AI SECURITY TRACK

demo image
PANEL:

Strategies for Red Teaming Agentic AI Applications

This panel focuses on emerging strategies for red teaming agentic AI applications, emphasizing the unique vulnerabilities and security implications associated with these systems. The panel explores the distinctions between agentic AI and traditional LLMs, the necessity of early and scalable red teaming and the importance of processes and metrics for measuring success in identifying and mitigating risks---and the critical need for a collaborative approach in addressing AI security.

Ken Huang LinkedIn

Advisor

CSA

Walker Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Alex Polyakov LinkedIn

Co-Founder & CEO

Adversa AI

Alex Polyakov LinkedIn

Co-Founder & CEO

Adversa AI

Related Solutions

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI SECURITY TRACK

demo image
PANEL:

Threat Modeling for Agentic AI Applications

The panel discusses the complexities of threat modeling for agentic AI applications and the unique security challenges posed by these systems compared to traditional AI models. They dig into the need for new frameworks to address the dynamic and autonomous nature of agentic AI, exploring potential vulnerabilities, data security concerns, and the implications of agent-to-agent interactions in future AI ecosystems. The conversation highlights the importance of collaboration between security professionals and business units to effectively navigate the evolving landscape of AI security.

Ken Huang LinkedIn

Advisor

CSA

Walker Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Sam Rehman LinkedIn

CISO and SVP/Head
of Cybersecurity Business

CyberDef Labs

Jason Haddix LinkedIn

CEO

Aracanum Information Security

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI SECURITY TRACK

demo image
PANEL:

The Most Pressing Issues in AI Security: the Current Snapshot

Anton Chuvakin, Ian Swanson, Richard Stiennon and Ken Huang discuss the most pressing threats facing security pros on the AI front—at this moment.

Anton Chuvakin LinkedIn

Industry Analyst

Google

Richard Stiennon LinkedIn

Chief Research Analyst

IT-Harvest

Ian Swanson LinkedIn

CEO & Co-Founder

Protect AI

Ken Huang LinkedIn

Advisor

CSA

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI SECURITY TRACK

demo image
PANEL:

Managing AI Security Risk

This blue chip panel reviews top line strategies for managing AI security risks including continuous assessment of potential vulnerabilities and threats to AI systems, monitoring various attack vectors and evaluating the security of data used to train AI models, the integrity of the models themselves, and the security of the systems where they are deployed.

Harold Booth LinkedIn

Computer Scientist

NIST

Moinul Khan LinkedIn

Co-Founder & CEO

Aurascape AI

Merlin Namuth LinkedIn

CISO

CITY AND COUNTY OF DENVER

Walker Lee Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI SECURITY TRACK

demo image
PANEL:

Winning the AI Arms Race in Cybersecurity

The panel discussion explores the multifaceted role of AI in enhancing security operations, addressing challenges in compliance, data privacy and ethical AI usage. Experts discuss AI’s dual role in fortifying defenses and being leveraged by adversaries, emphasizing the need for strategic, high-level discourse to guide effective implementation and prioritize AI security initiatives in the evolving cybersecurity landscape.

Rob Sandler LinkedIn

Strategic FSI Partner Manager

Trend Micro

Patrick Angel LinkedIn

CISO

WGroup

Sam Rehman LinkedIn

CISO and SVP/Head of Cybersecurity Business

EPAM Systems

Eidan Siniver LinkedIn

Cyber, Data & AI CTO

Team8

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI SECURITY TRACK

demo image
PANEL:

Safeguarding Data Privacy in Agentic AI Systems

Agentic AI supercharges capability and risk. Our panel unpacks real threats (prompt injection, deepfakes, insecure dev tools) and proven privacy playbooks: zero-retention architectures, AI gateways, RBAC/MFA, continuous logging and privacy-enhancing tech (federated learning, homomorphic encryption, differential privacy, zero-knowledge proofs). Learn how to align security, privacy and compliance with ISO 42001/NIST AI RMF, manage deletion requests, govern multi-agent workflows and protect sensitive data at scale.

Patricia Thaine LinkedIn

Co-Founder & CEO

Private AI

Dean Sapp LinkedIn

CISO

Filevine

Patrick Angel LinkedIn

CISO

WGroup

Mark Butler LinkedIn

CISO

Trace3

Namrata Shah LinkedIn

Managig Director - Global Head of Engineering

Nuveen/p>

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

Non-Human / Identities

demo image
PANEL:

The Rise Of Machines: Securing Non-Human Identities In A Connected World

This panel discussion explores the complexities of securing non-human identities (NHIs) in a rapidly evolving digital landscape. Experts delve into the rise of machine identities, the challenges of governance, and the need for robust security measures. They emphasize the importance of discovery, education, and collaboration across organizations to effectively manage NHIs and mitigate associated risks in a connected world.

Daniel Cohen LinkedIn

SVP, Enterprise
Security Architecture & Capabilities

Paramount

Paul Lanzi LinkedIn

Founder

IDEnovate

Steven Rennick LinkedIn

Member

The Identity Underground

Joshua Wilson LinkedIn

Lead Security Architect

PRA Group

Mathias Reinwarth LinkedIn

Director Practice IAM,
Lead Advisor and Senior Analyst

KuppingerCole Analysts AG

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Non-Human / Identities

demo image
PANEL:

Non-Human / Machine Identities - Why Now – Why Should You Be Concerned

This panel discussion delves into the critical topic of non-human machine identities (NHIs), exploring their historical context, current challenges and the urgency of addressing security concerns in an increasingly automated landscape. Experts share insights on the risks associated with NHIs, including their appeal to attackers and the necessity for improved governance and situational awareness, ultimately advocating for collaborative solutions to mitigate technical debt and enhance security measures.

Anthony Viggiano LinkedIn

Identity and Access Management Leader

James Hauswirth LinkedIn

Global Managing Director - PAM

Cyderes

Anusha Iyer LinkedIn

CEO

Corsha

Joshua Wilson LinkedIn

Lead Security Architect

PRA Group

Sebastian Rohr LinkedIn

Managing Director

Umbrella Security

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Non-Human / Identities

demo image
PANEL:

Harnessing AI for Non-Human Identity Threat Detection

Harnessing AI for Non-Human Identity Threat Detection - This panel explores how AI can be harnessed to detect and mitigate threats targeting non-human identities such as bots, APIs, IoT devices, and machine accounts. Experts discuss the AI driven approaches for anomaly detection and behavioral analytics that can transform how to deal with identifying and detecting inappropropriate use of non-human identities.

Sanjeev Ojha LinkedIn

Practice Director - ZeroTrust, PAM, IAM & IGA

Cyderes

Jon Shende LinkedIn

VP Solutions, Engineering & Americas Field CTO

Sutherland

James Hauswirth LinkedIn

Global Managing Director - PAM

Cyderes

Timm Lotter LinkedIn

Head of Solution Engineering

Unosecur

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Non-Human / Identities

demo image
PANEL:

The OWASP Non-Human Identity Top 10

The OWASP Non-Human Identity Top-10 - This panel covers the OWASP Non-Human Identity Top-10, a comprehensive list of the most pressing security risks and vulnerabilities that non-human identities present to organizations. Experts share insights on these risks, many of which are related to weak lifecycle processes and controls from improper offboarding, secret leakage, overprivileged NHIs, sharing of NHIs, human use NHIs to long-lived secrets. The experts also share guidance on how to mitigate these risks.

Lalit (Mr NHI) Choda LinkedIn

Founder & CEO

Non-Human Identity Mgmt Group

Sameer Bhanushali LinkedIn

Identity & Collaboration Solutions

Paramount

Andrew McCormick LinkedIn

Principal Solutions Architect

Aembit

Anthony Viggiano LinkedIn

Identity and Access Management Leader

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

SOC Automation / The Modern SIEM

demo image
PANEL:

The Future of SOC Automation: Trends and Innovations Shaping Security Operations

This panel discussion examines the future of SOC automation, focusing on the role of AI in enhancing security operations. Experts highlight the importance of balancing automation with human oversight to tackle modern cyber threats effectively. The conversation provides insights into innovations that drive smarter decision-making and improve security posture.

Todd Wade LinkedIn

CISO Interim

CyberRisk Management

Jim Rutt LinkedIn

CISO

Dana Foundation

Ron Williams LinkedIn

Founder & CEO

Kindo

Greg Rogers LinkedIn

Executive Advisor & vCISO

GuidePoint Security

Tom Findling LinkedIn

CEO & Co-Founder

Conifers AI

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.

SOC Automation / The Modern SIEM

demo image
PANEL:

Automating Incident Response: Strategies for Efficient Threat Mitigation

Where does automation deliver the biggest payoff in incident response? This panel dives into triage, enrichment, and Tier‑1/2 playbooks—plus when to keep humans in the loop for high‑risk actions. Learn how to accelerate time‑to‑trust (~90 days), surface SOC bottlenecks, curb LLM hallucinations and strengthen governance, metrics, and skills, with pragmatic takeaways, MSSP-tested practices and defenses against AI‑enabled attacks like deepfakes.

Jim Rutt LinkedIn

CISO

Dana Foundation

Shahar Ben-Hador LinkedIn

CEO & Co-founder

Radiant Security

Dave Gold LinkedIn

VP Solutions Eng & Americas Field CTO

SentinelOne

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.

SOC Automation / The Modern SIEM

demo image
PANEL:

Integrating Automation into SOC Workflows: Best Practices for Success

This panel discussion delves into the integration of automation and AI into SOC workflows, emphasizing the necessity of these technologies in modern security operations. Experts share insights on best practices for implementing automation, addressing challenges such as alert fatigue and skill gaps, and highlight the potential for AI to enhance efficiency and accuracy. The conversation underscores the importance of adapting SOC strategies to leverage AI and automation effectively, paving the way for more proactive and resilient security postures.

Dave Gold LinkedIn

VP Solutions Eng & Americas Field CTO

SentinelOne

Ron Williams LinkedIn

Founder & CEO

Kindo

Shahar Ben-Hador LinkedIn

CEO & Co-founder

Radiant Security

Jamie Morrison LinkedIn

ONE SOURCE

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.