{"id":793,"date":"2024-11-04T21:55:49","date_gmt":"2024-11-04T21:55:49","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=793"},"modified":"2024-11-04T21:55:49","modified_gmt":"2024-11-04T21:55:49","slug":"eweek-tweetchat-november-19-cybersecurity-and-ai-challenges-and-solutions","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=793","title":{"rendered":"eWeek TweetChat, November 19, Cybersecurity and AI: Challenges and Solutions"},"content":{"rendered":"<p>Join eWeek at 2 PM Eastern\/11 AM Pacific on Tuesday, November 19, for a lively, in-depth discussion of the evolving relationship between AI and cybersecurity as eWeek Senior Editor <a href=\"https:\/\/twitter.com\/JamesMaguire?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">James Maguire<\/a> moderates our next monthly TweetChat on the X platform (formerly Twitter).<\/p>\n<p>A panel of industry experts will discuss the complex factors involved with incorporating AI with cybersecurity, including challenges and practical solutions, staffing issues, and the future of AI and security. Our aim is to offer thought leadership that enables companies to build a more secure infrastructure using artificial intelligence.<\/p>\n<p><strong><em>See below for the resources you need to participate in the eWeek TweetChat.<\/em><\/strong><\/p>\n<h2><strong>Expert Panelists<\/strong><\/h2>\n<p>The list of experts for this month\u2019s TweetChat currently includes the following:<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/evankirstel\/\">Evan Kirstel<\/a>, Chief Digital Evangelist, <strong>eVIRa Health<\/strong><br \/>\n<a href=\"https:\/\/www.linkedin.com\/in\/bernardgolden\/\">Bernard Golden<\/a>, Executive Technical Advisor, <strong>VMware<\/strong><br \/>\n<a href=\"https:\/\/twitter.com\/AndiMann\">Andi Mann<\/a>, Global CTO and Founder, <strong>Sageable<\/strong><br \/>\n<a href=\"https:\/\/twitter.com\/JamesMaguire?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">James Maguire<\/a>, Senior Editor, <strong>eWeek<\/strong> [moderator]<\/p>\n<p>Please check back for additional expert guests.<\/p>\n<h2><strong>TweetChat Questions: AI and Cybersecurity<\/strong><\/h2>\n<p>The questions we\u2019ll tweet about will include the following:<\/p>\n<p>Here in late 2024, what\u2019s the current level of <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/what-is-artificial-intelligence\/\">artificial intelligence<\/a> adoption in enterprise cybersecurity? Nascent, fully mainstream?<br \/>\nWhat key trends are driving the adoption of AI in cybersecurity?<br \/>\nWhat are the biggest challenges facing security and AI? Cost, staff training?<br \/>\nHow do you recommend addressing these AI-related cybersecurity challenges?<br \/>\nWhat Best Practices advice would you give companies to more effectively deploy AI in their security infrastructure?<br \/>\nWhat about artificial intelligence and security staff? Will companies require less security staff due to AI\u2019s support?<br \/>\nHow do you sense that is AI changing the hacker community? That is, will AI ever enable companies to be fully safe from hacking?<br \/>\nLet\u2019s look ahead: what enduring challenges will AI-based cybersecurity deployments continue to face in the future?<br \/>\nAlso about the future: Your best advice to help companies prepare for the future of AI and cybersecurity?<\/p>\n<div>A last Big Thought about AI and cybersecurity<span>\u2014<\/span>what else should managers\/buyers\/providers know about this emerging sector?<\/div>\n<h2><strong>How to Participate in the TweetChat<\/strong><\/h2>\n<p>The chat begins promptly at 2 PM Eastern\/11 AM Pacific on November 19. To participate:<\/p>\n<p>Open X in your browser. You\u2019ll use this browser to post your replies to the moderator\u2019s questions.<\/p>\n<p>Open X in a second browser. On the menu to the left, click on <strong>Explore<\/strong>. In the search box at the top, type in <strong>#eweekchat<\/strong>. This will open a column that displays all the questions and all the panelists\u2019 replies.<\/p>\n<p><strong>Remember:<\/strong> You must <em>manually include<\/em> the hashtag <strong>#eweekchat <\/strong>for your replies to be seen by the TweetChat panel of experts.<\/p>\n<p>That\u2019s it<span>\u2014<\/span>you\u2019re ready to go. Be ready at 2 PM Eastern\/11 AM Pacific to take part. Note that there is sometimes a few seconds of delay between when you tweet and when your tweet shows up in the #eweekchat column.<\/p>\n<h2><strong>TweetChat Schedule for 2024*<\/strong><\/h2>\n<p>September 17: The Future of Cloud Computing<br \/>\nOctober 22: How to Get the Most from Your Data<br \/>\n<strong>November 19: Cybersecurity and AI: Challenges and Solutions<\/strong><br \/>\nDecember 10: Tech Predictions for 2025<\/p>\n<p><em>*All topics subject to change<\/em><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/security\/eweek-tweetchat-cybersecurity-and-ai-challenges-and-solutions\/\">eWeek TweetChat, November 19, Cybersecurity and AI: Challenges and Solutions<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Join eWeek at 2 PM Eastern\/11 AM Pacific on Tuesday, November 19, for a lively, in-depth discussion of the evolving relationship between AI and cybersecurity as eWeek Senior Editor James Maguire moderates our next monthly TweetChat on the X platform (formerly Twitter). A panel of industry experts will discuss the complex factors involved with incorporating [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-793","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/793"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=793"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/793\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}