{"id":20651,"date":"2024-05-04T02:09:54","date_gmt":"2024-05-03T18:09:54","guid":{"rendered":"https:\/\/cybersecthreat.com\/?p=20651"},"modified":"2024-05-06T16:26:06","modified_gmt":"2024-05-06T08:26:06","slug":"ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar","status":"publish","type":"post","link":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/","title":{"rendered":"AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a, .wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a[data-kb-block=\"kb-adv-heading20651_d5bd69-2a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a[data-kb-block=\"kb-adv-heading20651_d5bd69-2a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_d5bd69-2a[data-kb-block=\"kb-adv-heading20651_d5bd69-2a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_d5bd69-2a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_d5bd69-2a\">We are thrilled to invite you to the AKO Labs Master Class Series &#8211; <strong>Cyber Awareness in AI Dangers<\/strong> webinar, scheduled for 14th June at noon GMT+8.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07, .wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07[data-kb-block=\"kb-adv-heading20651_8eb4ce-07\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07[data-kb-block=\"kb-adv-heading20651_8eb4ce-07\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_8eb4ce-07[data-kb-block=\"kb-adv-heading20651_8eb4ce-07\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_8eb4ce-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_8eb4ce-07\"><strong>Overview:<\/strong><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82, .wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82[data-kb-block=\"kb-adv-heading20651_f7da68-82\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82[data-kb-block=\"kb-adv-heading20651_f7da68-82\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_f7da68-82[data-kb-block=\"kb-adv-heading20651_f7da68-82\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_f7da68-82 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_f7da68-82\">In today&#8217;s rapidly evolving digital landscape, the intersection of Cyber Security and Artificial Intelligence presents both unprecedented opportunities and challenges. As AI technologies continue to advance, they introduce new vulnerabilities and threats that can compromise data integrity, privacy, and security on a global scale. This webinar aims to shed light on the intricate relationship between Cyber Security and AI, exploring the potential dangers posed by AI-driven cyber-attacks and strategies to mitigate these risks effectively.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8, .wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8[data-kb-block=\"kb-adv-heading20651_12a5b5-a8\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8[data-kb-block=\"kb-adv-heading20651_12a5b5-a8\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_12a5b5-a8[data-kb-block=\"kb-adv-heading20651_12a5b5-a8\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_12a5b5-a8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_12a5b5-a8\"><strong>Synopsis:<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_e78261-f0:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_e78261-f0 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_e78261-f0 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_e78261-f0 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items20651_e78261-f0 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_e78261-f0 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20651_26ed1e-76 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_26ed1e-76\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Introduction to Cyber Awareness &amp; AI: Understanding the fundamentals and the growing significance of Cyber Awareness in AI.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_12020b-9e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_12020b-9e\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">AI-Driven Cyber Threats: Exploring the latest trends in AI-powered cyber-attacks, including deep fakes, adversarial attacks, and autonomous malware.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_c3a06e-ce .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_c3a06e-ce\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Case Studies: Analysing real-world examples of AI-related security breaches and their implications.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_eb31bc-5c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_eb31bc-5c\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Mitigating AI Risks: Strategies and best practices for safeguarding organisations against AI-driven cyber threats.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_a3ad54-08 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_a3ad54-08\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Future Outlook: Anticipating the future of Cyber Security in the age of AI and the evolving threat landscape.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88, .wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88[data-kb-block=\"kb-adv-heading20651_e6a694-88\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88[data-kb-block=\"kb-adv-heading20651_e6a694-88\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_e6a694-88[data-kb-block=\"kb-adv-heading20651_e6a694-88\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_e6a694-88 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_e6a694-88\"><strong>Guest Speaker:<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_f0dec1-e5:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_f0dec1-e5 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_f0dec1-e5 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_f0dec1-e5 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items20651_f0dec1-e5 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_f0dec1-e5 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20651_2c8a1d-9d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_2c8a1d-9d\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Mr. Tee Soo Kiat is a seasoned Cybersecurity professional with over 25 years of experience in the field. He has held various roles in both public and private sectors, gaining valuable insights into the complexities of cybersecurity challenges and solutions.\u00a0\u00a0<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_94fa16-a1 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_94fa16-a1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Soo Kiat holds a Bachelor of Engineering (Electronics and Communication), University of Birmingham.\u00a0<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b, .wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b[data-kb-block=\"kb-adv-heading20651_ca06f5-0b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b[data-kb-block=\"kb-adv-heading20651_ca06f5-0b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_ca06f5-0b[data-kb-block=\"kb-adv-heading20651_ca06f5-0b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_ca06f5-0b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_ca06f5-0b\"><strong>Why Attend?<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_c0a14b-25:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_c0a14b-25 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_c0a14b-25 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_c0a14b-25 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items20651_c0a14b-25 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_c0a14b-25 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20651_b0b091-2c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_b0b091-2c\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Gain insights into the latest AI-driven cyber threats and their potential impact on organisations.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_08f67a-46 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_08f67a-46\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Learn strategies and best practices to enhance Cyber Security in the era of AI.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_612661-f7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_612661-f7\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Network with industry experts, thought leaders, and peers to exchange ideas and experiences.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_cf5603-c9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_cf5603-c9\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Stay ahead of the curve by understanding the evolving Cyber Security landscape and emerging technologies.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7, .wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7[data-kb-block=\"kb-adv-heading20651_a90efc-f7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7[data-kb-block=\"kb-adv-heading20651_a90efc-f7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_a90efc-f7[data-kb-block=\"kb-adv-heading20651_a90efc-f7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_a90efc-f7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_a90efc-f7\">Don&#8217;t miss this opportunity to expand your knowledge and stay updated on the latest developments in Cyber Security and AI. Secure your spot today and join us for an engaging and insightful session.<\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id20651_bf324b-ad{margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id20651_bf324b-ad > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id20651_bf324b-ad > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id20651_bf324b-ad > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id20651_bf324b-ad{background-color:#2d3748;}.kb-row-layout-id20651_bf324b-ad > .kt-row-layout-overlay{opacity:0.30;}.kb-row-layout-id20651_bf324b-ad ,.kb-row-layout-id20651_bf324b-ad h1,.kb-row-layout-id20651_bf324b-ad h2,.kb-row-layout-id20651_bf324b-ad h3,.kb-row-layout-id20651_bf324b-ad h4,.kb-row-layout-id20651_bf324b-ad h5,.kb-row-layout-id20651_bf324b-ad h6{color:#ffffff;}.kb-row-layout-id20651_bf324b-ad a{color:#c4cfee;}@media all and (max-width: 1024px){.kb-row-layout-id20651_bf324b-ad > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id20651_bf324b-ad > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id20651_bf324b-ad alignnone kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);}.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col,.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col{flex-direction:column;}.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column20651_d2c1d2-37{position:relative;}.kadence-column20651_d2c1d2-37, .kt-inside-inner-col > .kadence-column20651_d2c1d2-37:not(.specificity){margin-right:var(--global-kb-spacing-lg, 3rem);margin-left:var(--global-kb-spacing-lg, 3rem);}@media all and (max-width: 1024px){.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column20651_d2c1d2-37 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column20651_d2c1d2-37, .kt-inside-inner-col > .kadence-column20651_d2c1d2-37:not(.specificity){margin-right:0px;margin-left:0px;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column20651_d2c1d2-37\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95, .wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95[data-kb-block=\"kb-adv-heading20651_9b4595-95\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95[data-kb-block=\"kb-adv-heading20651_9b4595-95\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_9b4595-95[data-kb-block=\"kb-adv-heading20651_9b4595-95\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20651_9b4595-95 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_9b4595-95\">Event Detail<\/h2>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20651_92dec3-57 .kt-block-spacer{height:30px;}.wp-block-kadence-spacer.kt-block-spacer-20651_92dec3-57 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:20%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20651_92dec3-57\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_7c6457-31:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_7c6457-31 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:var(--global-kb-spacing-md, 2rem);margin-bottom:var(--global-kb-spacing-md, 2rem);}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_7c6457-31 ul.kt-svg-icon-list{grid-row-gap:10px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_7c6457-31 .kb-svg-icon-wrap{font-size:20px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20651_7c6457-31 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:15px;}.kt-svg-icon-list-items20651_7c6457-31 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_7c6457-31 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20651_f7d8b7-96 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_f7d8b7-96\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Suitable for<\/strong>: CXO, CISO &amp; Information Security Management and Professional<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_8bbe33-a6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_8bbe33-a6\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Date<\/strong>: Fri, 14 Jun 2024 12:00 Taiwan Time<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20651_c9e845-78 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_c9e845-78\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Registration Link: <a href=\"#RegistrationForm\" target=\"_blank\" rel=\"noreferrer noopener\">Click here to register<\/a><\/span><\/li>\n<\/ul><\/div>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3, .wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3[data-kb-block=\"kb-adv-heading20651_0cc5b3-b3\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3[data-kb-block=\"kb-adv-heading20651_0cc5b3-b3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_0cc5b3-b3[data-kb-block=\"kb-adv-heading20651_0cc5b3-b3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20651_0cc5b3-b3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_0cc5b3-b3\">Please register to ensure your place at this exclusive event. Should you have any questions or require further information, please feel free to contact me at below mentioned contact details. We look forward to welcoming you to the AKO Labs Master Class Series &#8211; \u2018Cyber Awareness &amp; AI Dangers\u2019 webinar.<\/p>\n\n\n<style>.kb-row-layout-id20651_e932a3-ff > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id20651_e932a3-ff > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id20651_e932a3-ff > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:100%;margin-left:auto;margin-right:auto;padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id20651_e932a3-ff > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id20651_e932a3-ff > .kt-row-column-wrap{max-width:90%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id20651_e932a3-ff > .kt-row-column-wrap{max-width:90%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id20651_e932a3-ff alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column20651_6a985f-47 > .kt-inside-inner-col,.kadence-column20651_6a985f-47 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column20651_6a985f-47 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column20651_6a985f-47 > .kt-inside-inner-col{flex-direction:column;}.kadence-column20651_6a985f-47 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column20651_6a985f-47 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column20651_6a985f-47{position:relative;}@media all and (max-width: 1024px){.kadence-column20651_6a985f-47 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column20651_6a985f-47 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column20651_6a985f-47\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0, .wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0[data-kb-block=\"kb-adv-heading20651_5f57cd-a0\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0[data-kb-block=\"kb-adv-heading20651_5f57cd-a0\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20651_5f57cd-a0[data-kb-block=\"kb-adv-heading20651_5f57cd-a0\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 id=\"RegistrationForm\" class=\"kt-adv-heading20651_5f57cd-a0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20651_5f57cd-a0\">Registration Form<\/h2>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20651_39e001-cb .kt-block-spacer{height:30px;}.wp-block-kadence-spacer.kt-block-spacer-20651_39e001-cb .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20651_39e001-cb\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style id=\"wpforms-css-vars-20633-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c\">\n\t\t\t\t#wpforms-20633.wpforms-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c {\n\t\t\t\t--wpforms-field-size-input-height: 50px;\n--wpforms-field-size-input-spacing: 20px;\n--wpforms-field-size-font-size: 18px;\n--wpforms-field-size-line-height: 21px;\n--wpforms-field-size-padding-h: 14px;\n--wpforms-field-size-checkbox-size: 18px;\n--wpforms-field-size-sublabel-spacing: 10px;\n--wpforms-field-size-icon-size: 1.25;\n--wpforms-label-size-font-size: 16px;\n--wpforms-label-size-line-height: 19px;\n--wpforms-label-size-sublabel-font-size: 14px;\n--wpforms-label-size-sublabel-line-height: 17px;\n--wpforms-button-size-font-size: 17px;\n--wpforms-button-size-height: 41px;\n--wpforms-button-size-padding-h: 15px;\n--wpforms-button-size-margin-top: 10px;\n--wpforms-container-shadow-size-box-shadow: none;\n\t\t\t}\n\t\t\t<\/style><div class=\"wpforms-container wpforms-container-full wpforms-block wpforms-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c wpforms-render-modern\" id=\"wpforms-20633\"><form id=\"wpforms-form-20633\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"20633\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/zh\/wp-json\/wp\/v2\/posts\/20651\" data-token=\"aebd96f86cffc22285e4222dcddf1872\" data-token-time=\"1777159353\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div id=\"wpforms-error-noscript\" style=\"display: none;\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-20633-field_0-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"0\"><fieldset><legend class=\"wpforms-field-label\">Name &amp; Surname <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/legend><div class=\"wpforms-field-row wpforms-field-large\"><div class=\"wpforms-field-row-block wpforms-first wpforms-one-half\"><input type=\"text\" id=\"wpforms-20633-field_0\" class=\"wpforms-field-name-first wpforms-field-required\" name=\"wpforms[fields][0][first]\" placeholder=\"First Name\" aria-errormessage=\"wpforms-20633-field_0-error\" required><label for=\"wpforms-20633-field_0\" class=\"wpforms-field-sublabel after\">First<\/label><\/div><div class=\"wpforms-field-row-block wpforms-one-half\"><input type=\"text\" id=\"wpforms-20633-field_0-last\" class=\"wpforms-field-name-last wpforms-field-required\" name=\"wpforms[fields][0][last]\" placeholder=\"Last Name\" aria-errormessage=\"wpforms-20633-field_0-last-error\" required><label for=\"wpforms-20633-field_0-last\" class=\"wpforms-field-sublabel after\">Last<\/label><\/div><\/div><\/fieldset><\/div><div id=\"wpforms-20633-field_14-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"14\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_14\">Name of Organization <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-20633-field_14\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][14]\" aria-errormessage=\"wpforms-20633-field_14-error\" required><\/div><div id=\"wpforms-20633-field_15-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"15\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_15\">Department <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-20633-field_15\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][15]\" aria-errormessage=\"wpforms-20633-field_15-error\" required><\/div><div id=\"wpforms-20633-field_16-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"16\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_16\">Job Position <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-20633-field_16\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][16]\" aria-errormessage=\"wpforms-20633-field_16-error\" required><\/div><div id=\"wpforms-20633-field_20-container\" class=\"wpforms-field wpforms-field-select wpforms-field-select-style-classic\" data-field-id=\"20\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_20\">Does your organization have a SOC \/ SIEM? <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><select id=\"wpforms-20633-field_20\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][20]\" required=\"required\"><option value=\"\" class=\"placeholder\" disabled >Does your organization have a SOC \/ SIEM?<\/option><option value=\"Yes (Internal)\"  class=\"choice-1 depth-1\"  >Yes (Internal)<\/option><option value=\"Yes (Outsourced)\"  class=\"choice-2 depth-1\"  >Yes (Outsourced)<\/option><option value=\"No\"  selected='selected' class=\"choice-3 depth-1\"  >No<\/option><\/select><\/div><div id=\"wpforms-20633-field_1-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"1\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_1\">Business E-mail <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-20633-field_1\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][1]\" placeholder=\"Only accept Business E-mail\" spellcheck=\"false\" aria-errormessage=\"wpforms-20633-field_1-error\" required><\/div><div id=\"wpforms-20633-field_4-container\" class=\"wpforms-field wpforms-field-phone\" data-field-id=\"4\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_4\">Mobile Number <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"tel\" id=\"wpforms-20633-field_4\" class=\"wpforms-field-large wpforms-field-required wpforms-smart-phone-field\" data-rule-smart-phone-field=\"true\" name=\"wpforms[fields][4]\" placeholder=\"0933-1230456\" aria-label=\"Mobile Number\" aria-errormessage=\"wpforms-20633-field_4-error\" required><\/div><div id=\"wpforms-20633-field_27-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"27\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_27\">Phone <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-20633-field_27\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][27]\" placeholder=\"02-22223333#456\" aria-errormessage=\"wpforms-20633-field_27-error\" required><\/div><div id=\"wpforms-20633-field_29-container\" class=\"wpforms-field wpforms-field-select wpforms-field-select-style-classic\" data-field-id=\"29\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_29\">How did you know about this event? <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><select id=\"wpforms-20633-field_29\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][29]\" required=\"required\"><option value=\"\" class=\"placeholder\" disabled  selected='selected'>How did you know about this event?<\/option><option value=\"Facebook\"  class=\"choice-1 depth-1\"  >Facebook<\/option><option value=\"LinkedIn\"  class=\"choice-2 depth-1\"  >LinkedIn<\/option><option value=\"Twitter\"  class=\"choice-3 depth-1\"  >Twitter<\/option><option value=\"Line\"  class=\"choice-4 depth-1\"  >Line<\/option><option value=\"Reseller\"  class=\"choice-5 depth-1\"  >Reseller<\/option><option value=\"E-mail Newsletter\"  class=\"choice-6 depth-1\"  >E-mail Newsletter<\/option><option value=\"Sales Representative of CyberSecThreat\"  class=\"choice-7 depth-1\"  >Sales Representative of CyberSecThreat<\/option><option value=\"Others\"  class=\"choice-8 depth-1\"  >Others<\/option><\/select><\/div><div id=\"wpforms-20633-field_25-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"25\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_25\">Business Contact Person<\/label><input type=\"text\" id=\"wpforms-20633-field_25\" class=\"wpforms-field-large\" name=\"wpforms[fields][25]\" placeholder=\"Name of Business + Name\" aria-errormessage=\"wpforms-20633-field_25-error\" ><\/div><div id=\"wpforms-20633-field_30-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"30\"><label class=\"wpforms-field-label\" for=\"wpforms-20633-field_30\">Country <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-20633-field_30\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][30]\" placeholder=\"Please input your country\" aria-errormessage=\"wpforms-20633-field_30-error\" required><\/div><div id=\"wpforms-20633-field_26-container\" class=\"wpforms-field wpforms-field-gdpr-checkbox\" data-field-id=\"26\"><label class=\"wpforms-field-label\">GDPR Agreement <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><ul id=\"wpforms-20633-field_26\" class=\"wpforms-field-required\"><li class=\"choice-1\"><input type=\"checkbox\" id=\"wpforms-20633-field_26_1\" name=\"wpforms[fields][26][]\" value=\"I consent to having this website store my submitted information so they can respond to my inquiry.\" aria-errormessage=\"wpforms-20633-field_26_1-error\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-20633-field_26_1\">I consent to having this website store my submitted information so they can respond to my inquiry.<\/label><\/li><\/ul><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"20633\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/20651\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-20633\" class=\"wpforms-submit\" data-alt-text=\"Sending registration information...\" data-submit-text=\"Submit registration information\" aria-live=\"assertive\" value=\"wpforms-submit\">Submit registration information<\/button><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybersecthreat.com\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container --><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>We are thrilled to invite you to the AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar, scheduled for 14th June at noon GMT+8. Overview: In today&#8217;s rapidly evolving digital landscape, the intersection of Cyber Security and Artificial Intelligence presents both unprecedented opportunities and challenges. As AI technologies continue to advance, they&#8230;<\/p>","protected":false},"author":14,"featured_media":20658,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":".entry-content-wrap {\r\n    margin-top: 5em;\r\n}","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"behind","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[379,283,236,370],"tags":[380,284,237,373],"class_list":["post-20651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-security","category-events","category-news","category-security-awareness-training","tag-ai-security","tag-events","tag-news","tag-security-awareness-training"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"Jason Steer, Chief Information Security Officer at Recorded Future, will host a discussion on recent significant cyber threat events.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar\" \/>\n<meta property=\"og:description\" content=\"We are thrilled to invite you to the AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar, scheduled for 14th June at noon GMT+8.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T18:09:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-06T08:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1418\" \/>\n\t<meta property=\"og:image:height\" content=\"465\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CyberSecThreat Editor Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyberSecThreat Editor Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/\"},\"author\":{\"name\":\"CyberSecThreat Editor Team\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\"},\"headline\":\"AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar\",\"datePublished\":\"2024-05-03T18:09:54+00:00\",\"dateModified\":\"2024-05-06T08:26:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/\"},\"wordCount\":417,\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg\",\"keywords\":[\"AI Security\",\"Events\",\"news\",\"Security Awareness Training\"],\"articleSection\":[\"AI Security\",\"Events\",\"News\",\"Security Awareness Training\"],\"inLanguage\":\"zh-TW\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/\",\"name\":\"AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg\",\"datePublished\":\"2024-05-03T18:09:54+00:00\",\"dateModified\":\"2024-05-06T08:26:06+00:00\",\"description\":\"Jason Steer, Chief Information Security Officer at Recorded Future, will host a discussion on recent significant cyber threat events.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg\",\"width\":1418,\"height\":465,\"caption\":\"AKO Labs Cyber Awareness in AI Dangers webinar 14 June 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"AI Security\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/category\\\/ai-security\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\",\"name\":\"CyberSecThreat Editor Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"caption\":\"CyberSecThreat Editor Team\"},\"sameAs\":[\"https:\\\/\\\/cybersecthreat.com\"],\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/zh\\\/author\\\/cst-editor\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/04\\\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar - CyberSecThreat","description":"Jason Steer, Chief Information Security Officer at Recorded Future, will host a discussion on recent significant cyber threat events.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/","og_locale":"zh_TW","og_type":"article","og_title":"AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar","og_description":"We are thrilled to invite you to the AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar, scheduled for 14th June at noon GMT+8.","og_url":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_published_time":"2024-05-03T18:09:54+00:00","article_modified_time":"2024-05-06T08:26:06+00:00","og_image":[{"width":1418,"height":465,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg","type":"image\/jpeg"}],"author":"CyberSecThreat Editor Team","twitter_card":"summary_large_image","twitter_creator":"@cybersecthreat","twitter_site":"@cybersecthreat","twitter_misc":{"\u4f5c\u8005:":"CyberSecThreat Editor Team","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"2 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#article","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/"},"author":{"name":"CyberSecThreat Editor Team","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768"},"headline":"AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar","datePublished":"2024-05-03T18:09:54+00:00","dateModified":"2024-05-06T08:26:06+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/"},"wordCount":417,"publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg","keywords":["AI Security","Events","news","Security Awareness Training"],"articleSection":["AI Security","Events","News","Security Awareness Training"],"inLanguage":"zh-TW"},{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/","url":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/","name":"AKO Labs Master Class Series - Cyber Awareness in AI Dangers webinar - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg","datePublished":"2024-05-03T18:09:54+00:00","dateModified":"2024-05-06T08:26:06+00:00","description":"Jason Steer, Chief Information Security Officer at Recorded Future, will host a discussion on recent significant cyber threat events.","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024.jpg","width":1418,"height":465,"caption":"AKO Labs Cyber Awareness in AI Dangers webinar 14 June 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"AI Security","item":"https:\/\/cybersecthreat.com\/category\/ai-security\/"},{"@type":"ListItem","position":2,"name":"AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"Person","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768","name":"\u5947\u8cc7\u5b89\u7de8\u8f2f\u5718\u968a","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","caption":"CyberSecThreat Editor Team"},"sameAs":["https:\/\/cybersecthreat.com"],"url":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2024\/05\/04\/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"category":[{"value":379,"label":"AI Security"},{"value":283,"label":"Events"},{"value":236,"label":"News"},{"value":370,"label":"Security Awareness Training"}],"post_tag":[{"value":380,"label":"AI Security"},{"value":284,"label":"Events"},{"value":237,"label":"news"},{"value":373,"label":"Security Awareness Training"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/AKO-Labs-Cyber-Awareness-in-AI-Dangers-webinar-14-June-2024-1024x336.jpg",1024,336,true],"author_info":{"display_name":"CyberSecThreat Editor Team","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},"comment_info":0,"category_info":[{"term_id":379,"name":"AI Security","slug":"ai-security","term_group":0,"term_taxonomy_id":379,"taxonomy":"category","description":"","parent":0,"count":2,"filter":"raw","cat_ID":379,"category_count":2,"category_description":"","cat_name":"AI Security","category_nicename":"ai-security","category_parent":0},{"term_id":283,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":283,"taxonomy":"category","description":"","parent":0,"count":7,"filter":"raw","cat_ID":283,"category_count":7,"category_description":"","cat_name":"Events","category_nicename":"events","category_parent":0},{"term_id":236,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":236,"taxonomy":"category","description":"Latest news of CyberSecThreat, follow us and stay tuned!","parent":0,"count":12,"filter":"raw","cat_ID":236,"category_count":12,"category_description":"Latest news of CyberSecThreat, follow us and stay tuned!","cat_name":"News","category_nicename":"news","category_parent":0},{"term_id":370,"name":"Security Awareness Training","slug":"security-awareness-training","term_group":0,"term_taxonomy_id":370,"taxonomy":"category","description":"","parent":0,"count":1,"filter":"raw","cat_ID":370,"category_count":1,"category_description":"","cat_name":"Security Awareness Training","category_nicename":"security-awareness-training","category_parent":0}],"tag_info":[{"term_id":380,"name":"AI Security","slug":"ai-security","term_group":0,"term_taxonomy_id":380,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":284,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":284,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":237,"name":"news","slug":"news","term_group":0,"term_taxonomy_id":237,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":373,"name":"Security Awareness Training","slug":"security-awareness-training","term_group":0,"term_taxonomy_id":373,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/20651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=20651"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/20651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/20658"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=20651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/categories?post=20651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/tags?post=20651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}