International Cloud, AI & Information Security Conference
AI Cyber Security
Information Security
THREAT HUNTING
AI Cyber Security
Information Security
THREAT HUNTING
AI Cyber Security
Information Security
THREAT HUNTING
AI Cyber Security
Information Security
global experts
AI Cyber Security
global experts
AI Cyber Security
Information Security
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Chief Guest Yet To be Decided
Speaker
Speaker
Speaker
How Agentic AI can help Cybersecurity professionals to be more efficient?
Speakers
Speaker
Speakers
Speaker
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Automation in Cybersecurity
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Chief Guest Yet To be Decided
Speaker
Speaker
Speaker
How Agentic AI can help Cybersecurity professionals to be more efficient?
Speakers
Speaker
Speakers
Speaker
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Automation in Cybersecurity
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
He is a senior offensive security leader with over a decade of...
Adhokshaj Mishra works as Staff Detection Engineer specializing in Linux platform. His...
Here’s a brief bio: Dr. Kyle David is the Founder of Dr....
He is a cybersecurity expert and Founder & CEO of Hacker Associate,...
It could relate to a subscription
3 Users Access
It could relate to a subscription
2 Users Access
It could relate to a subscription
3 Users Access