Agenda

Date and TimeTitle
Jul 24, 2024
11:00am - 11:45am (Eastern)
[Opening Keynote] Do More with Less: Practical SOC Automation Strategies Using AI

In this keynote, Itai Tevet puts the focus on the real world—how security teams can realistically use artificial intelligence to do more with less. Generative AI isn’t a magical solution, but as one part of a smart cybersecurity strategy, advanced AI models are already proving to be an affordable way to reduce risk, alleviate bottlenecks, and uncover hidden threats.

Learn about use cases for new AI tools, along with strategies and tips for modernizing your SOC and automating more processes. This session offers a realistic perspective by showing how innovative teams have deployed AI-driven alert triage processes in their SOC, with practical examples for endpoint, SIEM, and reported phishing alerts.

Jul 24, 2024
12:00pm - 12:51pm (Eastern)
Insider Threat Actors & Artificial Intelligence

Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

Objectives:

  • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
  • Learn how to identify system and user-based behavioral indicators.
  • Learn which existing or enhanced security layer can provide insider threat profile data.

Take-Aways:

  • How to identify business processes which can contribute to intentional or unintentional insider threats.
  • Enhance procedures required to identify insider threat exposures.
  • Enhance awareness training to include additional methods of insider threat.
  • Enhance existing physical and digital security layers to better identify specific insider threat activity.
Jul 24, 2024
12:00pm - 12:52pm (Eastern)
Model Assisted Threat Hunting Powered by PEAK and Splunk AI

Wanting to accelerate your threat hunting? Learn how Splunk AI can be the catalyst. Join us to learn how to leverage the PEAK threat hunting framework and Splunk AI to find malware dictionary-DGA domains.

We’ll introduce the PEAK framework, walk through the hunt step-by-step, and demonstrate how to turn a successful hunt into automated detection. Join this session to learn how PEAK and Splunk AI can help you:

  • Learn the basics of the PEAK threat hunting framework developed by Splunk’s SURGe security research team
  • Understand the power Splunk AI can bring to your threat hunts
  • See how to create automated detections from your successful hunts
Jul 24, 2024
12:00pm - 12:50pm (Eastern)
Cybersecurity GRC: Building Industry-Leading Programs Using AI and Automation

Today, cybersecurity GRC programs and processes often take significant investments and resources to perform risk and control testing, GRC operations and maintain GRC technologies. Strategic and high-value time of product and engineering teams can be taken away by GRC teams and external auditors to support audit and compliance activities. In this new AI world, how can CISOs and cyber GRC leaders think differently about meeting their customer and business commitments of maintaining a secure and compliant environment, in a cost-efficient way? Latest GenAI and related technologies can help provide the capability of building data pipelines with source systems, generating insights from unstructured information, and building reporting layers that can give near real-time risk and controls insights. However, there can also be several complexities and challenges associated with moving from a traditional GRC program to an AI-enabled GRC program. Learn more about how you can use AI effectively and efficiently for your cyber GRC programs.

Jul 24, 2024
12:00pm - 12:50pm (Eastern)
How to Manage AI Risk to Let Innovation Prosper

Join this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.

Jul 24, 2024
1:00pm - 1:50pm (Eastern)
Artificial Intelligence Information Risks and Acceptable Use Policy
Jul 24, 2024
1:00pm - 2:00pm (Eastern)
Balancing Act: Data, AI and Cybersecurity Governance

Join a thoughtful discussion on balancing AI innovation, ethical data use, efficient data governance and secure cyber governance practices. Gain insights on the risks, challenges and responsibilities of managing AI technologies with ethical and regulatory frameworks while exploring the integration with cybersecurity.

Jul 24, 2024
1:00pm - 2:00pm (Eastern)
[Panel] Compliance, Automation, and AI
Jul 24, 2024
1:00pm - 1:35pm (Eastern)
Stopping AI Tool-Driven Data Loss
Jul 24, 2024
2:00pm - 2:50pm (Eastern)
Using GenAI to Turbocharge Your GRC Teams

Traditional methods of managing Governance, Risk Management, and Compliance (GRC) programs often lack the efficiency and scalability needed in today’s fast-paced environment. This talk will demonstrate the use of Generative AI technologies to transform and turbocharge GRC teams, offering significant advancements in processing capabilities, decision-making speed, and overall accuracy. We will explore practical applications of Generative AI in automating routine GRC tasks such as policy drafting, efficient risk assessment, threat modeling, and writing your own GPTs to automate workflows.

Jul 24, 2024
2:00pm - 2:55pm (Eastern)
[Panel] AI Myths Explained: Cutting Through the Jargon

AI exploded onto the scene late in the spring of 2023. Suddenly, people were losing their jobs, minds, and composure. It was like something out of a sci-fi novel. Surely robots would take over and enslave humans.

A year has passed and we’re all still here and mostly still employed. We’ve heard some interesting truths about AI over the year. This panel is going to focus on facts. Join our experts as we dive into some of the myths around corporate / organizational use of AI. We’ll talk about the current threats around this new technology and give insights on what’s next.

Bring your questions, as well!

Jul 24, 2024
2:00pm - 3:00pm (Eastern)
Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know
Jul 24, 2024
3:00pm - 3:40pm (Eastern)
Guardians of the Ballot Box: Cybersecurity in Elections

In this presentation, we address the critical challenge of defending electoral processes against targeted campaigns, elections and social engineering tactics. As elections increasingly become targets for cyber interference, safeguarding against these threats is paramount. We examine how campaigns and elections are targeted by malicious actors, aiming to disrupt democratic practices and sway voter sentiment.

Through case studies and real-world examples, we illustrate the impact of social engineering on constituents, highlighting how misinformation and manipulation tactics can influence voter behavior and swing election outcomes. We also discuss strategies to prevent and mitigate these threats, including robust cybersecurity measures, public awareness campaigns, and enhanced education on recognizing and combating social engineering tactics.

By understanding the tactics used by malicious actors and implementing proactive defenses, we can better protect the integrity of electoral processes and ensure that voters are empowered to make informed decisions. Join us as we explore practical steps to defend against targeted campaigns and safeguard the democratic process.

Jul 24, 2024
3:00pm - 4:00pm (Eastern)
Cyber Intel Briefing: Artificial Intelligence
Jul 24, 2024
3:00pm - 3:50pm (Eastern)
The Role of Human-Centric Security in an AI-Powered World

As AI continues to transform the way we live and work, it’s more important than ever to ensure that security measures keep pace with technological advancements. Human-centric security is a key approach that puts people at the center of security strategies, focusing on protecting individuals as well as the data and systems they use. In an AI-powered world, this approach becomes even more critical to ensure that technology is used for good and not exploited for malicious purposes.

Join us during this 45-minute breakout session and hear from Proofpoint’s Senior Director of Cybersecurity Strategy, Brian Reed, as he discusses:

  • How AI is changing the security landscape
  • The importance of putting people at the center of security strategies
  • Strategies for protecting against human-targeted threats
  • Best practices for developing and implementing human-centric security measures in an AI-powered world
Jul 24, 2024
3:00pm - 3:45pm (Eastern)
Strategic Insights into AI Risk Management: Threats, Regulations, Frameworks, and Governance
Jul 24, 2024
4:00pm - 4:55pm (Eastern)
[Closing Keynote] The ChatGPT Threat: Using Defensive AI to Prevent AI-Powered Attacks

The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create attacks at scale, with tools like ChatGPT enabling even petty criminals to create sophisticated attacks. And no surface is more vulnerable than your inboxes—not when generative AI can create email attacks void of the typos and grammatical errors that have become a key indicators of malicious activity.

So how do you defend against this threat? And what is the future of cybersecurity in this AI-powered world? Join this session to hear how generative AI is changing the threat landscape, what AI-generated attacks look like, and how you can use “good AI” to prevent “bad AI” from harming your organization.