Category: Webinars

  • Who Guards the Guardians? Identity for AI

    Who Guards the Guardians? Identity for AI

    ๐—ช๐—ต๐—ผ ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐˜€ ๐˜๐—ต๐—ฒ ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐—ถ๐—ฎ๐—ป๐˜€? ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† ๐—ณ๐—ผ๐—ฟ ๐—”๐—œ

    Who Guards the Guardians? Identify for AI

    Thales, Cybolt and IBMย have come together for the webinar ๐—ช๐—ต๐—ผ ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐˜€ ๐˜๐—ต๐—ฒ ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐—ถ๐—ฎ๐—ป๐˜€? ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† ๐—ณ๐—ผ๐—ฟ ๐—”๐—œ
    ย 
    The security of AI is often overlooked. 86% of organizations experienced an AI-related security incident in the past year, highlighting the urgency of addressing these issues.
    ย 
    ๐™’๐™๐™ž๐™ก๐™š ๐˜ผ๐™„ ๐™š๐™ฃ๐™๐™–๐™ฃ๐™˜๐™š๐™จ ๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ, ๐™ฉ๐™๐™š ๐™ฆ๐™ช๐™š๐™จ๐™ฉ๐™ž๐™ค๐™ฃ ๐™ง๐™š๐™ข๐™–๐™ž๐™ฃ๐™จ: ๐™ฌ๐™๐™ค ๐™ž๐™จ ๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฃ๐™œ ๐˜ผ๐™„? ๐™’๐™๐™ค ๐™ž๐™จ ๐™œ๐™ช๐™–๐™ง๐™™๐™ž๐™ฃ๐™œ ๐™ฉ๐™๐™š ๐™œ๐™ช๐™–๐™ง๐™™๐™ž๐™–๐™ฃ?ย Ensuring AI security is crucial as it integrates into critical systems. This webinar highlights the role of Identity and Access Managementย (IAM) in protecting AI from unauthorized access and threats.
    ย 
    Securing AI involves many steps and layers, making it seem like a daunting task, organizations can begin with the first line of defense: Identity and Access Management (IAM). Implementing IAM helps protect AI systems from unauthorized access and potential threats, laying a strong foundation for comprehensive AI security.
    ย 
    ๐—›๐—ฒ๐—ฎ๐—ฟ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ผ๐˜‚๐—ฟ ๐—ฒ๐˜…๐—ฝ๐—ฒ๐—ฟ๐˜ ๐—ฝ๐—ฎ๐—ป๐—ฒ๐—น๐—ถ๐˜€๐˜๐˜€ย :
    Marco Venuti, IAM Business Acceleration Director at Thales
    Vinita Bhushan, Vice President, IAM at Cybolt
    Sridhar Muppidi, IBM Fellow, VP & CTO IBM Security
    ย 
    ๐—ง๐—ผ๐—ฝ๐—ถ๐—ฐ๐˜€ ๐—–๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑย :
    ย โ€ข Importance of IAM in AI security.
    ย โ€ข Best practices and frameworks for securing AI environments.
    ย โ€ข Real-world case studies of successful strategies.

    • Demystify Machine Identities

      Demystify Machine Identities

      Demystify Machine Identities

      Thales, Pontis Research Inc. (a Cybolt Company) and IBM are hosting a must-attend webinar to Demystify Machine Identities.

      Machine IDs outnumber human identities and have unique requirements. Despite their importance, they often receive less attention, leading to security risks like unauthorized access and data breaches.

      Hear from the Expert Panelists:

      • Marco Venuti, IAM Business Acceleration Director at Thales
      • Vinita Bhushan, President at Pontis Research Inc. (a Cybolt Company)
      • Sridhar Muppidi, IBM Fellow, VP & CTO IBM Security

      Topics Covered:

      • Challenges of managing machine IDs
      • Strategies for machine ID governance
      • Enhancing security by mitigating machine ID risks
      • Real-world use cases