Cybersecurity

Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics

Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics

Jeff Crume and Patrick Fussell from IBM's X-Force team share a real-world ethical hacking war story, demonstrating an attack from an 'assume breach' perspective. They break down how vulnerabilities in Identity and Access Management (IAM) and legacy systems can lead to a full compromise, starting from an insider threat and escalating to domain administrator privileges through advanced C2 attacks and lateral movement.

Structured Dissent Patterns for Agentic Production Reliability

Structured Dissent Patterns for Agentic Production Reliability

This talk introduces 'structured dissent,' a multi-agent orchestration pattern where believer, skeptic, and neutral agents debate decisions to overcome the 'confidently wrong' failure mode of single-agent LLM systems, improving reliability for high-stakes tasks like cybersecurity analysis.

MCP Security: What Happens When Your Agents Talk to Everything?

MCP Security: What Happens When Your Agents Talk to Everything?

A deep dive into the security vulnerabilities of Multi-Context Protocol (MCP) for AI agents. The talk explores how identity loss, "all-or-nothing" permissions, and disappearing audit trails create significant attack surfaces, and presents solutions like identity chain tracking, context-aware permissions, and intelligent auditing to secure agent-to-tool communication.

Palo Alto Networks CEO Nikesh Arora on the Virtues of Being an Outsider

Palo Alto Networks CEO Nikesh Arora on the Virtues of Being an Outsider

Nikesh Arora, CEO of Palo Alto Networks, shares his unconventional journey and leadership philosophy. He provides a masterclass in building a multi-platform company through strategic M&A, explains why founders should sometimes ignore customers, and reveals how to lead with conviction while managing imposter syndrome.

A new take on bug bounties, AI red teams and our New Year’s resolutions

A new take on bug bounties, AI red teams and our New Year’s resolutions

IBM's Security Intelligence podcast discusses key cybersecurity trends for 2026, including the shift to operational resilience, Microsoft's expanded bug bounty for third-party code, the long-tail impact of the LastPass breach, OpenAI's use of AI for automated red teaming against prompt injections, and the commercialization of ClickFix attacks.

Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware

Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware

Experts discuss a report from Anthropic on a nearly autonomous AI-driven espionage campaign, debating its significance. The conversation explores the rise of agentic AI in attacks, the new 2025 OWASP Top 10, the fragmentation of the ransomware landscape, and the role of cyber insurance as a de facto regulator.