Check Out Our June & July Webinars
Black Hat Webinars bring together top speakers, independent researchers and leading experts to discuss relevant topics and give you a chance to ask questions live. Earn 1 CPE credit for each webinar you attend. Check out our upcoming webinars below. |
|
|
|
June 27: Top 5 Steps For Securing LLMs and Critical Data | 11:00 AM - 12:00 PM PST Join our in-depth webinar to explore top 5 AI Security steps recommended to bolster your GenAI defenses. We will cover: Understanding AI Security Challenges: Discuss shadow AI, OWASP Top 10 Threats for LLMs, data mapping, and sensitive data exposure risks Implementing LLM Firewalls: Protect your prompts, data retrieval, and responses from attacks Enforcing Data Entitlements: Prevent unauthorized data access by users of GenAI applications Enforcing Inline Enterprise Controls: Safeguard sensitive data from misuse in model training, tuning, and RAG (Retrieval Augmented Generation) Automating Compliance: Streamline adherence to emerging data and AI regulations |
|
|
|
July 11: EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature Dish | 11:00 AM - 12:00 PM PST In this talk, we will present a vulnerability (CVE-2023-24860) in a brand-new category that provides unauthenticated remote deletion of critical files such as the entire production database and causes a new level of DOS. The vulnerability exists, in default settings, of three well-known endpoint security products we have tested and it's Fully Un-Detectable. It can be exploited both on Linux and Windows using at least ten different attack vectors and without almost any limitation. |
|
|
|
July 18: Building Security from Within: Empowering Software Teams for Cyber Resilience | 11:00 AM - 12:00 PM PST Security teams can’t single-handedly address this dynamic threatscape, so organizations must rethink how to strengthen security resiliency. Software teams are on the front lines in preventing vulnerabilities, but to build resilient applications they need to be equipped with security awareness and intimate knowledge of architecture, integration points, and deployment environments Topics covered include: Root causes of prominent software-borne breaches Taking inventory of teams (and going beyond developers) Building essential awareness - security principles, attack vectors, and threats Being early to the (3rd) party – mitigating API, open-source, and cloud risk |
|
|
|
|