Skip to content

Security Office Hours: The Cyber Threats You Can’t Ignore in an AI Driven World.

 

 

Optimize your Company's Security

Secure your organization with confidence, no matter your budget, we’re here to help you optimize your cybersecurity. Fill out the form to take the first step toward stronger protection and peace of mind. Let’s work together to stay ahead of threats!

Resources Mentioned

Overview

Quarterly Office Hours + Q&A

On-Demand Recording | Originally Recorded January 29

Cyber attacks are evolving faster than ever. AI-driven tools, exposed credentials, and publicly available data have made it easier for attackers to move quickly, scale their efforts, and remain undetected. What once required time and expertise can now be automated and refined at speed.

Strong cybersecurity is no longer just a technical function. It is a leadership responsibility that requires awareness, discipline, and ongoing attention to people, process, and technology. This Cybersecurity Office Hours session was a high-level discussion designed to help leaders understand how modern attacks work and what effective cybersecurity looks like in today’s threat landscape.


What You’ll Learn

  • How modern cyber attacks leverage exposed credentials and public data.

  • Where AI is being used offensively to accelerate and scale attacks.

  • Why collaboration tools and AI-enabled apps introduce new risk.

  • How people, process, and technology work together to reduce exposure.


What To Expect

  • Practical answers to common and pressing security questions

  • Strategic insight into common risks and overlooked gaps

  • Clear explanations around compliance, endpoint protection, backups, and more

  • Straightforward guidance in a zero-pressure, educational format


Agenda

  • Overview and Introduction: A brief introduction to Endsight and our approach to supporting secure, high-performing organizations.

  • Exposed Credentials and Real-World Risk: How breached accounts and publicly available data are used in modern cyber attacks.

  • AI as an Attack Accelerator: Where AI is actively changing the speed, scale, and effectiveness of cyber attacks.

  • When Accounts Are Already Compromised: How AI increases the impact of compromised access once attackers are inside.

  • New Risks Inside Everyday Collaboration Tools: Emerging threats tied to apps and AI tools inside platforms like Microsoft Teams.

  • Controlling App and AI Access in Calls: Defining application access policies within Microsoft Teams, from Microsoft-only usage to controlled or restricted third-party applications.

  • Key Takeaways for Leaders: A summary focused on people, process, and why ongoing review is essential.

  • Q&A: A review of attendee-submitted questions and responses shared during the session.

 

 

 

Speaker

thumbnail_StephenHicksHeadShotWDog

Stephen Hicks

Security Practice Manager @ Endsight

Stephen has spent his entire professional career in the technology industry. He holds an MBA from Saint Mary's College and just over a dozen technical certifications including advanced cybersecurity certifications CISSP and CISM. He has a second-degree black belt in Shito Ryu Karate and loves to scuba and ski.