Based on the rapid development of AI technology, enterprises now face more complex information security threats.
This course is going to analyze the four major challenges bought by AI technology which are the speed of technological development, system vulnerabilities, data authenticity, and continuous vigilance. It will also explore how to enhance defense capabilities through CTEM (Continuous Threat Exposure Management), ZTA (Zero Trust Architecture), and CSPM (Cloud Security Posture Management).
Additionally, it will share how to integrate SOC, MDR and SOAR to build an information security monitoring and response platform, and how to enhance exposure management and information security resilience through EASM (External Attack Surface Management), BAS (Breach and Attack Simulation), and Incident Response exercises.
Finally, this session will help enterprises grasp AI driven information security trends, establish more comprehensive protection strategies, and ensure operational security and digital transformation development.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。