Generative AI is changing the way we develop software. From ChatGPT to Copilot to Bard, GenAI is already a part of every developer's life.
However, there is a dark side to using GenAI when it comes to security. In this webinar, we will review common risks of using GenAI solutions and what you can do about them. Our experts — Ori Bendet, VP of Product Management, Alex Roichman, VP of Research & Innovation, and Lior Kaplan, Open-Source Officer — will discuss:
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.
With more and more software in embedded systems, and growing consumers expectations for software quality, testing has become an important and time-consuming activity.
As much effort as an organization can put in testing, this may still miss problems that would only occur in specific production conditions, or after a specific amount of time, out of reach of testing. Formal methods help overcome these limitations at efforts that are typically less than the equivalent testing.
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.
SBOMs have grown into a standardized way to represent the components found in all kinds of software from firmware to enterprise . In addition, SBOMs can be used to understand the vulnerabilities associated with these components. In this presentation we will explore the need for continuous monitoring of SBOM components for new vulnerabilities and exploits, and how this can reduce the exposure and time to remediation for affected software applications and devices.
Kindly note that we can only accept company emails.
By signing up you agree to receive information on how to join the webinar.
You acknowledge that Infosec-Conferences.com may share your information with this presenter. You may opt out of having your contact information shared with the presenter by completing the unsubscribe option included in any correspondence that we or our partners send.