Close

Cyber Security in the age of AI

(K4)

Stream: Keynote
Time: 17:30 - 18:15


Keynote

Cyber security has changed a lot in the 50 years or so that the mainframes have been around. But in the last 2 years, there has been a seismic shift with the advent of Ransomware-as-a-service aided and abetted by artificial intelligence. The 2025 IBM Cost of Data Breach Report states that 1 in 6 attacks are AI-driven, and on-premise systems are targeted 28% of the time.

AI can be used defensively in tools such as Splunk or IBM TDz. However, the AI is only as good as the data it operates on. Often data generated by mainframe tools such as SMF is too late or key events are missing altogether.

This keynote focusses on techniques that can help to provide the complete data for immediate analysis while providing immediate damage control. Combined with advanced AI this allows human reaction at machine speed preventing hyper-costly data exfiltration and system attacks.

Attachments

There is currently no attachment for Cyber Security in the age of AI

Speakers


  • Allen Saurette at MainTegrity Inc
  • Al Saurette has been delivering innovation to IT problem areas for over 40 years.  Al is a thought leader in the area of security and compliance for major banks, insurance and government clients throughout North America and Europe. Al is now focused on combating ransom attacks - Ransomware, malicious encryption, data exfiltration and real-time response to internal threats of all types. Al@MainTegrity.com                                                www.maintegrity.com


    Email: Al@MainTegrity.com

  • Mark Wilson at Vertali Limited
  • Over 40+ years of Technical IT experience, with a broad range of skills, the majority of which was gained in hands-on technical roles, performing a variety of duties in diverse and complex environments. The majority of Mark’s experience is focused on IBM mainframe systems, where he performs as an Architect, Technician and Project Manager. Mark’s specialist subject is IT Security, in particular, z/OS and associated subsystem (CICS, DB2, MQ, etc) security with RACF, ACF2 or Top Secret installed.


    Email: markwilson@vertali.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!