Strategies for Red Teaming Agentic AI Applications
This panel focuses on emerging strategies for red teaming agentic AI applications, emphasizing the unique vulnerabilities and security implications associated with these systems. The panel explores the distinctions between agentic AI and traditional LLMs, the necessity of early and scalable red teaming and the importance of processes and metrics for measuring success in identifying and mitigating risks---and the critical need for a collaborative approach in addressing AI security.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
AI SECURITY TRACK
PANEL:
Threat Modeling for Agentic AI Applications
The panel discusses the complexities of threat modeling for agentic AI applications and the unique security challenges posed by these systems compared to traditional AI models. They dig into the need for new frameworks to address the dynamic and autonomous nature of agentic AI, exploring potential vulnerabilities, data security concerns, and the implications of agent-to-agent interactions in future AI ecosystems. The conversation highlights the importance of collaboration between security professionals and business units to effectively navigate the evolving landscape of AI security.
Ken Huang
Advisor
CSA
Walker Dimon
AI for Cybergroup Leader
MITRE
Sam Rehman
CISO and SVP/Head of Cybersecurity Business
CyberDef Labs
Jason Haddix
CEO
Aracanum Information Security
Related Solutions
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
AI SECURITY TRACK
PANEL:
The Most Pressing Issues in AI Security: the Current Snapshot
Anton Chuvakin, Ian Swanson, Richard Stiennon and Ken Huang discuss the most pressing threats facing security pros on the AI front—at this moment.
Anton Chuvakin
Industry Analyst
Google
Richard Stiennon
Chief Research Analyst
IT-Harvest
Ian Swanson
CEO & Co-Founder
Protect AI
Ken Huang
Advisor
CSA
Related Solutions
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
AI SECURITY TRACK
PANEL:
Managing AI Security Risk
This blue chip panel reviews top line strategies for managing AI security risks including continuous assessment of potential vulnerabilities and threats to AI systems, monitoring various attack vectors and evaluating the security of data used to train AI models, the integrity of the models themselves, and the security of the systems where they are deployed.
Harold Booth
Computer Scientist
NIST
Moinul Khan
Co-Founder & CEO
Aurascape AI
Merlin Namuth
CISO
CITY AND COUNTY OF DENVER
Walker Lee Dimon
AI for Cybergroup Leader
MITRE
Related Solutions
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
AI SECURITY TRACK
PANEL:
Winning the AI Arms Race in Cybersecurity
The panel discussion explores the multifaceted role of AI in enhancing security operations, addressing challenges in compliance, data privacy and ethical AI usage. Experts discuss AI’s dual role in fortifying defenses and being leveraged by adversaries, emphasizing the need for strategic, high-level discourse to guide effective implementation and prioritize AI security initiatives in the evolving cybersecurity landscape.
Rob Sandler
Strategic FSI Partner Manager
Trend Micro
Patrick Angel
CISO
WGroup
Sam Rehman
CISO and SVP/Head of Cybersecurity Business
EPAM Systems
Eidan Siniver
Cyber, Data & AI CTO
Team8
Related Solutions
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
AI SECURITY TRACK
PANEL:
Safeguarding Data Privacy in Agentic AI Systems
Agentic AI supercharges capability and risk. Our panel unpacks real threats (prompt injection, deepfakes, insecure dev tools) and proven privacy playbooks: zero-retention architectures, AI gateways, RBAC/MFA, continuous logging and privacy-enhancing tech (federated learning, homomorphic encryption, differential privacy, zero-knowledge proofs). Learn how to align security, privacy and compliance with ISO 42001/NIST AI RMF, manage deletion requests, govern multi-agent workflows and protect sensitive data at scale.
Patricia Thaine
Co-Founder & CEO
Private AI
Dean Sapp
CISO
Filevine
Patrick Angel
CISO
WGroup
Mark Butler
CISO
Trace3
Namrata Shah
Managig Director - Global Head of Engineering
Nuveen/p>
Related Solutions
Adopt and Scale AI with Total Confidence
WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.
This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.
AI-Native Protection for AI Applications and Agents
Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.
Achieve AI Security and Compliance
The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.
Non-Human / Identities
PANEL:
The Rise Of Machines: Securing Non-Human Identities In A Connected World
This panel discussion explores the complexities of securing non-human identities (NHIs) in a rapidly evolving digital landscape. Experts delve into the rise of machine identities, the challenges of governance, and the need for robust security measures. They emphasize the importance of discovery, education, and collaboration across organizations to effectively manage NHIs and mitigate associated risks in a connected world.
Director Practice IAM, Lead Advisor and Senior Analyst
KuppingerCole Analysts AG
Related Solutions
Control of NHI Security through Detection and Governance
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
Innovative Security for Cloud Access
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Unified Approach to Modern PAM & NHI Management
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Non-Human / Identities
PANEL:
Non-Human / Machine Identities - Why Now – Why Should You Be Concerned
This panel discussion delves into the critical topic of non-human machine identities (NHIs), exploring their historical context, current challenges and the urgency of addressing security concerns in an increasingly automated landscape. Experts share insights on the risks associated with NHIs, including their appeal to attackers and the necessity for improved governance and situational awareness, ultimately advocating for collaborative solutions to mitigate technical debt and enhance security measures.
Anthony Viggiano
Identity and Access Management Leader
James Hauswirth
Global Managing Director - PAM
Cyderes
Anusha Iyer
CEO
Corsha
Joshua Wilson
Lead Security Architect
PRA Group
Sebastian Rohr
Managing Director
Umbrella Security
Related Solutions
Innovative Security for Cloud Access
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Control of NHI Security through Detection and Governance
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
Unified Approach to Modern PAM & NHI Management
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Non-Human / Identities
PANEL:
Harnessing AI for Non-Human Identity Threat Detection
Harnessing AI for Non-Human Identity Threat Detection - This panel explores how AI can be harnessed to detect and mitigate threats targeting non-human identities such as bots, APIs, IoT devices, and machine accounts. Experts discuss the AI driven approaches for anomaly detection and behavioral analytics that can transform how to deal with identifying and detecting inappropropriate use of non-human identities.
Sanjeev Ojha
Practice Director - ZeroTrust, PAM, IAM & IGA
Cyderes
Jon Shende
VP Solutions, Engineering & Americas Field CTO
Sutherland
James Hauswirth
Global Managing Director - PAM
Cyderes
Timm Lotter
Head of Solution Engineering
Unosecur
Related Solutions
Innovative Security for Cloud Access
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Control of NHI Security through Detection and Governance
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
Unified Approach to Modern PAM & NHI Management
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Non-Human / Identities
PANEL:
The OWASP Non-Human Identity Top 10
The OWASP Non-Human Identity Top-10 - This panel covers the OWASP Non-Human Identity Top-10, a comprehensive list of the most pressing security risks and vulnerabilities that non-human identities present to organizations. Experts share insights on these risks, many of which are related to weak lifecycle processes and controls from improper offboarding, secret leakage, overprivileged NHIs, sharing of NHIs, human use NHIs to long-lived secrets. The experts also share guidance on how to mitigate these risks.
Lalit (Mr NHI) Choda
Founder & CEO
Non-Human Identity Mgmt Group
Sameer Bhanushali
Identity & Collaboration Solutions
Paramount
Andrew McCormick
Principal Solutions Architect
Aembit
Anthony Viggiano
Identity and Access Management Leader
Related Solutions
Innovative Security for Cloud Access
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Control of NHI Security through Detection and Governance
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
Unified Approach to Modern PAM & NHI Management
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
SOC Automation / The Modern SIEM
PANEL:
The Future of SOC Automation: Trends and Innovations Shaping Security Operations
This panel discussion examines the future of SOC automation, focusing on the role of AI in enhancing security operations. Experts highlight the importance of balancing automation with human oversight to tackle modern cyber threats effectively. The conversation provides insights into innovations that drive smarter decision-making and improve security posture.
Todd Wade
CISO Interim
CyberRisk Management
Jim Rutt
CISO
Dana Foundation
Ron Williams
Founder & CEO
Kindo
Greg Rogers
Executive Advisor & vCISO
GuidePoint Security
Tom Findling
CEO & Co-Founder
Conifers AI
Related Solutions
Enhancing Security Operations with Dropzone
Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.
Revolutionizing SOCs with AI-Driven Efficiency
Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.
AI SOC Xpert Analyst Briefing
Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.
SOC Automation / The Modern SIEM
PANEL:
Automating Incident Response: Strategies for Efficient Threat Mitigation
Where does automation deliver the biggest payoff in incident response? This panel dives into triage, enrichment, and Tier‑1/2 playbooks—plus when to keep humans in the loop for high‑risk actions. Learn how to accelerate time‑to‑trust (~90 days), surface SOC bottlenecks, curb LLM hallucinations and strengthen governance, metrics, and skills, with pragmatic takeaways, MSSP-tested practices and defenses against AI‑enabled attacks like deepfakes.
Jim Rutt
CISO
Dana Foundation
Shahar Ben-Hador
CEO & Co-founder
Radiant Security
Dave Gold
VP Solutions Eng & Americas Field CTO
SentinelOne
Related Solutions
Enhancing Security Operations with Dropzone
Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.
Revolutionizing SOCs with AI-Driven Efficiency
Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.
AI SOC Xpert Analyst Briefing
Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.
SOC Automation / The Modern SIEM
PANEL:
Integrating Automation into SOC Workflows: Best Practices for Success
This panel discussion delves into the integration of automation and AI into SOC workflows, emphasizing the necessity of these technologies in modern security operations. Experts share insights on best practices for implementing automation, addressing challenges such as alert fatigue and skill gaps, and highlight the potential for AI to enhance efficiency and accuracy. The conversation underscores the importance of adapting SOC strategies to leverage AI and automation effectively, paving the way for more proactive and resilient security postures.
Dave Gold
VP Solutions Eng & Americas Field CTO
SentinelOne
Ron Williams
Founder & CEO
Kindo
Shahar Ben-Hador
CEO & Co-founder
Radiant Security
Jamie Morrison
ONE SOURCE
Related Solutions
Enhancing Security Operations with Dropzone
Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.
Revolutionizing SOCs with AI-Driven Efficiency
Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.
AI SOC Xpert Analyst Briefing
Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.