Topic: Digital Espionage 2.0 and the Evolution of AI-Enabled APT Operations
Abstract: Advanced Persistent Threats (APTs) are entering a new era, where artificial intelligence is no longer just a defensive capability, but an operational force multiplier for adversaries. In this session, as part of the series ‘AI vs. Advanced Persistent Threats,’ we explore how AI is transforming the lifecycle of modern cyber espionage, from reconnaissance and weaponization to lateral movement and long-term persistence. Building on lessons from sophisticated threat groups such as Volt Typhoon, APT28 and Lazarus Group, we examine how automation, generative AI, and adaptive malware are accelerating campaign speed, improving evasion techniques, and enabling highly targeted social engineering at scale. The session will also analyze the convergence of AI with traditional tradecraft—leveraging frameworks like MITRE ATT&CK to map the evolution of tactics, techniques, and procedures (TTPs). Join us to gain a strategic and technical perspective on how AI is reshaping the APT landscape and what it means for the future of cyber defense.
Key Takeaways:
- How AI enhances reconnaissance, phishing personalization, and infrastructure agility
- How APTs are influencing the post-AI threats landscape
- The emergence of AI-assisted malware mutation and anti-detection capabilities
- The shift from static IOCs to behavioral and predictive intelligence
- Strategic implications for defenders, intelligence teams, and detection engineers
Speaker:
Don Warden II, Director, Incident Response, Cybolt
Bio: Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.


