Chief Information Security Officer Jamf, United States
As organizations leverage artificial intelligence (AI) to accelerates digital transformation, threats actors are also building and introducing highly sophisticated cyber threats that challenge traditional security models. AI-powered threats, including malware, phishing, deepfakes, and credential attacks, evolve at an unprecedented pace, exploiting gaps in identity and traditional network security. To combat these evolving threats, organizations should adopt a Zero Trust Network (ZTN) approach, which eliminates implicit trust, enforces least privilege access, and continuously verifies every user, device, and transaction. We will discuss AI-driven threats at each stage of the Cyber Attack Lifecycle and discuss how Zero Trust disrupts attacks at every stage—from reconnaissance to exfiltration.
Learning Objectives:
Understand the intersection of AI-driven threats and Zero Trust security.
Learn How Zero Trust mitigates AI-Powered Attacks Across the Cyber Attack Lifecycle
Learn practical and actionable strategies to enhance cybersecurity resilience using Zero Trust principles