3 Keys to Weather the Autonomous Attack Storm

SANS Institute ยท Intermediate ยท๐Ÿ” Cybersecurity ยท10h ago
Skills: AI Security80%
Dancing Between Raindrops: 3 Keys to Weather the Autonomous Attack Storm ๐ŸŽ™๏ธ Chis Cochran, Field CISO and Vice President, SANS Institute ๐Ÿ“ Presented at SANS AI Cybersecurity Summit 2026 As AI-driven threats move from theoretical whitepapers to machine-speed reality, the traditional defensive perimeter is beginning to look like an umbrella in a hurricane. For most organizations, the instinct is to hunker down or build thicker walls, but those who survive the next era of cyber warfare wonโ€™t do it through brute force alone. Drawing on insights from hundreds of candid conversations with global security leaders and deep-dive research into adversarial AI, this lightning talk cuts through the noise. We will move past the "AI vs. AI" buzzwords to explore the psychological and structural shifts required to stay dry when the clouds finally burst. In five minutes, weโ€™ll distill the three essential keys to a resilient defense: 1. Why resisting the inevitable is the fastest way to fail. 2. The "boring" foundational work that becomes a superpower at machine speed. 3. The meta-skill every defender must master to keep pace with a shifting horizon. Leave the bunkers behind. Itโ€™s time to learn how to move between the drops."" Explore upcoming SANS Summits to continue learning from leading voices in cybersecurity: https://go.sans.org/summits
Watch on YouTube โ†— (saves to browser)
Sign in to unlock AI tutor explanation ยท โšก30

Related AI Lessons

โšก
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
Learn about cloud forensics challenges, approaches, and open problems in a meta-study, and understand how to apply this knowledge to improve cloud security and incident response.
Dev.to AI
โšก
From Slack Reaction to Threat Summary: Automated Threat Intel with Slack and Gemini
Automate threat intel with Slack and Gemini to streamline security analysis
Medium ยท Cybersecurity
โšก
Why AI-Powered Phishing Is Becoming the Biggest Cybersecurity Threat in 2026
AI-powered phishing is becoming a major cybersecurity threat, making it harder to distinguish legitimate emails from fake ones, and it's crucial to stay vigilant and adapt security measures
Medium ยท Cybersecurity
โšก
Apple Charged You $1399 for an iPhone That Couldnโ€™t Delete a Notification Properly
Learn how a simple bug in iOS affected iPhone users and why it matters for cybersecurity and software engineering
Medium ยท Cybersecurity
Up next
Learn Ethereum, Smart Contracts & Trading
Coursera
Watch โ†’