All episodes
DateHow CISOs can Leverage AI: A Fireside Conversation with Vanta and CSA
Jadee Hanson, CISO, Vanta, and Daniele Catteddu, CTO, Cloud Security Alliance
Over the past year, the proliferation of AI technologies has introduced new challenges and risks for CISOs to contend with. From creating new ways for data
to be accessed to reshaping the threat landscape with deepfakes and automated malware, AI has added more complexity and more pressure to exist
5 Ways Cybersecurity Leaders can leverage GenAI
Tim Chase, Lacework, Field CISO and Caleb Sima, Chair for AI Safety Initiative, CSA
In an era where cyber threats are increasingly sophisticated and pervasive, how can resource strapped teams stay ahead? This webinar explores how
GenAI can support cybersecurity teams by enabling rapid security investigations, anomaly detection, and faster insight generation. Tim Chase, Field C
Fighting Fire with Fire - Leveraging AI in Cybersecurity
Nayeem Islam, VP Product Management, Qualys and Caleb Sima, Chair for AI Safety Initiative, Cloud Security Alliance
Conventional defense mechanisms often fall short with adversaries employing advanced AI methodologies to target cloud assets. This session delves into the
use of cutting-edge AI strategies to counter these evolving threats, offering insights into how AI helps defend against sophisticated attacks.
Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography
Avesta Hojjati, VP of Research and Development, DigiCert & Denis Mandich, CTO, Qrypt
In the ever-evolving landscape of digital transformation, organizations are facing unprecedented challenges in securing and scaling their cryptographic
infrastructure. The need for crypto agility has never been more critical as companies grapple with risks posed by advanced technologies such as AI, e
Securing Developers By Closing Credential Security Gaps
Josh Kirkwood, CyberArk and Kurt Seifried, Cloud Security Alliance
The age of AI is shining a light on the most vulnerable identities within organizations. At the top of this list: developers. They're one of the most valuable
assets for digital enterprises. Attackers know this. Initial access to a developer's credentials, an organization's repository, or secrets management lea
Challenges From Within and Without: Trends in Cloud Attack & Defense
Chris Hosking, Cloud Security Evangelist, SentinelOne & John Yeoh, Global VP of Research, CSA
While threat actors are pivoting to target cloud environments and cloud breaches on the rise, the trends and potential lessons to learn are still difficult to find
and decipher. This session is dedicated to bringing some clarity to the nature of external cloud threats, and the most pressing people, process and tec
De-risking AI: Risk Management Essentials
Mandy Pote, Managing Principal of Strategy, Privacy, Risk, Coalfire & John DiMaria, Director of Operations Excellence, CSA
Artificial Intelligence (AI) has moved beyond hype and unrealistic expectations. Organizations are increasingly embracing AI yet its adoption is both promising
and perilous. To harness its potential while mitigating risks, organizations must cultivate a forward-looking AI risk management strategy. In this sessi
Breaking the Identity Perimeter: An Attacker’s Perspective
Roey Rozi, Director of Solution Architecture at Oasis Security and John Yeoh, Global VP of Research, CSA
The transition to cloud computing has diminished the effectiveness of traditional network security perimeters, rendering identity as the final line of defense
against attackers. While enterprises have allocated substantial budgets to identity programs and have made significant progress in safeguarding hum