Event Title: From Visibility to Validation: AI Agents in Modern Exposure Management
Date & Time: Tuesday, April 14, 2026 | 12:00 PM – 1:00 PM MDT
Format: Online Event | Free to Attend | 1 CPE Credit
Speaker: Lalita Dhalia — Solutions Engineer & Customer Success Lead, Strobes Security
About the Event: Join us to explore the evolution of exposure management from simple visibility to active, evidence-based validation. By moving beyond the noise of static alerts and CVEs, this session demonstrates how AI agents can autonomously simulate adversary behavior to prove what is actually exploitable in your environment.
Modern security teams are often data rich but insight poor — overwhelmed by findings that lack context. This presentation shifts the focus from "Are we exposed?" to "Can this actually be exploited?" using AI-driven correlation and the MITRE ATT&CK framework.
What You Will Learn:
Bridge the Risk Gap — why visibility alone is not enough without validating real-world exploitability
AI-Driven Correlation — how AI agents link vulnerabilities to map complex attack paths
False Positive Reduction — filter noise and prioritize by actual business impact
Workflow Integration — embed continuous AI validation into your existing security stack
Strategic Framework — a practical roadmap for adopting AI agents without disrupting current investments
Register: Register Here
Hosted by: ISC2 Denver Chapter
Wednesday, February 18 @ 10 AM - 11 AM MST
Join us online for an exciting deep dive with Joseph Carson, Chief Security Evangelist & Advisory CISO at Segura, into how AI is transforming cybersecurity!
Artificial Intelligence has emerged as both the sharpest weapon and the most effective shield in modern cybersecurity. While defenders deploy cutting-edge AI systems to detect threats and automate responses in real-time, cybercriminals are increasingly using AI to create stealthier malware, craft highly targeted phishing campaigns, and even develop autonomous attack tools. This session explores the evolving AI vs. AI landscape -- a high-speed battle where algorithms combat algorithms, and the lines between attacker and defender blur. We’ll examine how cybercriminals are turning to adversarial machine learning and generative AI to stay ahead, but also how automation is beginning to replace low-level cybercrime roles, leading to unexpected job losses in the underground criminal economies. Through real-world examples and the latest research, we’ll unpack: How generative adversarial networks (GANs) and LLMs are used to evade detection What happens when autonomous AI agents operate without human oversight The double disruption: AI is not only displacing human defenders but also human hackers The next phase of AI-powered cybersecurity tools and how defenders can stay ahead Join us for a deep dive into the future of cybersecurity where automation fights automation, and success means staying one algorithm ahead.
Wednesday, October 8 @ 12 PM - 1 PM MDT
Welcome to our online event where we dive into the world of security in enterprise!
Omar Khawaja, Field CISO at Databricks, will introduce five techniques to help leaders shift from purely technical roles to business-centric security leadership. The session explores leadership archetypes and culminates in a model that ties security directly to measurable business outcomes.
Translate security goals into business language
Align security programs with strategic and budgetary priorities
Empower employees to actively support organizational security
Thursday, July 17 @ 6:30 PM - 7:30 PM MDT
The ISC2 Boulder Chapter is proud to host Roger Grimes from KnowBe4 to present for this month's chapter meeting.
Malicious hackers and their malware creations are rampant on the Internet. Ransomware is taking down companies, hospitals, and even entire cities at will. Hundreds of millions of dollars are stolen, and millions of people's accounts are stolen every day. A large portion of the Internet is just hacker traffic, phishing, and their malware programs. However, most people are unaware that we can significantly reduce Internet crime, making it nearly impossible for hackers and their malware creations to be successful. There is a way to make a far safer Internet for you, your children, your grandchildren, and your grandparents. We have most of the needed technology, we just need to make it more pervasive.
Attend this session to learn about:
The ONE BIG UNDERLYING COMPUTER SECURITY PROBLEM that underlies all other problems
How fixing that one problem will make the Internet a far safer place for the world to compute
Hear about the cool new Internet DNS-like service that will make it far harder for hackers to hide
Come learn what it would take and how you can help to one day make hackers and their malware creations something future generations learn about in history books
If you’re tired of just hearing about the problem, come learn how to SOLVE THE PROBLEM!
***ISC2 Certificate Holders: ***Attendance will earn 1 CPE credit
In order to receive CPE credit, please enter your ISC2 Member ID when registering for the event.
Tuesday, May 27 @ 12 PM - 1 PM MDT
Join us for an online event with Ms. Parul Khanna Director Cybersecurity and a risk management expert, to explore how to safeguard your sensitive data in today's digital landscape. Our expert speaker will share valuable insights and practical tips to help you stay protected. Don't miss this opportunity to enhance your cybersecurity knowledge and defend against potential threats. Register now to secure your spot!Welcome to our online event where we dive deep into the world of **privacy** and **security** in the age of AI-driven social engineering. Join us for insightful discussions, practical tips, and expert advice on safeguarding your personal information online. Don't miss this opportunity to learn how to stay safe in a digital world full of evolving threats. Grab your virtual seat now!
Thursday, March 27 @ 12 PM - 1 PM MDT
Join us for an exciting online gathering where we dive into the world of quantum computing and artificial intelligence. Our speaker will share their insights on the intersection of these cutting-edge technologies and how they are shaping the future. Whether you're a seasoned engineer or just curious about the latest tech trends, this event is perfect for anyone looking to expand their knowledge. Don't miss out on this unique opportunity to learn and connect with like-minded individuals!
Wednesday, December 18 @ 11 AM - 4 PM MDT
11 AM - 12 PM
Lunch and Networking
12 PM - 1 PM
Topic 1: Five Techniques for Elevating Security Professionals to True Leaders
Omar Khawaja - Board Member of FAIR Institute and HITRUST and faculty at Carnegie Mellon University to Databricks
1 PM - 4 PM
Executive Workshop: Bridging the AI Divide: A Framework for Risk-Aware Adoption and Governance
Omar Khawaja - Board Member of FAIR Institute and HITRUST and faculty at Carnegie Mellon University to Databricks
1 PM - 2 PM
Topic 2: Securing the Backbone: Cyber Threats and Trends in Critical Infrastructure Protection
Kindra Brewer - Region 8 Southern Colorado Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency (CISA)
Thursday, September 26 @ 12 PM MDT
Welcome to Navigating the Evolving Privacy Landscape: A Retrospective and Outlook Towards 2025! Join us for an insightful online event where we'll dive deep into the past, present, and future of privacy. Our expert speakers will share their perspectives on how privacy regulations have evolved over the years and what we can expect in the coming years. Don't miss this opportunity to gain valuable knowledge and stay ahead of the curve in the ever-changing privacy landscape. Register now to secure your spot!
The past three years have been saturated with change and upheaval in the privacy legal realm. From state-level battles concerning private rights of action to the adoption of privacy laws across the globe, the data protection and security regulatory arena is running at a fevered pitch. This presentation looks forward to 2025 by chronicling years past. We will discuss current and forthcoming legislation and regulations tackling data protection and respond to pitfalls and triumphs under existing structures.
About the Speaker:
Jake Bernstein, CISSP, CIPP/US , Partner, K&L Gates LLP
Jake Bernstein is a partner at the firm’s Seattle office. He is a member of the Technology Transactions and Sourcing and Data Protection, Privacy, and Security practice groups. Jake is also a Certified Information Systems Security Professional licensed by (ISC)2. He can be heard discussing cybersecurity and privacy issues as the co-host of the popular Cyber Risk Management Podcast.
In addition to his Data Protection, Privacy, and Security work, Jake also leverages his background as an Assistant Attorney General in the Consumer Protection Division of the Washington State Office of the Attorney General to counsel clients on a host of regulatory matters, especially involving technology and the Internet.
Navigating the Cyber Landscape in Operational Technology (OT): Challenges, Threats, and Solutions
Insights from Christopher Sundberg, Product Cybersecurity Engineer at Woodward, INC.
Join Christopher Sundberg, a seasoned cybersecurity specialist with over two decades of experience in industrial control systems, as he delves into the unique challenges and threats faced by the operational technology (OT) space. In this engaging session, Christopher will share his insights on:
Common OT cybersecurity struggles and the differences between IT and OT environments
OT reference models and industry structure
Unique threats targeting critical infrastructure
The potential pitfalls of applying IT-based solutions to OT systems
Regulatory responses and relevant cybersecurity standards
With his extensive background in cyber-physical systems security and his contributions to various industry standards, Christopher will provide valuable perspective on the current state of OT cybersecurity. Whether you're an industry professional, a cybersecurity enthusiast, or simply curious about the challenges faced by critical infrastructure, this session promises to be an enlightening and informative experience.
Don't miss this opportunity to gain a deeper understanding of the OT cybersecurity landscape and learn from one of the field's leading experts!