Webinar

Industry Leaders

About Our Experts

Dirk Schrader

Global VP of Security Research, Netwrix
Dirk Schrader is a 25-year cybersecurity veteran with CISSP and CISM certifications. He champions cyber resilience through global projects, thought leadership, and published insights on change and vulnerability management—bridging technical, product, and strategic roles across startups and multinational corporations.

Kelley Vick

Webinar Host, Executive IT Forums, Inc
Kelley Vick is the Online Events Chair at IT CPE Academy, where she hosts and produces the IT GRC Forum webinars. With deep expertise in governance, risk, and compliance, Kelley curates high‑value sessions for cybersecurity and risk leaders, driving community engagement and delivering expert insights.

CPE Webinar | Securing Identity and Data as Threat Automation Advances

Feb 5 / IT GRC Forum
AI is transforming cyber risk by scaling the speed and volume of human-led operations rather than replacing them with autonomous systems. Current threats leverage AI to accelerate impersonation and compress the timeline from initial access to impact. While advanced automation is emerging, its scalability depends more on target environments than model capabilities.

This webinar cuts through the hype to examine how automation actually functions today and why fully autonomous attacks remain rare. We shift the focus from speculative "AI vs. AI" defenses toward strengthening the decisive control planes: identity and data pathways. Participants will learn how access discipline, high-fidelity telemetry, and recovery readiness neutralize attacker advantages.

In this webinar, you will learn to distinguish between AI-assisted scaling and fully autonomous attacks, moving past the hype to understand how automation actually functions in current threat landscapes. We will explore how to evaluate the environmental constraints that dictate attacker success and how to audit identity and data pathways as the primary control plane. Finally, the session provides a framework to prioritize "durable" security controls—such as access discipline and high-fidelity telemetry—that remain effective regardless of how AI evolves, ensuring your defense strategy stays grounded in practical resilience rather than speculative technology.