RSAC 2024: How AI Is Changing Extended Detection & Response

Hitesh Sheth, president and CEO of Vectra AI, joins Dark Reading's Terry Sweeney at Dark Reading News Desk during the RSA Conference to discuss how traditional extended detection and response (XDR) has largely failed SOC teams in today’s threat landscape.

10 Min View

Hitesh Sheth, president and CEO of Vectra AI, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss how traditional extended detection and response (XDR) has largely failed SOC teams in today’s threat landscape, and AI is poised to further undercut its effectiveness. He offers advice on how organizations should approach adoption of GenAI, since it’s not all upside. And he talks about how Vectra AI is able to defend against attackers abusing Microsoft Copilot, and why that’s important to customers. Sheth also addresses how customers can use the Vectra AI platform to fight AI with AI.

Hitesh Sheth is the president and CEO of Vectra AI. Previously, he held the position of chief operating officer at Aruba Networks. Hitesh joined Aruba from Juniper Networks, where he was EVP/GM for its switching business and before that, SVP for the Service Layer Technologies group, which included security. Prior to Juniper, he held a number of senior management positions in the switching organization at Cisco, including running its metro Ethernet business. Before Cisco, he held executive and engineering management positions at Liberate Technologies and Oracle Corporation. He started his career as a Unix programmer at the Santa Cruz Operation. Hitesh holds a BA degree in Computer Science from the University of Texas at Austin.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights