26/11/24
11:35
-
12:15
Beyond reality - The Deepfake challenge
26/11/24
14:25
-
15:05
Let’s write an exploit using AI
26/11/24
15:50
-
16:30
Deep intellectual property protection: Watermarking AI models
26/11/24
15:50
-
16:30
The return of the jailbreak: Prompt injection 101
26/11/24
15:50
-
16:30
Harnessing GenAI: Navigating the double-edged sword in cyber security
27/11/24
10:30
-
11:10
Are humans about to be replaced by AI? We think not!
27/11/24
11:20
-
12:00
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
27/11/24
13:30
-
14:10
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
27/11/24
14:20
-
15:00
AI-Powered cyber threats - A new era of challenges
27/11/24
14:20
-
15:00
Fact or fiction? Navigating the AI-Infested information seas
27/11/24
15:50
-
16:30
Balancing AI innovation and security - A guide to AI security governance
27/11/24
15:50
-
16:30
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
28/11/24
11:05
-
11:45
Skynet vs. your data: A cyber security smackdown
28/11/24
11:05
-
11:45
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
28/11/24
11:05
-
11:45
Zero trust for private 5G networks
28/11/24
11:05
-
11:45
AI-Driven cyber security defense and offense
28/11/24
13:50
-
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
28/11/24
13:50
-
14:30
Tony Stark's AI assistant: From vision to secure execution
28/11/24
13:50
-
14:30
The AI arms race: Defending Australia with automated cyber resilience
28/11/24
14:40
-
15:20
Leveraging AI for kids
28/11/24
14:40
-
15:20
MITRE ATLAS: Defend and protect your AI-enabled systems with tools and community collaboration for AI security and assurance