Austin skyline from Palmer Events Center

Conference Program

The secret's out! Here's the topics you'll be talking about this September. And for those new to Applied Intelligence Live! Austin there's an explainer on each of the stages available.

Get your ticket now to score the advanced rate.

Loading
  • Stream
    • Cybersecurity
10:35
  1. 25 mins
    As surfaced at Black Hat this August, join as we continue to discuss upcoming trends and challenges for the cybersecurity market in 2024:  What does AI Live bring to the discussion for companies using ...
11:00
  1. 25 mins
    •What is machine learning? •Why machine learning is an important tool for SOC analysts •Machine Learning in action in the SOC •Generative AI in the SOC: Use cases
11:25
  1. 25 mins
    With the growth of IoT devices expected to accelerate to 27 billion by 2025, there is a growing concern about the level of security that can be provided on these devices. This session will outline wor ...
11:50
  1. 25 mins

    Great cyber security does not mean you can obtain cyber risk insurance at low premiums. With hardening insurance capacities, cyber insurance is now being doled out only for the ‘highly secure’ & ‘low-risk’ companies. We landed in this situation because there was no reliable product or tool that could have translated an enterprise’s security assessment into an insurability decision in dollar terms. The idea behind my talk is to showcase a way how this can be done using pure mathematics combined with machine learning, thereby providing benefits both to a CISO, as well as to the insurance carriers.

12:15
  1. CYBERSECURITY LUNCH BREAK  
    75 mins
12:20
  1. Booth 316, Hall 1
    15 mins
    The demonstration shows certified products from multiple Wi-SUN Alliance member companies communicating and interoperating on a Wi-SUN FAN™ network. Devices on a Wi-SUN FAN network are continuously ch ...
12:40
  1. Booth 316, Hall 1
    15 mins
    Overview Product description Showcase platform/software (on laptop) Conclusion
13:30
  1. 25 mins
    What are the legal aspects of cyberspace?  Discuss the new aspects of “Digital Law”  Protecting data and other digital information assets from security threats, human error, and insider threats 
13:55
  1. 25 mins
    How can models help quantify the probability that you will suffer a cyber incident? Which cyber security controls and investments are most beneficial? What makes a company a good risk in the eyes of c ...
14:20
  1. 30 mins
    • Generative AI Business Uses
    • Inherent risks of using Generative AI Platforms
    • Demo to show how to minimize risks of exposing sensitive data to GenAI
14:50
  1. CYBERSECURITY NETWORKING BREAK  
    40 mins
  2. Booth 316, Hall 1
    15 mins
    Groq is leading in ultra-low latency with >240 tokens per second per user inference performance for Llama-2 70B The Language Processing Unit™ system provides the fastest AI solution for LLM inference ...
15:10
  1. Booth 316, Hall 1
    15 mins
    Current Linux file system utilities like CoreUtil are based on software that’s been around for over 30 years. While compute, storage and networking technologies have revolutionized over that time, the ...
15:30
  1. 10 mins
    This presentation will cover some methodologies and insight into hacking and modifying IoT devices to extend and attack other internal systems .
15:40
  1. 30 mins
    Artificial intelligence is nothing new and better yet, it has been part of the DNA and genre of cybersecurity for decades.  The various methods of A.I. has now been made sexy because cybersecurity was ...
16:10
  1. 25 mins
    As AI technology continues to advance, it is being increasingly used in social media and entertainment platforms to improve user experience, detect and prevent security threats, and generate engaging content. However, the use of AI in these areas also raises important ethical and security concerns, such as the protection of user data and the potential misuse of AI for malicious purposes. In this keynote, we will explore the latest trends and developments in the intersection of AI and security in social media and entertainment and discuss the potential implications and challenges of these technologies for users, companies, and society.
16:35
  1. Booth 316, Hall 1
    15 mins
    In a rapidly evolving digital landscape, Ambient Authentication emerges as a game-changing innovation. This cutting-edge technology harnesses the power of AI to analyze and understand human behavior l ...

Our Sponsors

Industry Partners

Loading

 

Diamond Sponsors

Loading

 

Gold Sponsors

Loading

Silver Sponsors

Loading

Bronze Sponsors

Associate Sponsors

Loading

Networking & Party Sponsor

Loading

Media & Strategic Partners

Loading