BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260421T025513Z
DESCRIPTION:As AI models become increasingly capable of discovering and weaponizing software vulnerabilities, the window between disclosure and exploitation is rapidly disappearing. Google Cloud’s latest intelligence highlights how general-purpose models are now excelling at vulnerability discovery, creating a critical risk for systems that have not yet been hardened. To counter this, defenders must shift away from manual, human-speed patching protocols and toward a modern, AI-integrated defensive roadmap that emphasizes automation and continuous validation.\nJoin our speakers John Hultquist, Chief Analyst, Google Threat Intelligence Group and Omar ElAhdan, Principal Consultant, Mandiant as they cover Google’s proactive strategy for neutralizing AI-enabled threats by integrating defensive AI directly into the security lifecycle. This briefing will detail how we solve the problem of exponential vulnerability growth through the use of specialized tools like Big Sleep and CodeMender, as well as the deployment of an "Agentic SOC" using Gemini in Google Security Operations. You will learn how to automate alert triage and move toward a zero-trust architecture that limits the blast radius of AI-driven zero-day attacks.\nBy attending this briefing, you will learn:\n- How AI-enabled adversaries are compressing the attack timeline and the economic shift this causes in zero-day exploitation.\n- Strategic priorities for modernizing your defensive roadmap, including the move from manual investigation to automated, agentic security operations.\n- Practical steps for securing your code supply chain and implementing dynamic asset discovery to eliminate "shadow AI" blind spots.\n
DTSTART:20260430T160000
DTEND:20260430T170000
DTSTAMP:20260421T025513Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
TRANSP:OPAQUE
UID:be896c565546e8a735c50070baddc3ea Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
