TUESDAY, August 6th, 2024

Cybercriminals Are Using AI – Are You?

5:30pm – 8:00pm PT | Las Vegas, NV

Event Overview

In the race against cyber threats, the integration of AI into cybersecurity frameworks is no longer optimal – it’s imperative. With the evolution of adversarial tactics and increasing operational complexity, the need for security teams to shift from reactive patching to predictive threat modelling is now more critical than ever. So, how can AI-powered analytics be deployed to identify vulnerabilities before attackers exploit them?

Whilst legacy tools create a bottleneck, hindering developer productivity and leaving gaps in your security posture, the consideration around the successful application of AI remains at the forefront of board conversations. Although AI-powered static analysis offers a compelling solution, the question remains: how do we optimize the efficacy and efficiency of AI tools to maximize their security benefits?

This invitation-only event will outline how AI can accelerate secure code creation, integrate into existing security workflows, and provide effective threat prioritization based on reachability and exploitability.

DISCUSSION POINTS

  • How can AI be leveraged to reduce scan and fix times for vulnerabilities?
  • How can you translate time saved into cost savings or increased development capacity?
  • How can AI be used to improve how engineers consume and fix application vulnerabilities?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Tom Fields

SVP Editorial

ISMG

Chris Hatter

CISO

Qwiet AI

Chetan Conikee

Co-Founder & CTO

Qwiet AI

Speakers

Join Chris Hatter, CISO at Qwiet AI, and Chetan Conikee, Co-Founder and CTO, to explore the challenges in application security and the essential role of AI in enhancing digital defences. This discussion will focus on how AI can streamline coding and improve security, emphasising practical insights into AI’s impact on your organisation’s security posture.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Chris Hatter

CISO

Qwiet AI

Chris Hatter is an Operating Partner at NumberOne AI and the Chief Information Security Officer at Qwiet, an AI-powered AppSec platform.

He has over a decade of experience in cybersecurity strategies, managing threats and vulnerabilities, risk assessment tools, cybersecurity leadership, legal and compliance issues, cyber hygiene, responding to cyber crises and managing implementation. Prior to his role at Nielsen, Chris held several senior security and IT positions throughout his 11-year tenure within the company, including leading application development for all of Nielsen’s international Television Audience Measurement processing platforms.

Chris holds a Bachelor of Business Administration in Management Information Systems from the University of South Florida and sits on the university’s advisory board of cybersecurity for executives.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Las Vegas, NV

Eiffel Tower Las Vegas- 3655 Las Vegas Blvd. South, Las Vegas, Nevada 89109

Underwritten by

Qwiet AI’s mission is to help you find and eradicate security defects in software code before they are deployed into your production environment and do so with speed and accuracy unrivaled in the space. At Qwiet AI we enable you to prevent the unpreventable by addressing and fixing unknown unknowns.
We are contemporary protectors leveraging AI and ML along with best-in-class cyber-defenders who wake up every day motivated by the notion doing what’s right for our customers and the industry we serve. We relentlessly pursue pushing the boundaries of the DevOps and AppSec space to afford them every means possible to create security defect free code while meeting their time to market needs. Every day we challenge ourselves to think out-of-the-box to do better and put our customers first in everything we do.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

July 16, 2024

MLOps and the Role of Gen AI in Securing the Software Supply Chain

July 18, 2024

Healthcare Cybersecurity Summit: New York

July 18, 2024

AI Empowerment at Workplace: Revolutionizing Collaboration and Customer Engagement

July 23, 2024

Cyber Security Readiness with Splunk

August 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

Upcoming ISMG Events

July 16, 2024

MLOps and the Role of Gen AI in Securing the Software Supply Chain

July 18, 2024

Healthcare Cybersecurity Summit: New York

July 18, 2024

AI Empowerment at Workplace: Revolutionizing Collaboration and Customer Engagement