Artificial Intelligence (AI) has sparked widespread innovation – and apprehension – in the fields of technology, business, education, art, and more. There’s no doubt in its role as one of the most powerful advancements of our time, or in its controversial applications. Join us for an exciting webinar on AI’s emergence as a double-edged sword in the security industry and its impact on both threat actors and cyber defenders.
In this session, we’ll cover:
What AI is, where it came from, and why it has taken center stage in modern technology and business
How threat actors use AI for nefarious purposes
How cybersecurity solutions leverage AI for defense purposes
The risks of relying on AI
Predictions for the impact of AI on the security industry
Learn more about AI and cybersecurity: https://wgrd.tech/498Lix6
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(20) {
["0OjExUo5J64"]=>
object(stdClass)#6510 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "0OjExUo5J64"
["related_video_title"]=>
string(62) "Webinar: How XDR Can Help MSPs Scale and Grow Their Businesses"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["3pQhpeBviEw"]=>
object(stdClass)#6520 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "3pQhpeBviEw"
["related_video_title"]=>
string(42) "Unveiling the Future of AI & Cybersecurity"
["posted_time"]=>
string(63) "Трансляция закончилась 1 год назад"
["channelName"]=>
NULL
}
["PaBwfJHq0OI"]=>
object(stdClass)#6508 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "PaBwfJHq0OI"
["related_video_title"]=>
string(80) "AI vs. Cyber Threats: How Artificial Intelligence is Transforming Cybersecurity!"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["gflW7WVX3FY"]=>
object(stdClass)#6519 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "gflW7WVX3FY"
["related_video_title"]=>
string(63) "AI and Cybersecurity | The Future of Defense | Powered by Cisco"
["posted_time"]=>
string(71) "Трансляция закончилась 8 месяцев назад"
["channelName"]=>
NULL
}
["5DoDxqQJIQ8"]=>
object(stdClass)#6502 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5DoDxqQJIQ8"
["related_video_title"]=>
string(43) "Compromising LLMs: The Advent of AI Malware"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["utcYsBKL7e8"]=>
object(stdClass)#6513 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "utcYsBKL7e8"
["related_video_title"]=>
string(35) "How AI Can Accelerate Cybersecurity"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["5NgNicANyqM"]=>
object(stdClass)#6506 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5NgNicANyqM"
["related_video_title"]=>
string(79) "Harvard CS50’s Artificial Intelligence with Python – Full University Course"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["rFMmDvwxaEs"]=>
object(stdClass)#6521 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "rFMmDvwxaEs"
["related_video_title"]=>
string(45) "The State of Cybersecurity – Year in Review"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["wjZofJX0v4M"]=>
object(stdClass)#6496 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "wjZofJX0v4M"
["related_video_title"]=>
string(148) "LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["QI7oUwNrQ34"]=>
object(stdClass)#6514 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QI7oUwNrQ34"
["related_video_title"]=>
string(86) "Цепи Маркова — математика предсказаний [Veritasium]"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["kqaMIFEz15s"]=>
object(stdClass)#6509 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "kqaMIFEz15s"
["related_video_title"]=>
string(40) "Cybersecurity Trends for 2025 and Beyond"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
NULL
}
["4cXM7CG2D90"]=>
object(stdClass)#6517 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4cXM7CG2D90"
["related_video_title"]=>
string(40) "Why You Should Learn AI In Cybersecurity"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["JxcBm7CRtI0"]=>
object(stdClass)#6503 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "JxcBm7CRtI0"
["related_video_title"]=>
string(56) "Machine Learning for Cyber Security: Course Introduction"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
NULL
}
["vbUbfFL39ts"]=>
object(stdClass)#6501 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "vbUbfFL39ts"
["related_video_title"]=>
string(57) "Cybersecurity Insights - Cyber Insurance Now Requires MFA"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["KQqEWnxJLQQ"]=>
object(stdClass)#6499 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "KQqEWnxJLQQ"
["related_video_title"]=>
string(38) "Top Security Threats Worldwide Q2 2025"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["s19BxFpoSd0"]=>
object(stdClass)#6500 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "s19BxFpoSd0"
["related_video_title"]=>
string(86) "Cybersecurity Mastery: Complete Course in a Single Video | Cybersecurity For Beginners"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["jq_LZ1RFPfU"]=>
object(stdClass)#6497 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "jq_LZ1RFPfU"
["related_video_title"]=>
string(72) "Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["d31eg547Uuo"]=>
object(stdClass)#6498 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "d31eg547Uuo"
["related_video_title"]=>
string(81) "How AI/ML Is Transforming Cybersecurity | Introduction To Cybersecurity | Edureka"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["Fwx6x9mzzCw"]=>
object(stdClass)#6486 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Fwx6x9mzzCw"
["related_video_title"]=>
string(51) "How to Build and Scale a Security Operations Center"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
["xRjCdTdD5os"]=>
object(stdClass)#6487 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "xRjCdTdD5os"
["related_video_title"]=>
string(51) "AI and Cybersecurity: The Future of Digital Defense"
["posted_time"]=>
string(63) "Трансляция закончилась 1 год назад"
["channelName"]=>
NULL
}
}