10th SoFloTechFriends Quarterly Happy Hour (March 7th)
InformationWeek: Unleashing AI for Cybersecurity: Empowering Non-Experts To Take Action (Feb. 15th)
Thursday, February 15th, 2024: 1:00 PM to 2:00 PM

Join us to learn how to:

  • Strengthen your defenses
  • Enhance threat detection
  • Improve response

Our expert speakers will demystify the complexity of AI and guide you through its practical applications in the realm of cybersecurity - even if you aren't an expert.

Hosted by InformationWeek

    Cloud Native Now: Quick Wins For Containers Images Security (Feb. 26th)
    Monday, February 26th, 2024: 11:00 AM to 12:00 PM
    How do you know your container security program is effective? Can you balance large-scale operational needs with the granularity required to allow specific engineers to remove critical security risks? Can containers' runtime context help engineers prioritize security risks?

    Join experts from AWS and Mend.io in an enlightening webinar where we'll introduce innovative techniques to uncover critical risks, prioritize them effectively within the AWS cloud environment, and efficiently address them with the right stakeholders.

    Hosted by Cloud Native Now

      Blackhat: Live Hack: Exploiting AI-Generated Code With Snyk (Feb. 27th)
      Tuesday, February 27th, 2024: 2:00 PM to 3:00 PM
      AI-assisted coding tools increase your delivery speed. and security risks. In the span of just one hour, we'll build a demo app using GitHub Copilot and ChatGPT, and live hack the results, showing how the generated code can be exploited.

      Watch this on-demand session to:

      • Get an overview of AI in development and common AI security risks

      • Use GitHub Copilot to build a coffee shop demo app with features including a dynamic homepage, searchable products, and personalized user profiles

      • Uncover and exploit AI-generated vulnerabilities, including SQL injection, cross-site scripting, directory traversal and more

      • Learn effective strategies to mitigate and fix the AI-generated vulnerabilities

      By the end of the session you'll have built a demo app, hacked and fixed at least 3 vulnerabilities and gained insights into best practices for utilizing generative AI coding tools securely.

      Hosted by blackhat

        Blackhat: SIEM Migration: Breaking Up Is Hard To Do (Feb. 29th)
        Thursday, February 29th, 2024: 2:00 PM to 3:00 PM
        Like it or not, you're in a relationship with your SIEM. Can you rekindle the bond you had during the initial implementation with some intense therapy? Or is it time to call it quits and start over? If you're moving to a new SIEM (or even just considering making a move), how do you make the right first move and avoid the pitfalls that might lead you right back to disappointment?

        hey will cover the full lifecycle associated with SIEM migration to help you no matter where you are in your relationship:

        • Should I stay or should I go? (Deciding on keeping your current SIEM or making a switch)

        • If I stay, can this get better? (How to address common issues with a SIEM you're keeping)

        • If I'm moving on, what should I look for in my new partner? (Shopping for a new SIEM with migration in mind)

        • Holding on to the good, letting go of the bad (How do I perform migration the right way?)

        Hosted by blackhat

          Blackhat: Using AI In Cyber Defenses (March 7th)
          Thursday, March 7th, 2024: 2:00 PM to 3:00 PM
          It emphasizes the need for organizations to safeguard AI systems from malicious actors while leveraging AI to enhance cybersecurity measures.

          Attend this webinar to learn about

          • The sophistication of threats warrants new security methods

          • Cyber defenses can adapt in real time when using AI

          • How to integrate defensive AI into email as a starting point

          Hosted by blackhat

            Cybersecurity's Hottest New Technologies: What You Need To Know (March 21st)
            Thursday, March 21st, 2024: 11:00 AM to 5:00 PM
            ChatGPT opened the AI floodgates for both threat actors and defenders to up their game. At the same time, cloud-based applications and services are gradually becoming the norm for many organizations.

            These seismic shifts in cybersecurity will shape the face of zero-day attacks, ransomware, and supply chain compromises, leaving security teams wondering if their existing defenses can hold up against a new wave of threats powered by AI and new cloud-borne and cloud-targeted attacks.

            Hosted by DARKReading

              ITProToday: Strategies for Maximizing IT Automation (March 28th)
              Thursday, March 28th, 2024: 11:00 AM to 5:00 PM
              Although IT automation is quickly becoming more commonplace, IT leaders are still struggling with the best strategy for implementing at scale, as well as wrestling with how new technology trends like generative AI are transforming the automation landscape. In this event we'll explore the options available to IT leaders to better understand not only ways to automate, but also how to intelligently plan the strategy to take advantage of new features while avoiding costly overruns and complexities in implementation.

              Hosted by ITProToday

                IT - CxO Security Events

                See all archived IT - CxO Security Events articles See all articles from this issue