Join our live webinar to learn how to navigate cyber threats in the GenAI Era

July 10, 2024
1 min read

“`html



Summary of Live Webinar | Navigating Cyber Threats in the GenAI Era

TLDR:

  • Webinar on navigating cyber threats in the GenAI era presented by Mandiant and Google Cloud.
  • Focus on safeguarding organizations against advanced AI-powered threats through secure cloud-native architectures and threat intelligence.

Summary:

Live Webinar titled “Navigating Cyber Threats in the GenAI Era” presented by Mandiant and Google Cloud focuses on proven security strategies to combat advanced AI-powered threats. The webinar offers cutting-edge insights on leveraging secure cloud-native architectures and threat intelligence to safeguard organizations in the modern cyber landscape.

The webinar delves into AI-powered threat defenses that block 99.9% of spam, phishing, and malware, as well as the latest AI-powered threats and mitigation strategies. It emphasizes the implementation of zero trust controls and enhancing secure collaboration across teams to strengthen cybersecurity.

The head of Mandiant PMM at Google Cloud, Kerry Matre, brings nearly 20 years of experience in the cybersecurity industry to the webinar. Matre has a background in various security domains, such as software engineering, security intelligence, security services, and SOC strategy, making her a knowledgeable expert in the field of cybersecurity.

The webinar addresses the increasing prevalence of cyber threats in the GenAI era and how organizations can proactively navigate these threats to protect their critical information assets. By exploring advanced security strategies and leveraging AI technologies, organizations can stay ahead of cyber threats and ensure the security of their digital environments.



“`

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and