About Cyber AI & Automation Summit

SecurityWeek’s inaugural Cyber AI & Automation Summit pushed the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs. 

The 2024 virtual summit will feature discussion on the revolutionary role of AI, machine learning, and automation in cybersecurity. Attendees can expect robust debate on practical use-cases for AI-enabled security, the hype vs the promise of AI, and some early wins around vulnerability discovery and cloud attack surface management.

Agenda

time icon -

[ON-DEMAND] See Purple AI in Action

Your AI security analyst to detect earlier, respond faster, and stay ahead of attacks.

time icon -

[ON-DEMAND] Veracode's Application Risk Management Platform Overview

time icon 11:00

AI & Humanity: The Human Element in AI-Enhanced Cybersecurity

In an era where AI-generated deepfakes and sophisticated social engineering attacks are becoming increasingly prevalent, effectively weaving together human and machine intelligence (AI) is more important than ever.  Join us for an exclusive virtual session hosted by Gregor Stewart, VP of AI, and Dr. Jessica Barker MBE, a leading expert in the human aspect of cybersecurity and a best-selling author. We will discuss recent high-profile incidents and emphasize the crucial role of human awareness in addressing these challenges.  In this insightful session, we will: 

  • Explore the critical intersection of human intelligence and AI in cybersecurity 
  • Analyze real-world examples of AI-driven threats  
  • Foreground ways that security teams can positively influence culture (using AI) to counter these new threats. 

As we navigate this complex landscape of AI-driven threats, this session will equip you with the insights and strategies that highlight the crucial role of human awareness in safeguarding our digital future.

Dr. Jessica Barker

Cygenta, Co-Founder & Co-CEO

Cyber security expert & behavioural science specialist. Helping people become the strongest link in security since 2011. Author, professional speaker & entrepreneur focused on the human side of cyber resilience.

Gregor Stewart

SentinelOne, Vice President of AI & Machine Learning

time icon 11:30

Scaling IT and Security Execution with Autonomous Endpoint Management (AEM)

The growing number of software updates, vulnerabilities, and attacks in a complex and dynamic IT environment are making it harder for IT and security to keep up with tasks like patching, compliance, vulnerability management, and incident response in a timely and efficient manner. This session will cover a groundbreaking new approach that transforms how IT and security identify and execute changes safely in their environment using automation and AI. See how you can get dramatically better insights, have a unique ability to act faster than ever before, and gain an order of magnitude more confidence when taking actions.

Chris Hallum

Tanium, Senior Director of Product Marketing – Platform

time icon 12:00

CrossRoads of AppSec & Gen-AI

The "Crossroads of AppSec & Gen-AI" talk by Sohail Iqbal, CISO at Veracode, will focus on the intersection of Application Security and Generative AI, highlighting the current challenges facing organizations today. Sohail will share critical findings and recommendations from Veracode's latest State of Software Security research, demonstrating how Gen-AI further amplifies the risks associated with application stacks. He will cover practical steps on how to adopt Gen-AI safely and overcome the velocity and adoption challenges it brings to the software development life cycle and overall organizational ecosystem.

Sohail Iqbal

Veracode, CISO

Sohail Iqbal is a distinctive cybersecurity leader and practitioner. Sohail is currently Vice President & CISO for Veracode, a leader in Intelligent Software Security. Sohail has led to successful security practices and developed effective security programs across many organizations. He has been instrumental in developing and maturing security practices as Head of Cybersecurity Operations at Dow Jones / WSJ, CISO at J2 Global / Ziff Davis, and Head of Information Security at CarGurus. He also served as Director for MediaISSF (Media Industry Security Sharing Forum), a CISO-led board to share common cybersecurity challenges faced by Media Industry. He has also served on the Cybersecurity Advisory Council for Rutgers University, NJ. Sohail is an active member of many security conferences and seminars and contributes frequently to the cybersecurity community.

time icon 13:00

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

time icon 13:15

Cybersecurity and AI - Using AI to Reduce Cybersecurity Risks

Cybersecurity programs and processes take significant investments and resources to deliver cybersecurity services and reduce risks. Strategic and high-value time of internal resources is spent on manual cybersecurity efforts. In this new AI enabled world, how can CISOs and cyber executives think differently about meeting their customer and business commitments of maintaining a secure and compliant environment, in a cost efficient way? Latest GenAI and related technologies provide the capability of building data pipelines with source systems, generating insights from unstructured information, and building reporting layers to give near real-time risk and controls insights. Custom use cases and homegrown solutions that are built on a secure platform can significantly save costs and drive efficiencies for the business. Learn more about how to use AI effectively and efficiently for your cyber programs.

Shirish Munshi

PwC, Principal, Cybersecurity, Risk and Regulatory

Shirish is a Cybersecurity Partner at PwC and a seasoned and visionary cybersecurity executive with a distinguished career in leading global organizations to safeguard their technology and business assets using automation and advanced techniques (e.g., AI, ML). He has over 15 years of experience leading, managing and successfully delivering large multi-million-dollar initiatives in the areas of cyber risk management, regulatory programs, digital transformation for security organizations, and cyber governance. He has served as a trusted advisor to several security and business executives for mid-sized and large technology organizations, providing strategic and technical guidance, and implementing robust and transformative security programs.

time icon 13:45

Barbarians at the Gate(s): Layering LLMs to Defend Against Misuse

Ensuring the security of LLM-based systems is so difficult due to the fact that filtering based on keywords or patterns is virtually impossible based on an infinite number of ways to write potentially malicious messages for the LLM to process. The session will be a walkthrough of a gatekeeper model to help protect an LLM against misuse, which employs one or more LLMs that act as initial proxies for the "real" LLM. In a Capture the Flag (CTF) scenario, the research details the process and results of using two gatekeepers to check user input before the primary LLM even sees it. Then, if deemed a valid query, using a third gatekeeper to validate the response, potentially catching abuse that may have evaded the inbound gatekeepers by scrutinizing the reply for unusual output.

Derek Rush

Bishop Fox, Managing Consultant

Derek’s security career has focused on full scope penetration assessments across an array of verticals, including government contractors, healthcare, retail, finance, manufacturing, biomedical, and educational industries. With LLMs being rapidly adopted by organizations, Derek has taken time to explore and prototype architectures observed during fieldwork.

time icon 14:15

Automating Threat Modeling: Challenges and AI Solutions

Threat modeling is essential for identifying and mitigating cybersecurity risks, but manual processes can be slow and error-prone. Join us for this session as Audrey Long, Senior Security Software Engineer at Microsoft in the Commercial Software Engineering team (CSE), explores how AI can accelerate and enhance threat modeling. 

Real-world examples will demonstrate how AI streamlines threat modeling, increasing efficiency and ensuring consistency. We will also discuss the challenges of automating threat modeling, including analyzing system architectures and identifying attack vectors. 

Additionally, we will address AI's limitations in threat modeling and mitigation strategies. 

Whether you're new to threat modeling or want to improve existing practices, this talk will show you how AI can revolutionize your cybersecurity approach.

Audrey Long

Microsoft, Senior Security Software Engineer

Cyber AI & Automation Summit 2024 - Sponsors & Sessions Cyber AI & Automation Summit 2024 - Sponsors & Sessions 100% 10 E7 Audrey Long is a Senior Security Software Engineer at Microsoft in the Commercial Software Engineering team (CSE), which is a global engineering organization that works directly with the largest companies and not-for-profits in the world to tackle their most significant technical challenges. To Audrey, security is like solving a puzzle, but with real life impact- and she loves to break these puzzles. Because security is such a focal point for many customers, but there are so few people, and especially women in the space, Audrey is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security at Johns Hopkins. Audrey Long is a Senior Security Software Engineer at Microsoft in the Commercial Software Engineering team (CSE), which is a global engineering organization that works directly with the largest companies and not-for-profits in the world to tackle their most significant technical challenges. To Audrey, security is like solving a puzzle, but with real life impact- and she loves to break these puzzles. Because security is such a focal point for many customers, but there are so few people, and especially women in the space, Audrey is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security at Johns Hopkins. Turn on screen reader support To enable screen reader support, press Ctrl+Alt+Z To learn about keyboard shortcuts, press Ctrl+slash

Event Sponsors