Abnormal Security Roundtable Dinner: How to stop the most sophisticated AI generated attacks
Discussion Points
Advanced attacks powered by AI
- Personalised
- Effortless
- Sophisticated
Offensive vs. Defensive AI
- Only AI can fight against AI
- ML/Behavioral approach
- NLP + NLU
Cross-platform challenges
- Cloud-based applications
- (Unified) Account Take Over
How to stop the most sophisticated AI generated attacks
Artificial Intelligence is changing the Cybersecurity landscape, since it’s been widely accessible by a technical as well as non-technical audience.
97% of Security Professionals believe that AI is important to email Security and will level up their organisation’s defence since AI-powered Security tools are better tailored to address AI-powered threats as they do not rely on the ‘known-bad’ (eg. Rules and signatures), but a deep understanding of all Cloud-based Apps and emails environment is crucial to detect any deviant and subtle AI-driven attacks.
Agenda
Welcomed attendees are integrated into a curated networking space, fostering direct interactions for ice-breaking and relationship-building before engaging in substantive, collaborative discussions.
Shifting to a sit-down discussion with drinks, this promotes open, thoughtful dialogue on a set topic agenda, aimed at fostering collaboration and deepening connections in a relaxed, supportive setting.
The evening culminates with a luxury meal, offering exquisite cuisine in an elegant setting, enhancing networking opportunities, and providing a memorable experience that strengthens professional bonds among attendees.
The finale features a wrap-up and Q&A session, where sponsors address the roundtable, followed by drinks and networking, enabling direct engagement and planning of actionable next steps in a collaborative environment.
Why Attend?
Insightful Discussions
Insightful Discussions
Tailored Content
Strategic Takeaways
About the hosts
Abnormal Security is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications.