Featured
![](https://cdn.brighttalk.com/ams/california/images/communication/611922/image_974798.png?width=640&height=360)
How to Protect Yourself from AI Cybersecurity Nightmares
Menny Barzilay, Cyber Security Expert, Cytactic, FortyTwo Global and FortyTwo Labs
Artificial intelligence (AI) continues to push the frontiers of technology - and it's here to stay. It's influence on cybersecurity reveal a double-edged sword. AI is becoming a formidable enhancer of security measures. But with all new technologies, there is a downside to consider. AI is already used as a core tool in the arsenal of cybercriminals and its capabilities are harnessed to refine every aspect of cybercrime.
The more we see criminals that leverage AI, the more we realize that our defences are not yet equipped to counter Malicious-AI. So where does this leave us?
This session will shed light on how criminals exploit AI to elevate their malicious endeavours. Gain practical insights into the evolving landscape of cybercrime and the pivotal role of AI within it. Let's take a glimpse into a future where AI dominates the cybercrime landscape! Are you ready for the move?
All episodes
-
AST Tool Consolidation: Reduce Complexity and TCO with ASPM
Hugues Martin, Sales Engineer Manager, Synopsys
The growth of software across every industry poses significant challenges for teams that need to keep up with the fast pace of innovation while making sure the software they put into production is secure. This has led to a proliferation of tools deployed by security teams. You may ask why? In simple terms, to tackle the increasing pressure of a larger and more sophisticated threat landscape. Ultimately, teams are now left with added complexity and friction in the SDLC and a bloated total cost of ownership (TCO).
As a result, Gartner indicates an increase in organizations pursuing vendor consolidation from 29% in 2020 to 75% in 2022 to tackle the cost and complexity of present day AppSec programs. But, consolidating vendors is only one part of the equation.
Join us, as we unlock the key to mastering software security in the era of rapid innovation. We delve into a differentiated approach to consolidation initiatives that extends beyond improving TCO.
Join now and understand how to:
- Streamline tools & processes to improve resource efficiency.
- Focus your teams with prioritized risk data across your security program.
- Deliver rapid, comprehensive risk insight for improved time to audit. -
Effective Cloud-based Application Security Practices for Modern Development
Molka Elleuch, Solutions Engineer, Synopsys
Boost business success with modernised application security in today's digital era. As businesses shift to cloud software it's essential to find effective solutions for development and testing. Our advice: Build a robust AppSec solution. You might ask yourself how? We’ll share some insightful real-world examples of successful app security implementation.
Join the webinar to explore:
- key components of modern application security
- empower developers for quick code scanning
- discover strategies for identifying and mitigating vulnerabilities
-
Keeping Pace: Managing the risks of AI-generated code
Patrick Carey, Executive Director - GTM Strategy, Synopsys
AI coding assistants, such as Microsoft CoPilot and ChatGPT, will fundamentally change the way teams build software, much like open source software has over the last decade. As with open source, teams seeking the benefits of AI will also need to take precautions to address the security, quality, and intellectual property risks that come with the use of AI-generated code. Is your team ready for AI?
In this webinar, we'll explore:
Key risks teams might encounter using coding assistants
Safeguards needed for confident use of AI-generated code
-
What the CRA means to DevSecOps Teams
Tim Mackey, Head of Software Supply Chain Risk Strategy
In January, the EU published the final version of the Cyber Resilience Act (CRA). While this won't come into force until late 2026, there are still actions you can take.
The good news is most of what's required is already part of a mature modern AppSec programme.
In this session we’ll cover some of what DevSecOps and product security teams should be planning for to address CRA, with lessons drawn from efforts present in highly regulated spaces in other jurisdictions.
-
From Application Security to Business Risk
Richard Kirk, Vice President International Sales, Synopsys
The AppSec landscape is in constant flux. Every day we hear of new vulnerabilities and attack vectors we need to defend against. And now there are the security and legal implications of the rapid growth of AI.
To put you on the right track, Synopsys is happy to announce the return of AppSec on the Move. We’re thrilled to present our latest application security insights:
- AST Tool Consolidation: Reduce Complexity and TCO with ASPM
- Effective Cloud-based Application Security Practices for Modern Development and DevOps
- Keeping Pace: Managing the risks of AI-generated code
- What the CRA means to DevSecOps Teams -
How to Protect Yourself from AI Cybersecurity Nightmares
Menny Barzilay, Cyber Security Expert, Cytactic, FortyTwo Global and FortyTwo Labs
Artificial intelligence (AI) continues to push the frontiers of technology - and it's here to stay. It's influence on cybersecurity reveal a double-edged sword. AI is becoming a formidable enhancer of security measures. But with all new technologies, there is a downside to consider. AI is already used as a core tool in the arsenal of cybercriminals and its capabilities are harnessed to refine every aspect of cybercrime.
The more we see criminals that leverage AI, the more we realize that our defences are not yet equipped to counter Malicious-AI. So where does this leave us?
This session will shed light on how criminals exploit AI to elevate their malicious endeavours. Gain practical insights into the evolving landscape of cybercrime and the pivotal role of AI within it. Let's take a glimpse into a future where AI dominates the cybercrime landscape! Are you ready for the move?