InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Control Optimization Imperative: Security ROI in the Age of AI Threats

Presented by

Evgeniy Kharam, Cybersecurity Architect and Advisor | Security Architecture Podcast

About this talk

AI is accelerating attacker speed, scale, and creativity. The result isn’t just “more threats,” it’s more inefficient security; overlapping controls, blind spots in identity and SaaS, and testing that lags behind change. The answer isn't in implementing another tool. Instead, it’s about operationalizing control optimization; measuring how each control actually reduces risk in the face of AI-aided techniques and reallocating investment accordingly. In this talk, Evgeniy Kharam shares a practical, vendor-neutral way to quantify effectiveness: define adversary-centric objectives (ATT&CK-mapped), set baselines, continuously validate controls across identity, endpoint, SaaS, and cloud, and translate outcomes into ROI the business understands. He’ll cover quick wins (days, not months), common pitfalls, and how to use these metrics to justify roadmap and spend for 2026. Key takeaways: • A simple model to measure real control effectiveness against AI-driven tactics • How to find and fix “control drift” created by digital transformation • What to automate in continuous validation—and what not to • A board-ready ROI narrative that ties security outcomes to business risk
Information Security

Information Security

259078 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics