AI in Cyber Online

Avatar
[[{“value”:”

May 8, 2024Location: Online

As technology reshapes the global scene, fortifying digital defenses against evolving cyber threats is critical. In the Asia Pacific region, unwavering commitment to cybersecurity resilience is evident, leveraging cutting-edge AI technologies.

AI in Cyber APAC explores this landscape, delving into AI’s role in threat detection, incident response, and overall cybersecurity posture, guided by experts shaping digital security in the region.

The best part? This online event is entirely free! Even if you’re unable to attend at the scheduled time, don’t worry—register now and gain access to the replay once the sessions are over!

Join us on the 8th of May 2024, online at 12 PM AEST / 10 AM SGT.

Speakers include;

Phil Ross, CISO, Air New Zealand (New Zealand)
Deepa Bradley,Executive Cybersecurity Strategist & APAC CISO Advisory Board Member (Australia)
Pepijn Kok,Head of Cybersecurity, AIS (Thailand)
Ts. Saiful Bakhtiar Osman,Head of IT, Shared Services, PNB Commercial (Malaysia)
Indra Adillah,Head of ICT, AirAsia Indonesia(Indonesia)
Prof. Helge Janicke, Deputy CEO & Research Director, Cyber Security Cooperative Research Centre (Australia)
Mel Migrino,Founder, Chairman of the Board & President, Philippines CIO Association (Philippines)
And more..

“}]] 

Total
0
Shares
Previous Post

Saudi Global CISO Summit

Next Post

Cyber Security & Cloud Global 2025

Related Posts

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. "This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent
Avatar
Read More

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first one where there exists no safety
Avatar
Read More

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct
Avatar
Read More