● LIVE WEBINAR
A practical webinar for CISOs and security teams on AI-driven attack vectors, AI agents, internal AI risk, and discussion around organizational readiness.
Registration closes on June 4, 18:00 CET. Reserve your spot early to secure access to the live session and post-webinar materials.
Participants will receive a post-webinar checklist covering practical considerations around AI security risks and organizational AI readiness.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Dmytro Koziatynskyi
Founder & CEO of RansomLeak, focused on real-world attack scenarios, social engineering, and AI-driven security threats.
Maksym Khamrovskyi
Founder & CMO of RansomLeak, software engineer with years of experience building enterprise products.
Marios Pappas
Cyber Helmets instructor and expert in penetration testing, red teaming, and Active Directory security.
AI-powered tools are rapidly becoming part of everyday workflows but they are also creating a new category of security risks that organizations are often unprepared for.
Cyber Helmets and RansomLeak are collaborating to deliver a practical webinar experience focused on modern AI-driven security threats, combining immersive attack simulations with real-world security insights to explore how AI is changing the threat landscape across modern organizations.
The session explores how deepfakes, unsafe AI usage, AI-enabled phishing, AI agents, and emerging AI attack vectors are affecting organizations today, helping teams improve awareness and operational readiness around these evolving risks through practical scenarios and discussion.
AI adoption is moving faster than most organizations can properly secure. This webinar is designed for CISOs, security teams, and organizational leaders looking to better understand how AI-related threats are evolving in practice, and how awareness, training, and operational readiness can help reduce internal risk.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup