Credits: None available.
Learn how to build and manage a strong personal brand that helps you represent your true self while advancing your cybersecurity career. We’ll discuss how to stay relevant, authentic and effective in your personal branding efforts, ultimately helping you to achieve your professional goals. Get new strategies to showcase your personal brand to your network. You’ll learn how to effectively communicate your personal brand through various channels, and how to leverage your network to advance your career.
Credits: None available.
What do Board directors really want to hear about technology and cybersecurity? How do you help the Board make good decisions that achieve organizational risk management goals with limited resources? This presenter will share insights from his real-life experience in reporting to and serving on corporate Boards and from his discussions with other Board directors. Learn what to lean into and what content to avoid to successfully communicate your message and ensure that the Board makes the best decisions.
Credits: None available.
Learn how ChatGPT, a large language model developed by OpenAI, can be used in defensive security operations. Natural Language Processing (NLP) has proven to be a valuable tool in enhancing the effectiveness and efficiency of security operations. We’ll look at the potential use cases of ChatGPT in threat intelligence, security incident response and vulnerability management. You’ll learn about the integration of ChatGPT with existing security tools and workflows, as well as the benefits and challenges of utilizing NLP in security operations.
Credits: None available.
Supply chain compromise is a black swan event in threat hunting and detection. While the impact can be practically unlimited, prevalence and frequency have, until recent years, been low enough that the threat model has often been considered unlikely or even theoretical. Hunting supply chain compromise is like cloud API threat hunting in that the difference between innocent and suspicious activity is a matter of nuance that cannot be expressed in simple query and/or search-based rules. It can be compared to insider threat hunting in that supply chain mechanisms and associated users may be inherently trusted, and any alerts may be dismissed. Anomaly detection and machine learning are becoming increasingly good tools for these kinds of hunts.