-19 has changed business operations in terms of cyber spend availability, while at the same time work from home security has created increased vulnerabilities.

    In this webinar CyberProof India's Head of Cyber Security Business, Anand Trivedi, will shed light on:

    - The scope of how the pandemic has affected Indian enterprises
    - New cyber security challenges
    - How CISO’s can respond and do more with less
  • COVID-19 Will Change Our Psychology And Roadmap For Intelligent Automation Recorded: May 11 2020 55 mins
    Guest Forrester’s VP and Principal Analyst Craig Le Clair and UST SmartOps' GM Sajesh Gopinath
    The latest industry insights from our featured guest Forrester’s Vice President And Principal Analyst Craig Le Clair, shares the latest industry insights that show the path forward on how companies will look to lower operating costs and build greater business resilience, to weather pandemic-driven disruption. IA consists of 19 technology categories, that combine RPA with existing and emerging AI components. To realize the potential, IA should be focused on the work personas that can benefit the most. The webinar explains the best investment approach for the five work personas that drive knowledge and administrative work for the new normal. Sign up for this webinar to learn:

    - What is IA and the appropriate role of RPA
    - What is the role of IA in the new normal, post Covid-19
    - How to apply IA in Invoicing, customer on-boarding, IMS, AMS, and contract management
    - How are enterprises driving scale while governing IA expansion
    - Learn how new players are changing the rules of the game with outcomes based service offerings
  • DevSecOps - how to do more with less Recorded: Apr 27 2020 51 mins
    Colin Domoney, CyberProof DevSecOps Security Architect
    In the wake of current pandemic-driven disruption, businesses worldwide are—and will continue to—experience budget constraints. In order for organizations to remain resilient they will need to learn how to do more with less, without compromising integrity, value or security.

    In this webinar you'll gain insights on the value of DevSecOps initiatives, including:

    -How to drive efficiencies while reducing costs
    -The long-term costs on inaction
    -Leveraging open source testing tools
    -Accelerating delivery of actionable findings to senior stakeholders
  • Is AI Being Weaponized by Cyber Criminals? Recorded: Apr 14 2020 42 mins
    Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
    As security threats and their defenses evolve, the role of AI, ML and Big Data continue to be a debate among threat intelligence experts. Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology?

    In this security webinar, CyberProof’s CEO, Tony Velleca, and VP Bruce A. Roton, debate what advanced capabilities hackers have today, how — or if — it’s evolving with the AI landscape, and what enterprises can do to defend themselves.
  • Streamlining Your Response to Cyber Attacks – An Analyst’s Perspective Recorded: Mar 18 2020 30 mins
    Hen Porcilan, Senior Security Analyst
    How does CyberProof help organizations respond to cyber threats more effectively? And how does CyberProof help cyber analysts in the day-to-day work of security operations? In this interview, cyber security analyst Hen Porcilan gives us unique insight into what it’s really like to work with CyberProof’s platform and reduce cyber security risk.
    Learning Outcomes:
    • The role of automated alerts and enrichment in streamlining cyber security processes
    • Integrating multiple tools efficiently
    • How to reduce human error in the security operations center
    • Running an SOC with a relatively small team of human analysts, whose work is augmented by artificial intelligence tools
    • Leveraging virtual analysts to reduce mean time to detect and respond
  • A Digital Chat for Financial Operations: Navigating the Path to Automation Recorded: Feb 20 2020 59 mins
    Speakers: Ramya Kannan, VP Delivery and Venkata Sankaran, Director Finance; Moderator: Sajesh Gopinath, GM UST SmartOps
    Are you in procurement or financial operations? Do you manage a huge number of vendors, the account and payment of invoices, and cash reconciliation? You probably recognize that financial operations are typically highly manual, repetitive tasks that are critical for cash flow and managing operations.

    Now you can re-imagine your finance operations with automation from extracting key data to keeping accurate accounting records, automating workflows and paying vendors on time - not too early, not late.

    Learn more to see how we at UST Global and our customers have approached modernizing financial operations with automation.
  • Pro-Active Intruder Hunting – Part 2 Recorded: Feb 18 2020 51 mins
    Bruce Roton: CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.
    This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
  • Introduction to Pro-Active Intruder Hunting - Part 1 Recorded: Jan 14 2020 49 mins
    Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
  • UST SmartOps: Reimagining IT Operations with Cognitive Computing Recorded: Jan 9 2020 46 mins
    Adnan Masood, Ph.D., Chief Architect AI/ML and Jibu George, Head of Customer Success-- UST SmartOps
    The fourth industrial revolution is upon us, and IT Operations is at the forefront. The office of the CIO is constantly evaluating how to maintain legacy systems, migrate to the latest technologies, assess operational and security risk, and making those lasting commitments for what decision-making engines are to be handled by humans versus bots. What are the challenges to your current environments in adopting intelligent automation? Learn more to see how to transform your IT Operations.
  • New Approaches To DFIR That Can Radically Reduce Your Time To Respond to Attacks Recorded: Dec 10 2019 23 mins
    Sagi Sandik, Senior SOC-DFIR Analyst at CyberProof and Howard Silverman, Head of Marketing at CyberProof
    As cyber attacks continue to evolve, many organizations find they require digital forensics (DF) to identify and thwart attacks. But what is DF, and how does it relate to security operations?
    What you will learn:
    - What is DFIR and why is it important in today’s expanding attack surface?
    - What are the essential elements (people, technologies, processes) needed for DFIR?
    - How does an effective DFIR program help security operation centers and improve performance such as mean time to response (MTTR)?
    - How can CyberProof help you optimize your DFIR and SOC team effectiveness
A Smarter SOC
CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, together with our experts and your team automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia and the technology ecosystem to continuously advance the art of cyber defense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is AI Being Weaponized by Cyber Criminals?
  • Live at: Apr 14 2020 4:00 pm
  • Presented by: Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
  • From:
Your email has been sent.
or close