BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Optimistik Infosystems - ECPv6.15.17//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Optimistik Infosystems
X-ORIGINAL-URL:https://www.optimistikinfo.com
X-WR-CALDESC:Events for Optimistik Infosystems
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
TZOFFSETFROM:+0530
TZOFFSETTO:+0530
TZNAME:IST
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Asia/Kolkata:20251217T110000
DTEND;TZID=Asia/Kolkata:20251217T123000
DTSTAMP:20260501T004619
CREATED:20251127T051155Z
LAST-MODIFIED:20251127T051159Z
UID:5363-1765969200-1765974600@www.optimistikinfo.com
SUMMARY:Cybersecurity in the Age of GenAI
DESCRIPTION:Cybersecurity in the Age of GenAI \n\n\n\n\n\nIntroduction: \n\n\n\nA high-value session exploring how GenAI is transforming cyber threats AND cyber defense. Participants learn how attackers use AI to craft phishing\, deepfakes\, and malware — and how defenders can use AI-powered tools to strengthen detection and response. Covers risks\, compliance gaps\, real-world examples\, and immediate actions security teams must take. \n\n\n\nWelcome & Context (0–5 mins) \n\n\n\n\nHost intro\n\n\n\nHook: “What if the next cyberattack wasn’t human-led?”\n\n\n\nQuick poll\n\n\n\n\nThe New Threat Landscape (5–15 mins) \n\n\n\n\nAI-generated phishing\n\n\n\nDeepfake fraud examples\n\n\n\nLLM jailbreaks\n\n\n\nAI-generated malware\n\n\n\nDemo: Crafting a phishing email with GenAI\n\n\n\n\nGenAI-Driven Defense (15–25 mins) \n\n\n\n\nAI-based SIEM & XDR\n\n\n\nAutomated threat intelligence\n\n\n\nUsing LLMs to analyze logs\n\n\n\nCase examples: Microsoft\, Google\, AWS\n\n\n\n\nBig Risks We’re Overlooking (25–35 mins) \n\n\n\n\nShadow AI\n\n\n\nData leakage\n\n\n\nPrompt injection\n\n\n\nHallucinations\n\n\n\nCompliance blind spots\n\n\n\n\nWhat You Should Be Doing Now (35–45 mins) \n\n\n\n\n5 immediate actions for cybersecurity teams\n\n\n\nGenAI usage policy\n\n\n\nRed-teaming with AI\n\n\n\nBoard-level preparedness\n\n\n\n\nLive Demo / Spotlight (45–50 mins) \n\n\n\n\nUsing an LLM to detect risky code/phishing\n\n\n\n\nQ&A + Reflection (50–60 mins) \n\n\n\n\nOpen questions\n\n\n\n“One thing you’ll do differently tomorrow?”
URL:https://www.optimistikinfo.com/event/cybersecurity-in-the-age-of-genai/
CATEGORIES:Learning December 2025
END:VEVENT
END:VCALENDAR