BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250627T144913Z
UID:F18D40A8-999C-4ABB-B659-0971EEA7E57C
DTSTART;TZID=America/Chicago:20250624T110000
DTEND;TZID=America/Chicago:20250624T120000
DESCRIPTION:Join IEEE Women in Engineering (WIE) Chicago and Region 4 for a
 n inspiring WIE Day 2025 event focused on cybersecurity.\n\nOur featured s
 peaker\, Aparna Achanta\, Principal Security Architect at IBM Consulting\,
  will present:\n\n&quot;Embracing AI to Build Resilience Against AI Attacks&quot;\nA
 parna has extensive experience driving mission-critical cybersecurity init
 iatives\, particularly in federal agencies. She successfully implemented c
 ybersecurity frameworks like Zero Trust and Security by Design for U.S. Fe
 deral Clients thereby strengthening the security posture and enhancing dat
 a protection and security standards across cloud applications. She special
 izes in securing Emerging technologies in federal agencies\, including low
 -code\, No-Code applications\, and Generative AI applications.\nShe is a m
 ember of the Forbes Technology Council and a passionate advocate for women
  in tech. She is a founding member and speaker at the WomenTech Network an
 d also serves as an executive board member at Women in Cybersecurity (WiCy
 S) Austin Chapter.\n\nThe sheer complexity and volume of cyber threats are
  scaling cybersecurity teams to breaking point. The unprecedented pace at 
 which AI is evolving means there is little time for proactive measures\; t
 eams must adopt an immediate crisis management approach. The sophisticatio
 n of such threats is changing the game on how security is done. Traditiona
 l models based on determinism—where something is identified as a threat 
 or not—give way to probabilistic approaches\, which focus on interpretin
 g ambiguous signals and investigating anomalies that may indicate potentia
 l threats.\n\nArpana&#39;s talk focuses on how AI amplifies threat detection t
 hrough automation\, taking responses to the next level. AI can generate hi
 gh-quality probabilistic insights\, allowing teams to decide whether intri
 cate patterns that seem harmful are malicious or benign anomalies- a capab
 ility unique to AI since conventional algorithms within the security frame
 work cannot handle such subtle analysis.\n\nThis event is a great opportun
 ity for anyone interested in cybersecurity\, AI\, and the important role w
 omen play in advancing innovation. Don’t miss the chance to learn from a
 n expert and connect with a community that supports growth and resilience 
 in tech.\n\nSpeaker(s): Aparna\n\nVirtual: https://events.vtools.ieee.org/
 m/482836
LOCATION:Virtual: https://events.vtools.ieee.org/m/482836
ORGANIZER:farnaz.abdollahi@ieee.org
SEQUENCE:215
SUMMARY:Embracing AI to Build Resilience Against AI Attacks
URL;VALUE=URI:https://events.vtools.ieee.org/m/482836
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;&quot; data-start=&quot;269&quot; data-end=&quot;406&quot;&gt;&lt;
 strong data-start=&quot;269&quot; data-end=&quot;406&quot;&gt;Join IEEE Women in Engineering (WIE
 ) Chicago and Region 4 for an inspiring WIE Day 2025 event focused on cybe
 rsecurity.&lt;/strong&gt;&lt;/p&gt;\n&lt;p class=&quot;&quot; data-start=&quot;408&quot; data-end=&quot;511&quot;&gt;Our f
 eatured speaker\, &lt;strong data-start=&quot;430&quot; data-end=&quot;448&quot;&gt;Aparna Achanta&lt;/
 strong&gt;\, Principal Security Architect at IBM Consulting\, will present:&lt;/
 p&gt;\n&lt;p class=&quot;&quot; data-start=&quot;513&quot; data-end=&quot;570&quot;&gt;&lt;strong data-start=&quot;513&quot; d
 ata-end=&quot;570&quot;&gt;&quot;Embracing AI to Build Resilience Against AI Attacks&quot;&lt;/stron
 g&gt;&lt;/p&gt;\n&lt;div&gt;Aparna has extensive experience driving mission-critical cybe
 rsecurity initiatives\, particularly in federal agencies. She successfully
  implemented cybersecurity frameworks like Zero Trust and Security by Desi
 gn for U.S. Federal Clients thereby strengthening the security posture and
  enhancing data protection and security standards across cloud application
 s.&amp;nbsp\; She specializes in securing Emerging technologies in federal age
 ncies\, including low-code\, No-Code applications\, and Generative AI appl
 ications.&amp;nbsp\;&lt;/div&gt;\n&lt;div&gt;She is a member of&amp;nbsp\;the&amp;nbsp\;&lt;em&gt;Forbes
  Technology Council and a&lt;/em&gt; passionate advocate for women in tech. She 
 is a founding member and speaker at the WomenTech Network and also serves 
 as an executive board member at Women in Cybersecurity (WiCyS) Austin Chap
 ter.&lt;/div&gt;\n&lt;p class=&quot;&quot; data-start=&quot;943&quot; data-end=&quot;1155&quot;&gt;The sheer complex
 ity and volume of cyber threats are scaling cybersecurity teams to breakin
 g point. The unprecedented pace at which AI is evolving means there is lit
 tle time for proactive measures\; teams must adopt an immediate crisis man
 agement approach. The sophistication of such threats is changing the game 
 on how security is done. Traditional models based on determinism&amp;mdash\;wh
 ere something is identified as a threat or not&amp;mdash\;give way to probabil
 istic approaches\, which focus on interpreting ambiguous signals and inves
 tigating anomalies that may indicate potential threats.&lt;/p&gt;\n&lt;p&gt;Arpana&#39;s t
 alk focuses on how AI amplifies threat detection through automation\, taki
 ng responses to the next level. AI can generate high-quality probabilistic
  insights\, allowing teams to decide whether intricate patterns that seem 
 harmful are malicious or benign anomalies- a capability unique to AI since
  conventional algorithms within the security framework cannot handle such 
 subtle analysis.&lt;/p&gt;\n&lt;p class=&quot;&quot; data-start=&quot;1157&quot; data-end=&quot;1421&quot;&gt;This e
 vent is a great opportunity for anyone interested in cybersecurity\, AI\, 
 and the important role women play in advancing innovation. Don&amp;rsquo\;t mi
 ss the chance to learn from an expert and connect with a community that su
 pports growth and resilience in tech.&lt;/p&gt;\n&lt;p class=&quot;&quot; data-start=&quot;1315&quot; d
 ata-end=&quot;1466&quot;&gt;&amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

