Hi [[ session.user.profile.firstName ]]

Is AI Being Weaponized by Cyber Criminals?

As security threats and their defenses evolve, the role of AI, ML and Big Data continue to be a debate among threat intelligence experts. Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology?

In this security webinar, CyberProof’s CEO, Tony Velleca, and VP Bruce A. Roton, debate what advanced capabilities hackers have today, how — or if — it’s evolving with the AI landscape, and what enterprises can do to defend themselves.
Recorded Apr 14 2020 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
Presentation preview: Is AI Being Weaponized by Cyber Criminals?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Collaborating With the Right Skills at the Right Time Dec 15 2020 9:00 pm UTC 57 mins
    Doug Saylors, ISG Cyber Security Director, Tony Velleca, CyberProof CEO
    Why choose between making the necessary investments in staff and training or handing control to a third-party provider? Adopting a hybrid engagement model that allows you to augment your existing team with those skills that are hard to come by without the capital investment or losing visibility of day-to-day security operations.
  • Continuously Identify Threat Detection Gaps and Optimize Response Actions Dec 9 2020 7:00 pm UTC 56 mins
    Bruce Roton, VP/Global Head of Security Strategy, CyberProof Ben Chant, Product Marketing Manager, CyberProof
    This session breaks down how to adapt detection and response processes in line with a changing threat landscape while measurably reducing risk. Learn to define your business’ response window of acceptable loss and identify gaps in your security by leveraging the MITRE ATT&CK framework and using automation to deploy tailored use cases consisting of prevention, detection and response controls.
  • Visibility Into the Vulnerabilities That Matter Dec 3 2020 9:00 pm UTC 55 mins
    Sean Keef, Skybox Security North American Technical Director, Sinu Peter, CyberProof Principal Security Architect
    With the influx of vulnerability alerts, fatigue sets in and it’s near impossible to weed through what is important and what can be automated. SOCs need the ability to classify asset criticality with threat intelligence.

    Join this discussion to learn how utilizing a single pane of glass view with API architecture, automation & orchestration to leverage existing security investments can remediate threats quickly to reduce the workload for the SOC team and prioritize remediation.
  • Modernizing and Scaling Your Security in the Cloud, For the Cloud Recorded: Nov 24 2020 41 mins
    Ann Johnson, Corporate VP of Microsoft Security & ComplianceYuval Wollman, CyberProof President
    Security teams are struggling to reduce the time to detect and respond due to complexity and volume of alerts being generated from multiple security technologies. Now that workloads are being migrated to the cloud, this brings an additional perimeter which requires constant vigilance for early signs of a cyber attack but is extremely difficult to maintain due to its elastic nature and the constant provisioning of new services.

    Yuval Wollman welcomes Ann Johnson, Corporate VP of Microsoft Security & Compliance to provide an overview of how CyberProof’s strategic partnership with Microsoft is helping organizations to modernize their security monitoring, detection and response across their entire IT estate and reduce time and money with a cloud-scalable approach.
  • Reality Check on Global Security in Uncertain Times Recorded: Nov 18 2020 38 mins
    Tamir Pardo, XM Cyber President and Former Mossad DirectorTony Velleca, CyberProof CEO
    The only certainty in 2020 has been uncertainty; from exploits using COVID as bait, to ransomware, security professionals are doing their best to navigate as we look towards the year ahead.

    This session provides an overview on maintaining SOC efficiency when working from home, metrics SOCs should provide, and how taking advantage of cloud and automation are the path to agility in unpredictable times.
  • The CISO Playbook for Measurably Reducing Cyber Risk Recorded: Nov 12 2020 43 mins
    Tony Velleca, CEO of CyberProof and Howard Silverman, Head of Marketing at CyberProof
    Organizations have been forced – practically overnight – into remote workforce business models, expanding attack surfaces, and the growing complexity of cyber-attack techniques.

    As CISOs, we need to turn the dial from investing in point prevention solutions and trying to articulate what the value is afterwards - to identifying the business risks we need to mitigate first and then focusing on the primary attack scenarios that could cause those risks to happen.

    For organizations to defend themselves against an ever-changing threat landscape requires leveraging an Agile detection and response framework as a preventative control, while leveraging readily available tools like MITRE ATT&CK, NIST, and others.

    While cyber threats are growing, the skills gap is getting worse, yet the average cyber-security budget is staying the same. So, how do organizations do more with less?

    What You Will Learn About

    · Demonstrating security KPIs instead of SLAs
    · Using the MITRE ATT&CK framework to improve cyber defense
    · Assessing your security portfolio from a risk perspective
    · Developing a use case factory that allows you to optimize detection & response
    · Implementing a hybrid model that improves flexibility in resource allocation
    · Applying an Agile methodology to stay ahead in a changing threat landscape
  • Pro-Active Intruder Hunting – Part 2 Recorded: Oct 29 2020 50 mins
    Bruce Roton: CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.
    This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
  • Focusing time, money and effort on the vulnerabilities that matter most Recorded: Oct 29 2020 48 mins
    Skybox VP of Channels - Mike Heredia, CyberProof UK - Craig Saunderson, Moderated by Howard Silverman
    Multi-layered security tools can be expensive with many struggling to understand how, or if, these investments are properly managing vulnerabilities and improving security posture. A threat-centric approach can help provide an accurate and continuous view of risk exposure to organizations.

    In this webinar CyberProof's Director of Cyber Security Sales, Craig Saunderson and Skybox Security's VP of Integrator Channels, Mike Heredia will discuss:
    • Common mistakes when trying to understand high risk vulnerabilities
    • How to prioritize vulnerabilities and speed up remediation efforts
    • What good vulnerability management should look like
    • How a threat-centric approach can help you get an accurate and continuous view of your risk exposure
  • Building a Smarter SOC in The New Normal Recorded: Sep 15 2020 64 mins
    Cyril Voisin, Sinu Peter, Moderated by Benjamin Chant
    Speakers are:
    Cyril Voisin
    Sinu Peter
    Moderated by Benjamin Chant
  • Introduction to Pro-Active Intruder Hunting - Part 1 Recorded: Sep 8 2020 48 mins
    Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
  • Using Automation and Data Analytics to Combat Increasing Cyber Threats Recorded: Sep 2 2020 49 mins
    Richard Telleria, Anand Trivedi, Halim Santoso, Abbas Kudrati
    With cyber threats increasing in quantity and complexity, what strategy should CISOs adopt in order to be prepared and protected from constant and new-age attack tactics?

    In this webinar CyberProof and Microsoft Australia security leaders will team up to discuss how the cyber security landscape has been altered due to COVID-19 and how using automation and data analytics can combat increasing cyber threats.

    Hear from security experts:

    Richard Telleria - Managing Director, UST Global
    Anand Trivedi - Head of Cyber Security Business, CyberProof
    Halim Santoso - Head of Business Development, Microsoft Australia
    Abbas Kudrati - CISO,CISM,CPDSE,CSX-P, Chief Cyber Security Advisor, Microsoft APAC
  • Best Practices Using Attack Simulations To Improve SOC Efficiency Recorded: Aug 18 2020 53 mins
    Gus Evangelakos, XM Cyber Director of Field Engineering, and R. Teall Rist, CyberProof Principal Security Architect
    When it comes to cyber attacks the speed in which you are able to respond is of equal importance as time to detect. While SIEM solutions improve visibility into attack paths, security teams also need to be able to continuously refine their cyber defense.

    In this webinar CyberProof's Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how you can improve SOC efficiency using attack simulations to:

    - Identify new attack paths
    - Optimize and automate playbooks
    - Rapidly contain and eradicate validated threats
    - Ensure potential threats are understood within the context of your business
    - Continuously validate the exposure of an asset as attacker techniques and patterns change

    Join R. Teall Rist and Gus Evangelakos on August 18th to discover how your organization can expand detection coverage and remediate risks as they emerge. Register today!
  • Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework Recorded: Aug 10 2020 45 mins
    CyberProof's CEO, Tony Velleca and VP of Security Strategy, Bruce Roton
    In this webinar CyberProof CEO, Tony Velleca and VP of Security Strategy, Bruce Roton, will shed light on how and why CyberProof uses this framework for better threat detection mapping, and how companies can benefit from implementing it into their cyber security strategy.
  • Security & Privacy Trends in the COVID-19 Era Recorded: Jul 28 2020 54 mins
    Enza Iannopollo, Senior Analyst, Security & Risk, Forrester
    Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.

    In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.

    Listen and discover how your cyber security strategy can contend with:

    - Expansion of cloud services
    - Rapid development of new applications and products
    - Increased IT complexity
    - Global privacy laws compliance
  • The Essentials of a Smarter SOC in The New Normal Recorded: Jun 24 2020 61 mins
    Aman Malhotra, CyberProof Security Solutions Architect & Iftekhar Hussain, Cyber Defense Analyst, Microsoft Asia Pacific
    CISOs are facing a myriad of challenges as businesses scale down, and cyber threats escalate. While some organizations had already started adapting their SOCs for the digital transformation pre-pandemic, COVID-19 has accelerated the need.

    Join this webinar to hear from the following security experts:

    Terence Gomes, Enterprise Cyber Security Executive, Microsoft India
    Anand Trevedi, Head of Cyber Security Business, CyberProof India
    Iftekhar Hussain, Global Black Belt - Cyber Defense and Threat Analytics, Microsoft Asia Pacific
    Aman Malhotra, Cyber Security Solutions Architect, CyberProof
    Register now for insights on how your organization can adapt to the new normal amid budgetary constraints - without sacrificing security.
  • Cracking the Code: Quality Engineering Models for Continuous Delivery Recorded: Jun 16 2020 62 mins
    Featuring guest speaker, Forrester analyst, Diego Lo Giudice and UST's Head of Testing & Quality Engineering, George Ukkuru
    As continuous delivery practices accelerate the volume of releases, test teams must find ways to validate software performance faster without compromising quality. Traditional testing practices can’t keep pace with modern application developments, and scaling testing for efficiency, accuracy and speed is critical. Test Automation has become an essential element of the end to end test lifecycle in every organization. Most tool-based testing approaches fall short of addressing test lifecycle automation needs or make it quite challenging. This has paved the way to platform-centric Quality Engineering.

    Join Forrester’s expert on SDLC processes and practices--our guest speaker, Vice President and Principal Analyst Diego Lo Giudice – and UST Global’ s Head of Testing and Quality Engineering Services, George Ukkuru, for a webinar discussing the modern methods and techniques around quality engineering. Learn about how UST’s quality engineering platform, NoSkript™ can improve quality, efficiency, and cost while accelerating cycle time.

    What you will learn:
    - How to apply Shift Left and Shift Right practices for early defect identification and to minimize business risks
    - Why should a quality engineering team focus on an API-led automation approach
    - How can automated test design help to optimize test cases and reduce maintenance efforts
    - How to use prefabricated test data to improve the accuracy of Artificial Intelligence Solutions
  • Security & Privacy Trends in the COVID-19 Era Recorded: May 14 2020 55 mins
    Enza Iannopollo, Senior Analyst, Security & Risk, Forrester
    Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.

    In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.

    Listen and discover how your cyber security strategy can contend with:

    Expansion of cloud services
    Rapid development of new applications and products
    Increased IT complexity
    Global privacy laws compliance
  • Infosec in India – before, during, and after COVID-19 Recorded: May 12 2020 49 mins
    Anand Trivedi, CyberProof India's Head of Cyber Security Business
    The scope of the coronavirus pandemic, and its global and regional impacts are coming to light. The attack surface has expanded in tandem with the spread of the virus, posing higher risks for remote employees and the organizations they work for.

    COVID-19 has changed business operations in terms of cyber spend availability, while at the same time work from home security has created increased vulnerabilities.

    In this webinar CyberProof India's Head of Cyber Security Business, Anand Trivedi, will shed light on:

    - The scope of how the pandemic has affected Indian enterprises
    - New cyber security challenges
    - How CISO’s can respond and do more with less
  • COVID-19 Will Change Our Psychology And Roadmap For Intelligent Automation Recorded: May 11 2020 55 mins
    Guest Forrester’s VP and Principal Analyst Craig Le Clair and UST SmartOps' GM Sajesh Gopinath
    The latest industry insights from our featured guest Forrester’s Vice President And Principal Analyst Craig Le Clair, shares the latest industry insights that show the path forward on how companies will look to lower operating costs and build greater business resilience, to weather pandemic-driven disruption. IA consists of 19 technology categories, that combine RPA with existing and emerging AI components. To realize the potential, IA should be focused on the work personas that can benefit the most. The webinar explains the best investment approach for the five work personas that drive knowledge and administrative work for the new normal. Sign up for this webinar to learn:

    - What is IA and the appropriate role of RPA
    - What is the role of IA in the new normal, post Covid-19
    - How to apply IA in Invoicing, customer on-boarding, IMS, AMS, and contract management
    - How are enterprises driving scale while governing IA expansion
    - Learn how new players are changing the rules of the game with outcomes based service offerings
  • DevSecOps - how to do more with less Recorded: Apr 27 2020 51 mins
    Colin Domoney, CyberProof DevSecOps Security Architect
    In the wake of current pandemic-driven disruption, businesses worldwide are—and will continue to—experience budget constraints. In order for organizations to remain resilient they will need to learn how to do more with less, without compromising integrity, value or security.

    In this webinar you'll gain insights on the value of DevSecOps initiatives, including:

    -How to drive efficiencies while reducing costs
    -The long-term costs on inaction
    -Leveraging open source testing tools
    -Accelerating delivery of actionable findings to senior stakeholders
A Smarter SOC
CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, together with our experts and your team automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia and the technology ecosystem to continuously advance the art of cyber defense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is AI Being Weaponized by Cyber Criminals?
  • Live at: Apr 14 2020 4:00 pm
  • Presented by: Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
  • From:
Your email has been sent.
or close