Logs are where cybersecurity teams spot how and when the break in occurred. For a new type of attack, logs will be worthless - a condition that will especially challenge digital responders as artificial intelligence systems become more ubiquitous.
Join your peers and expand your network at closed-door sessions as we debate on the most pressing issues facing security professionals today. Meet-ups are scheduled daily and limited to 6-8 participants.