Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now
Secureworks:
Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.
Watch Now
ExtraHop
For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now
ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.
Watch Now