chat
expand_more

The Convergence of AI + Cybersecurity: Announcing Season 4

Join this virtual event series to get the insights you need to make security decisions in the age of AI.
March 26, 2025

Artificial intelligence is transforming every aspect of our digital world—and cybersecurity is no exception. As the line between offensive and defensive AI continues to blur, today’s security leaders are grappling with a new reality: one where AI-powered threats evolve faster than ever, and traditional defenses simply can’t keep up.

That’s why we launched The Convergence of AI + Cybersecurity—a webinar series that brings together the brightest minds in tech, security, and AI to explore how organizations can stay ahead. And now, Season 4 is here.

Register Now

Join Abnormal for the Most Popular Web Series on Cybersecurity + AI

If you joined us for the first three seasons, you know that this brings together top executives, security leaders, and AI experts to explore how AI is influencing cybercrime, changing defense strategies, and redefining the future of the industry. And if you haven’t had the opportunity to attend previous sessions, now is your chance to catch up and prepare for the AI-powered future.

Here’s what to expect from the upcoming season, and multiple times where you can catch it live:

Chapter 10 | Worm, Fraud, Ghost... Oh My: A Deep Dive into Malicious GPTs
North America: Wednesday, April 2, 2025 | 1:00 pm ET
Europe: Wednesday, April 2, 2025 | 10:00 am BT
Australia/Asia: Wednesday, April 2, 2025 | 1:00 pm AEDT

You’ve heard about ChatGPT and Claude, but are you familiar with their malicious counterparts like WormGPT and GhostGPT? The rise of malicious GPTs is concerning, as they allow cybercriminals to create attacks at scale—without any built-in protections. In this session, we’ll dive into these platforms so you know what to expect.

Chapter 11 | The Human Element of BEC: What's Real, What's Hype, and What's Next
North America: Wednesday, April 16, 2025 | 1:00 pm ET
Europe: Wednesday, April 23, 2025 | 10:00 am BT
Australia/Asia: Wednesday, April 23, 2025 | 1:00 pm AEDT

There’s no denying humans are susceptible to social engineering attacks—largely because they prey on fear, uncertainty, and doubt. So what do we do about it, and how do you keep your people safe? Plus… is security awareness training really the magic solution it’s made out to be? Join this session to get actionable insights from behavior experts and security leaders.

Chapter 12 | AI and Cybersecurity Policy: Navigating Regulation and Compliance
North America: Wednesday, May 14, 2025 | 1:00 pm ET
Europe: Wednesday, May 14, 2025 | 10:00 am BT
Australia/Asia: Wednesday, May 14, 2025 | 1:00 pm AEDT

The government is regularly launching new AI directives, but what do they all mean for cybersecurity? What will global governments do next… and how will AI innovation change as a result? We’ll dive into what you need to know in this session.

As a reminder, all three sessions qualify for CPE credits from ISC2. To claim your credits, you can join live or watch on-demand after the event.

Explore the Future of AI and Cybersecurity with Us

Whether you're a security practitioner, AI enthusiast, or business leader, this series delivers valuable perspectives on the rapidly evolving threat landscape—and you won’t want to miss it.

Whether you're new to the series or continuing the journey, Season 4 of The Convergence of AI + Cybersecurity will equip you with the knowledge needed to protect your organization from emerging threats.

Secure your spot for Season 4 by registering today.

The Convergence of AI + Cybersecurity: Announcing Season 4

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More