www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:45e3  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqwUBmRtNHNdPPZd5lYTFQklKfJj7cCa1tX8yZych5Rf4GBvnNLDKQMVRaEu69DebOCc7rsrx0...
Effective URL: https://www.scmagazine.com/cybercast/a-cisos-guide-to-ai-technologies?utm_source=marketing-campaign&utm_medium=email&utm_ca...
Submission: On February 15 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information about
          upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="fs-9 my-4">
    <p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Terms and Conditions</a><span> and
      </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Create Account</button>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About

February
22
2:00 PM ET


A CISO’S GUIDE TO AI TECHNOLOGIES

Live Webcast|1 hour

Generative AI has taken over the conversation and, in time, will be
transformative to the cyber industry and our society. But the models are still
in development, and ultimately, CISOs must discern the appropriate places to
leverage AI tools to help their company as well as define the acceptable risks
and proper usage. 

This panel discussion explores:

 * Current uses of AI in security programs and where it adds the most value 
 * Key risks of leveraging AI tools and how you decide to accept the risk or not
 * Impact of AI on attack trends and how your security posture should shift
 * How to vet AI technologies and key questions security leaders need to ask


SPEAKERS

Parham Eftekhari
Executive Vice President, CISO Communities
CyberRisk Alliance

Parham Eftekhari is a business executive specializing in cyber and national
security. He currently serves as Executive Vice President, CISO Communities at
CyberRisk Alliance, leading its CISO services platform which consists of the
Cybersecurity Collaborative and Cybersecurity Collaboration Forum. Parham also
serves as the chairman of the Institute for Critical Infrastructure Technology
(ICIT), the nation’s leading cybersecurity think tank, which he founded in 2014.
Other leadership roles during his more than 15 years in this sector include
co-founder and Vice President of research at the Government Technology Research
Alliance, founder of the world’s first webcam cover manufacturer CamPatch, and
Advisory Board member at the Ready Rock Institute. Parham has developed and
authored multiple research publications, regularly engages with the media, and
has addressed forums ranging from Congress, TED, RSA, and C-SPAN. In 2017,
Parham was recognized by (ISC)2 for his contributions to the field of
cybersecurity with the Most Valuable Industry Partner – Government Information
Security Leadership Award.

Corey Kaemming
Sr. Director Information Security
Valvoline

Corey Kaemming is an accomplished strategic leader with extensive experience and
demonstrated success in managing a broad range of risk oversight activities,
including risk identification, control design and evaluation, and completion of
risk and control self-assessments. Possess specialist expertise in network
security architecture, network access and monitoring, data access and
monitoring, identity and access management, and employee education and
awareness. 11 years spent leading public companies’ global security team
developing standards, processes, and technologies related to cyber risk.

Proven track record of success in creating and implementing global information
security, cyber security, and risk management strategies for key business
functions; able to support incident response policies, processes, and planning.
A transformational leader with strong skills in leading, training, and
developing teams to achieve and exceed predefined performance targets while
monitoring performance on regular basis to introduce multiple process
improvements.
A proactive and dynamic leader with extensive experience in coordinating global
remote and on-site Cybersecurity Assessments and Controls within various
industry sectors to include: Retail, Energy, Food & Agriculture, and
Manufacturing.
Education – Professional Organizations
B.S. in Computer Science and Engineering Technology
M.S in Management, Computer and Information Systems Security
Executive Cybersecurity Leadership Master Certificate – Professional Development
Academy
Co-Chair Cybersecurity Collaborative – Detroit Chapter

Nicole Carignan
VP of Strategic Cyber AI
Darktrace

Nicole Carignan is the VP of Strategic Cyber AI for Darktrace, and she has 25
years of experience in cybersecurity, networks, computer science, data
science/artificial intelligence and IT supporting numerous private and public
institutions in cybersecurity solutions and data science. She has 20 years of
federal USG experience. Her expertise in Cyber Threat Intelligence, Data
Science, Machine Learning, Artificial Intelligence, Defense in Depth Solutions,
Operations Engineering, and Network Security products gives her insight into
technology, tools, and techniques for unique solutions. In this role, she serves
in executive leadership for the application of artificial intelligence to cyber
security through thought leadership, product strategy, research, and
communications.


SPONSORS


Log in
Register
Business Email
Password
First Name
Last Name
Company Name
Job Title
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Create Account button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Create Account

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies