Loading the Elevenlabs Text to Speech AudioNative Player...

Webinar

Event date:

Nov 19, 2024

|

AGO

AGO

AGO

Two Ways to use AI for Tabletop Simulations

Join NCA and ChaosTrack for a special webinar on how to use tabletop simulations to secure your business, and the AI-powered tools available to help you create effective exercises, no matter your budget.

small business webinar
small business webinar
small business webinar

What You'll Learn:

  • What are tabletop exercises and why are they important?

  • Why running tabletop exercises can be challenging for many organizations.

  • Free tools available to create realistic tabletop scenarios, including GenAI platforms.

  • How to run a massively scalable AI-powered simulation.

Who Should Attend:

  • Managed service providers and IT professionals at small to medium sized organizations.

Featured Speaker:
  • Josh Ablett, Co-Founder/CISO, ChaosTrack

Watch the recording:


Featured Articles

Hiring in Cyber: How You Can Launch Your Cybersecurity Career

Cybersecurity remains a critical field today, and these skills are in demand even with the rise of artificial intelligence.

Hiring in Cyber: How You Can Launch Your Cybersecurity Career

Cybersecurity remains a critical field today, and these skills are in demand even with the rise of artificial intelligence.

Hiring in Cyber: How You Can Launch Your Cybersecurity Career

Cybersecurity remains a critical field today, and these skills are in demand even with the rise of artificial intelligence.

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.