chat
expand_more

The Convergence of AI + Cybersecurity: Announcing Season 3

Join us for Season 3 of The Convergence of AI + Cybersecurity as we explore deepfakes, the evolving role of the SOC, and the intricacies of AI-native security.
September 3, 2024

The rapid proliferation of AI continues to reshape the digital landscape, making both its promise and peril more apparent. We've seen how generative AI tools like ChatGPT can revolutionize workflows and empower businesses. But with that power comes a darker side, as cybercriminals increasingly harness AI to craft sophisticated, large-scale attacks that threaten organizations worldwide.

In response to these growing concerns, we are excited to bring you the third season of our web series, The Convergence of AI + Cybersecurity. This season will dive even deeper into the transformative intersection of AI and cybersecurity—exploring the latest challenges and strategies needed to safeguard your organization.

Season 3 will feature the following sessions and speakers:

  • Chapter 7 | Diving Into the Deep: How Deepfakes Will Change Cybercrime
    • Tyler Cohen Wood, Cofounder of Dark Cyptonite and Former Senior Intelligence Officer at the U.S. Defense Intelligence Agency
    • Mike Britton, CISO at Abnormal Security
  • Chapter 8 | Sock It to the SOC: How AI Will Change the Role of the SOC Team
    • David Kennedy, Founder & Chief Hacking Officer at TrustedSec and Binary Defense

    • Mick Leach, Field CISO at Abnormal Security

  • Chapter 9 | Analyzing the Black Box: A Crash Course in AI-Native Cybersecurity
    • Dr. Rumman Chowdhury, Responsible AI Fellow at Harvard University; Former Director of AI Ethics at Twitter

    • Dan Shiebler, Head of AI at Abnormal Security

Register Now

Don’t Miss the Most Popular Web Series on Cybersecurity + AI

If you joined us for the first two seasons, you know all about the invaluable insights offered by industry leaders. If you haven’t had the opportunity to attend previous sessions, now is your chance to catch up and prepare for the AI-powered future.

Here are a few more details on what you can expect from this season:

Chapter 7 | Diving Into the Deep: How Deepfakes Will Change Cybercrime

Wednesday, September 11, 2024 | 1:00 pm ET

Deepfake technology is poised to revolutionize cybercrime, blending reality and digital manipulation. In this session, cybersecurity expert Tyler Cohen Wood and Abnormal CISO Mike Britton discuss how cybercriminals weaponize deepfakes, from phishing schemes to eroding trust in digital content. They’ll also share predictions on when deepfakes will become an unavoidable threat. Join us to understand the risks and learn how to protect against the growing dangers of deepfakes.

Chapter 8 | Sock It to the SOC: How AI Will Change the Role of the SOC Team

Wednesday, September 25 | 1:00 pm ET

AI is transforming the security operations center (SOC), automating tasks and enhancing threat detection. In this webinar, seasoned SOC experts explore how AI-driven technologies are reshaping the SOC's role, from evolving skill sets to the potential for AI to augment or replace human intelligence. Learn how your SOC team can adapt to these changes and thrive in an AI-driven cybersecurity world.

Chapter 9 | Analyzing the Black Box: A Crash Course in AI-Native Cybersecurity

Wednesday, October 9, 2024 | 1:00 pm ET

AI is becoming central to cybersecurity, which makes understanding its complexities crucial. This session demystifies the "black box" of AI-driven security, covering essential concepts, the risks of opaque AI models, and strategies for transparency and accountability. Learn from leading AI security experts how to navigate AI algorithms and better protect your organization in this rapidly evolving landscape.

As a reminder, all three sessions qualify for CPE credits from ISC2. To claim your credits, you can join live or watch on-demand after the event.

Explore the Future of AI and Cybersecurity

In this ever-transforming cyber frontier, understanding the dual nature of AI—both as a tool for innovation and a weapon for exploitation—is crucial for security leaders everywhere.

Don’t miss your chance to learn practical insights about this critical topic. Whether you're new to the series or continuing the journey, Season 3 of The Convergence of AI + Cybersecurity will equip you with the knowledge needed to protect your organization from emerging threats.

Secure your spot for Season 3 by registering today.

The Convergence of AI + Cybersecurity: Announcing Season 3

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More