www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::ac43:45e3
Public Scan
Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqwUBmRtNHNdPPZd5lYTFQklKfJj7cCa1tX8yZych5Rf4GBvnNLDKQMVRaEu69DebOCc7rsrx0...
Effective URL: https://www.scmagazine.com/cybercast/a-cisos-guide-to-ai-technologies?utm_source=marketing-campaign&utm_medium=email&utm_ca...
Submission: On February 15 via manual from US — Scanned from DE
Effective URL: https://www.scmagazine.com/cybercast/a-cisos-guide-to-ai-technologies?utm_source=marketing-campaign&utm_medium=email&utm_ca...
Submission: On February 15 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="w-100" scmag-registration="set">
<div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-body"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-body"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-body"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-body"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-body"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="mb-4">
<div>
<div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
</div>
<div>
<div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information about
upcoming SC Media events, webcasts, and conferences.</label></div>
</div>
</div>
<div class="fs-9 my-4">
<p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Terms and Conditions</a><span> and
</span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Privacy Policy</a>.</p>
</div><button type="submit" class="btn btn-primary">Create Account</button>
</form>
Text Content
Log inRegister CISO Stories Topics Events Podcasts Research Recognition Leadership About February 22 2:00 PM ET A CISO’S GUIDE TO AI TECHNOLOGIES Live Webcast|1 hour Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI tools to help their company as well as define the acceptable risks and proper usage. This panel discussion explores: * Current uses of AI in security programs and where it adds the most value * Key risks of leveraging AI tools and how you decide to accept the risk or not * Impact of AI on attack trends and how your security posture should shift * How to vet AI technologies and key questions security leaders need to ask SPEAKERS Parham Eftekhari Executive Vice President, CISO Communities CyberRisk Alliance Parham Eftekhari is a business executive specializing in cyber and national security. He currently serves as Executive Vice President, CISO Communities at CyberRisk Alliance, leading its CISO services platform which consists of the Cybersecurity Collaborative and Cybersecurity Collaboration Forum. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation’s leading cybersecurity think tank, which he founded in 2014. Other leadership roles during his more than 15 years in this sector include co-founder and Vice President of research at the Government Technology Research Alliance, founder of the world’s first webcam cover manufacturer CamPatch, and Advisory Board member at the Ready Rock Institute. Parham has developed and authored multiple research publications, regularly engages with the media, and has addressed forums ranging from Congress, TED, RSA, and C-SPAN. In 2017, Parham was recognized by (ISC)2 for his contributions to the field of cybersecurity with the Most Valuable Industry Partner – Government Information Security Leadership Award. Corey Kaemming Sr. Director Information Security Valvoline Corey Kaemming is an accomplished strategic leader with extensive experience and demonstrated success in managing a broad range of risk oversight activities, including risk identification, control design and evaluation, and completion of risk and control self-assessments. Possess specialist expertise in network security architecture, network access and monitoring, data access and monitoring, identity and access management, and employee education and awareness. 11 years spent leading public companies’ global security team developing standards, processes, and technologies related to cyber risk. Proven track record of success in creating and implementing global information security, cyber security, and risk management strategies for key business functions; able to support incident response policies, processes, and planning. A transformational leader with strong skills in leading, training, and developing teams to achieve and exceed predefined performance targets while monitoring performance on regular basis to introduce multiple process improvements. A proactive and dynamic leader with extensive experience in coordinating global remote and on-site Cybersecurity Assessments and Controls within various industry sectors to include: Retail, Energy, Food & Agriculture, and Manufacturing. Education – Professional Organizations B.S. in Computer Science and Engineering Technology M.S in Management, Computer and Information Systems Security Executive Cybersecurity Leadership Master Certificate – Professional Development Academy Co-Chair Cybersecurity Collaborative – Detroit Chapter Nicole Carignan VP of Strategic Cyber AI Darktrace Nicole Carignan is the VP of Strategic Cyber AI for Darktrace, and she has 25 years of experience in cybersecurity, networks, computer science, data science/artificial intelligence and IT supporting numerous private and public institutions in cybersecurity solutions and data science. She has 20 years of federal USG experience. Her expertise in Cyber Threat Intelligence, Data Science, Machine Learning, Artificial Intelligence, Defense in Depth Solutions, Operations Engineering, and Network Security products gives her insight into technology, tools, and techniques for unique solutions. In this role, she serves in executive leadership for the application of artificial intelligence to cyber security through thought leadership, product strategy, research, and communications. SPONSORS Log in Register Business Email Password First Name Last Name Company Name Job Title Yes, I would like to receive industry news alerts, the Daily Scan, and editorial updates from SC Media. Yes, I would like to receive information about upcoming SC Media events, webcasts, and conferences. By clicking the Create Account button below, you agree to SC Media Terms and Conditions and Privacy Policy. Create Account -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies