Keynote

Closing Keynote: S.E.ing IRL & with A.I. & Defending Against It With Q.I.

We will look at a real-life successful bank robbery captured on video to see what went right & wrong that led to the bank to be compromised 15 seconds after I walked in and led to the 100% compromise of every computer in the branch including the server room computers! 

We will then dive into how A.I. is being used by criminals to commit crimes in cyberspace. Also A.I. may seem like a cost-effective way to replace workers. We will look closer, however, and discover the uncomfortable truth behind A.I. and what really powers it. We will also discover how to harness the hidden quantum computing power propping up A.I. for ourselves & our company’s security. 

One of the biggest, most advanced, and adaptive Intrusion Detection Systems available has gone underutilized and been hiding in plain sight. Why isn’t it being properly implemented?  Widespread failure on the part of Information Security & Management. We will pinpoint the systemic flaws and learn how to ensure correct and effective implementation and maintenance of our most powerful tool to fight illicit artificial intelligence: Human intelligence. 

" options="'Apple','Google','iCal','Outlook.com','Yahoo'" lightMode="bodyScheme">
April 10, 2024
4:15 pm - 5:00 pm
Capitol Ballroom

We will look at a real-life successful bank robbery captured on video to see what went right & wrong that led to the bank to be compromised 15 seconds after I walked in and led to the 100% compromise of every computer in the branch including the server room computers! 

We will then dive into how A.I. is being used by criminals to commit crimes in cyberspace. Also A.I. may seem like a cost-effective way to replace workers. We will look closer, however, and discover the uncomfortable truth behind A.I. and what really powers it. We will also discover how to harness the hidden quantum computing power propping up A.I. for ourselves & our company’s security. 

One of the biggest, most advanced, and adaptive Intrusion Detection Systems available has gone underutilized and been hiding in plain sight. Why isn’t it being properly implemented?  Widespread failure on the part of Information Security & Management. We will pinpoint the systemic flaws and learn how to ensure correct and effective implementation and maintenance of our most powerful tool to fight illicit artificial intelligence: Human intelligence. 

Speakers

Jayson E. StreetSocial Engineering Expert