InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How Generative AI is Transforming Cyber Security

Presented by

Evan Shelley, Director Transformation Solutions Architects at Rubrik

About this talk

AI is now available to everyone, including and perhaps most concerning cyber criminals. They, too, will use AI to improve and optimize their tactics, such as Social Engineering, Reconnaissance, Code Quality, and so on. But if adversaries are using AI to become more efficient in their cyber attacks, how can you and your allies use AI to help support and protect you? Generative AI is amazingly powerful. The capabilities provided to anyone in the world are changing our lives forever. However, Generative AI is limited by the information or data it is provided. Fortunately, Rubrik has rich data which can enable Generative AI to provide powerful outcomes. Watch this session to learn all about how you can leverage AI to: -> Build the ability to accelerate recovery after a cyber event -> Identify and/or search for specific IOCs, and -> Initiate a safe recovery from a known clean version of data And, don't forget to look at the attachments for more free insights on AI powered cyber security!
Rubrik

Rubrik

21597 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics