Cybersecurity in the Age of AI: Navigating Unseen Threats


Details
You must register to attend: https://www.eventbrite.com/e/cybersecurity-in-the-age-of-ai-navigating-unseen-threats-tickets-1292147771769
### Topic One : Cybersecurity in the Age of AI: Navigating Unseen Threats
Now more than ever, cybersecurity is paramount for protecting sensitive data from breaches and attacks. The integration of AI in business processes brings both efficiency and new cybersecurity challenges. This presentation explores the dual nature of AI as both a business asset and a potential threat. It highlights how AI enhances productivity, transforms customer service, and enables predictive analytics, while also posing risks such as data privacy concerns and the potential for malicious use.
The presentation will delve into AI's role in cybersecurity, including its ability to detect threats and respond to breaches in real time. It also addresses the darker side of AI, such as its weaponization by cybercriminals, enhanced attack capabilities, and the challenges in detecting AI-driven threats like data poisoning, AI-enabled malware, and sophisticated social engineering attacks. Real-world examples illustrate the significant impact of these threats on businesses.
We'll discuss how to mitigate AI risks, discuss future trends, emphasize the need for businesses to adapt to new AI threats and opportunities, and the role of predictive analytics in future defenses.
Speaker One: Ken May
Ken May is CEO of Swift Chip and a cybersecurity expert with more than a dozen industry certifications. He has significant experience in the fields of offensive threat modeling, digital information security analytics, intrusion detection, and response.
Ken is a Community Instructor for SANS and also teaches at Oxnard College.
Along with his work in the IT industry, Ken is also an active community member, serving on the SANS Advisory Board and previously serving on the CompTIA IT Security Executive Council, the Business Advisory Board at the Museum of Ventura County, and the Industry Advisory Council at Oxnard College.
### Topic Two: The Routing Security Crystal Ball: RPKI Yesterday, Today and Tomorrow
Join us for a deep dive into the evolution of Routing Security and the key factors that led to the development of Resource Public Key Infrastructure (RPKI). We'll explore the timeline of its initial deployments and the pivotal moments that brought RPKI to the forefront of the global Internet community. Recent U.S. government initiatives have prioritized the creation of RPKI Route Origin Authorizations (ROAs) to bolster network security. Finally, we’ll look ahead into the future of RPKI, examining upcoming developments and long-term plans being discussed within standards bodies and the broader Internet community.
### Speaker Two: John Sweeting
John Sweeting is the Chief Experience Officer for the American Registry for Internet Numbers (ARIN), accountable for the overall customer experience and development of all customer services and applications. He is responsible for the direction and operations of the Registration Services Department, Communications Department, and Customer Experience and Strategy Department. Prior to joining ARIN, he served 12 years on the ARIN Advisory Council, six of which he was the Chair, and one year on the Address Supporting Organization’s Address Council (ASO AC). John participated on the Consolidated RIR IANA Stewardship Proposal (CRISP) team that was convened in December 2014 to guide development of the Number Community response to the IANA Stewardship Transition Coordination Group’s RFP.
John’s experience in the Internet industry includes building and managing large global networks with international carriers such as Internet MCI, Cable & Wireless, Teleglobe, and Tata Communications. Immediately prior to joining ARIN, John served as the Senior Director of Architecture and Engineering for Time Warner Cable, responsible for the selection and testing of all network infrastructure from the core backbone to the service delivery platforms.

Cybersecurity in the Age of AI: Navigating Unseen Threats