VIDEO
Webinar – Top Threat of 2026: The AI Visibility and Control Gap
Video Summary:
The webinar discusses the top cybersecurity threats for 2026, focusing on the integration of AI in various attack vectors, including visibility and control issues, identity exploitation, supply chain vulnerabilities, and the evolution of ransomware. Experts Sherri Davidoff and Matt Durrin emphasize the need for organizations to centralize their AI usage, monitor identity access, and implement robust security measures to mitigate these emerging threats. Takeaways 1. AI visibility and control are critical for security teams. 2. Identity exploitation is a growing concern in cybersecurity. 3. Supply chain risks are increasing due to interconnected systems. 4. Ransomware is evolving with AI capabilities. 5. Organizations must centralize AI usage for better governance. 6. Monitoring and inventorying AI tools is essential. 7. Data classification policies are crucial for security. 8. Training users on AI risks is necessary. 9. AI can be leveraged for defense against cyber threats. 10. Understanding the integration of AI in workflows is vital. Chapters 00:00 Introduction to Top Threats of 2026 02:26 AI Visibility and Control 22:09 Identity and Trust Exploitation 34:30 Incident Response Essentials 39:10 The CoFish Attack and Identity Abuse 46:05 Browser Extensions and Security Risks 52:38 Supply Chain Vulnerabilities 56:18 AI in Ransomware and Cybercrime
The webinar discusses the top cybersecurity threats for 2026, focusing on the integration of AI in various attack vectors, including visibility and control issues, identity exploitation, supply chain vulnerabilities, and the evolution of ransomware. Experts Sherri Davidoff and Matt Durrin emphasize the need for organizations to centralize their AI usage, monitor identity access, and implement robust security measures to mitigate these emerging threats. Takeaways 1. AI visibility and control are critical for security teams. 2. Identity exploitation is a growing concern in cybersecurity. 3. Supply chain risks are increasing due to interconnected systems. 4. Ransomware is evolving with AI capabilities. 5. Organizations must centralize AI usage for better governance. 6. Monitoring and inventorying AI tools is essential. 7. Data classification policies are crucial for security. 8. Training users on AI risks is necessary. 9. AI can be leveraged for defense against cyber threats. 10. Understanding the integration of AI in workflows is vital. Chapters 00:00 Introduction to Top Threats of 2026 02:26 AI Visibility and Control 22:09 Identity and Trust Exploitation 34:30 Incident Response Essentials 39:10 The CoFish Attack and Identity Abuse 46:05 Browser Extensions and Security Risks 52:38 Supply Chain Vulnerabilities 56:18 AI in Ransomware and Cybercrime