Skip to main content

The RSA Conference has always been the go-to event for anyone looking to get ahead in the cybersecurity world. It’s where the brightest minds gather to share, learn, and connect, diving deep into the latest trends, technologies, and strategies that are shaping the future of our digital lives.

For those who share our enthusiasm for the intersection of AI and cybersecurity, you’re in for a treat. We’ve gone through the agenda with a fine-tooth comb to handpick all the AI-related talks, packing them into this handy guide below. 

See our curated AI-centric talks For Day 3 below.

Day 3 โ€“ May 8th 2024 

9:40 AM – 10:30 AM PT

A Step-by-Step Guide to Securing Large Language Models (LLMs)

Join this session to see how to ensure that LLMs are not trained on sensitive or biased data by implementing on-demand scanning, training automation, and a proxy system to withhold sensitive outputs.

9:40 AM – 10:30 AM PT

โ€˜Nurturingโ€™ AI: The Story of How an AI Copilot Was Built

Join this session as the speakers share their experiences, challenges, and solutions in building AI copilots.

9:40 AM – 10:30 AM PT

AI Safety: Whereโ€™s the Puck Headed?

Experts from Google, Microsoft, NVIDIA, Center for AI Safety, and Harvard come together in this blockbuster panel to dissect what AI Safety means, why it rose to prominence, and what this means for the future of AI and cybersecurity.

9:40 AM – 10:30 AM PT

AI-equipped Threat Actors Versus AI-enhanced Cyber Tools: Who Wins?

Can the good guys win out with AI-enhanced tools? Learn how to minimize poisoning, carefully curate data, and protect AI tools against adversarial attacks designed to fool the models and poison data.

9:40 AM – 10:30 AM PT

Phishing LLMs: Reeling in the Machine

This session will discuss LLM inner workings and then build a threat model illustrating some common attacks. We will wrap up with LLM risk mitigation strategies.

9:40 AM – 10:30 AM PT

Balancing Accessibility, Security and AI: Design Inclusive Security Tools

Cybersecurity often excludes disabled people, but AI can make security more accessible. Join this session to learn how to use AI for inclusive security.

9:40 AM – 10:30 AM PT

Old McDonald Had a Server Farmโ€”A I, A I, Oh!โ€”A Mock Trial

Along with the normal stats, the AI states the fighter is a doll collector. Furious at being outed, the fighter sues all the usual suspects. Is the AI guilty of privacy violations?

10:50 AM – 11:10 AM PT

Next-Gen SIEM: Converging Data, Security, IT, Workflow Automation & AI

The future of security needs a modern foundation that converges data, security and IT with generative AI and workflow automation built natively within. Welcome to the Dawn of Next-Gen SIEM.

11:30 AM – 1:00 PM PT

Executive Womenโ€™s Forum Luncheon: Removing Obstacles: Women Leading the Way in Cyber AI

The panel will feature accomplished female cybersecurity AI professionals discussing the challenges and opportunities experienced by women in this rapidly evolving field.

12:00 PM – 12:20 PM PT

Token: How to Protect Against Phishing and Ransomware Created by Generative AI

See the tools that cybercriminals use to create the most dangerous and destructive attacks, and how to use next-generation MFA to defend against them.

12:30 PM – 12:50 PM PT

Mindgard: Can My Model Be Hacked? Understanding Security Vulnerabilities Within LLMs

This session will discuss security vulnerabilities within LLMs, how they occur, why they are difficult to overcome, and what practical steps businesses can take today to mitigate and manage their AI security risk.

1:15 PM – 2:05 PM PT

AI at the Gates: Combating AI-Driven Assaults on the Customer Experience

This session will dive into the alarming rise of AI-powered attack tools that exploit customer journey touchpoints to dismantle account security, manipulate risk models, and bypass policy enforcement mechanisms.

1:15 PM – 2:05 PM PT

The Next Application Security Frontier: AI-Ready API Defense

Learn how Generative AI will further API complexity and enhance attack sophistication and democratizationโ€”necessitating end-to-end protection from code to runtime and the use of LLM-based security by defenders.

1:15 PM – 2:05 PM PT

Cracking the Code: Unveiling Synergies Between Open Source Security and AI

This session will offer a deeper understanding of the interplay between these domains which will ultimately foster more secure software supply chains and continually gain from community collaboration.

1:15 PM – 2:05 PM PT

Oh, the Possibilities: Balancing Innovation and Risk with Generative AI

In this talk, the speakers will discuss the core components of an AI Corporate Responsibility Framework and critical actions to take when implementing policy around generative AI in your organization.

1:20 PM – 1:50 PM PT

KnowBe4: Machine Minds: Is AI Really Transforming the Landscape of Cyber Threats?

This session will take a serious look at where AI will really be a problem for us and where it’s simply being hyped by organizations trying to sell us products.

2:25 PM – 3:15 PM PT

Lessons Learned from Developing Secure AI Workflows

Through concrete examples, presenters will cover the key threats that must be addressed when deploying AI systems and what mitigations to put in place with a focus on when to extend existing systems versus adding AI specific protections.

2:25 PM – 3:15 PM PT

Beyond the Hype: Research on How Cybercriminals Are Really Using GenAI

This session will delve into discussions in criminal forums, the state of AI malicious services on underground sites, whether deepfakes are a real threat, and how cybercriminals are using ChatGPT.

2:25 PM – 3:15 PM PT

Fight Smarter: Accelerate Your SOC with AI-powered Insights

Live demos and customer use cases will show how AI-powered security analytics help the SOC grasp their most critical events and write curate detections, build bespoke remediation plans, and tackle routine tasks.

3:35 PM – 3:55 PM PT

Reducing AIโ€™s Blast Radius: How to Prevent Your First AI Breach

This session will teach you how to ensure AI tools don’t accidentally expose data. The speaker will show real-world examples of exposures & what to avoid as you adopt AI โ€” so you can reduce AIโ€™s blast radius & keep your crown jewel data safe.

About the author: