SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Combating
Cybersecurity
Threats with AI and Machine Learning
Col Inderjeet Singh
CIO , Vara United Ltd
"The development of full artificial intelligence could
spell the end of the human race.” - Stephen Hawking,
theoretical physicist, cosmologist, author
“I don’t understand why some people are not
concerned” – Bill Gates, co-founder of Microsoft
Kalashnikovs of tomorrow
Man or Machine? Advanced Behavioral Attacks
Imagine a business email
compromise attack
you get an email to wire payment for an
invoice from the CFO
The email is written from your CFO
natural language processing from emails
You’re suspicious and call the CFO
But your phone is compromised
You’re connected to adversary who has
a speechbot with your CFO’s Voice
Science fiction or possible today?
https://www.youtube.com/watch?v=Nu-nlQqFCKg
Microsoft Real-Time Translation (2012)
1950s – 2000s
AI & ML
core developments
multi-industry
before
Is AI/ML New? No*
2006
deep learning
Netflix Prize
2014 2016 2018
ensembling
decision trees
CAML
deep learning
(mobile)
AI services
ImageNet
after
2008 2009 2012
Fourth Industrial Revolution
AI is contributing to a the transformation of society at a rate
that is 10 times faster and at 300 times the scale, with an
estimated impact that is 3000 times of the 1st Industrial
Revolution.
- McKinsey Global Institute
Robotic Process Automation Machine Learning Algorithms
Artificial Intelligence
Applications of Artificial Intelligence
Healthcare
Military
Cyber Security
Finance
Accounting & Law
Surgical System Prosthetic Limbs
Space Program All-in-one Floor Cleaner
Your Digital Secretary
Walk Like a Man
Self-driving cars
The AI and ML Revolution is Here
AI and ML Demystified / @carologic / MWUX2017
Decision Making: Self Driving (autonomous) vehicles
Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University
24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands-
free_Driving.jpg
DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
The AI and ML Revolution is Here
AI-generated art
L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style
https://arxiv.org/pdf/1508.06576v1.pdf
The AI and ML Revolution is Here
Computational perception – face recognition (and speech, text, social, video, etc.)
https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face-
verification.pdf
The AI and ML Revolution is Here
#RSAC
The Current Cyber Landscape Favors
Malicious Actors
SEC reveals it was hacked, information may have
been used for illegal stock trades
in October or November 2016, but wasn’t discovered
by the firm until March 2017
The Cost of Cyber Security Operations
Continues to Increase without Mitigating Risk
Anthem: Hacked Database Included 78.8 Million People
”Big Four” accounting firm Deloitte was likely breached
Global information solutions company, Equifax, has reported a major
cybersecurity incident affecting 143 million consumers in the US.
Most cybersecurity Attacks today are automated, from
AI-powered Distributed Denial of Service (DDOS)
attacks to phishing scams and ransomware.
You Can’t Afford To Stay Stagnant:
• In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to
be worth more than $150 billion.
• Global cybersecurity spending will exceed $1 trillion from 2017 to 2021
• The cybersecurity market grew by roughly 35 X over 13 years.
• We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the
8-10 % projected over the next five years.
The Increased Threat Landscape
• $1 billion: Cost of ransomware attacks alone last year
• $158: Average global cost of data breach per lost or stolen record
• 25% of large organizations experience recurring incidents
• 229 days: the average time to identify a malicious attack
Cylance,Inc.Confidential
The Future of Security
Past Present Future
AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE
SPOND
Pre-Execution
Humans Needed
Post-Execution
Pre-Execution
No Humans
Threat actors could also employ AI tools to discover new vulnerabilities and design
exploits and other attacks, in a fraction of the time it's taking them now.
AI could be used as an effective tool to help them decide what, who and when to
attack.
Looking into the heart of AI’s Dark Secret
What’s inside the box?
Algorithmic regulation –
where and how?
Are we willing to let
machines make decisions
we don’t understand?
Self modifying algorithms
– who to interrogate?
#RSAC
AI fighting
Cybercrime
Applications of AI in Cyber Security
• Intrusion detection
• Examples
– Malicious JavaScript and other scripts
– Malicious Non-Executable Files
– Malicious Executable Files
• Inappropriate Web and Email Content
• Phishing
– Derive probabilistic models of phishing attacks
– Derive probabilistic reputation models for URLs
• Make Security Simple
• AI not only improves efficacy, it also changes the deployment
model and makes cybersecurity implementation and operation
a seamless, smooth process.
• Because of the advanced features of ML, you no longer employ
traditional AV technology and tactics, including:
• Incremental storage
• Scanning machines
• Re-imaging machines
• You can remove large endpoint agents that create performance
friction for enterprise users.
AI Changes the Deployment Game
• Use minimal system resources (1-2% CPU usage and 40-
50 MB of memory)
• Prevent attacks with superior speed (in milliseconds)
• Replace ineffective traditional AV tools (or augment
existing security)
• Achieve efficacy rates of greater than 99% (compared to
50-60% with antiquated signature-based AV)
AI and Machine Learning Helps You:
AI / ML Adoption
Benefits
Automated protection
Faster response and protection
Personalization
Learn to adapt to me, unobtrusively
Usability
Drivers
Scaling and velocity
Humans are slow
Humans are
expensive Data
growth
Automation
Threats evolve. Do you?
Sophistication
Complex threats
360-degree protection
Firewalls talking to email servers
and endpoints
Doing AI & ML (Correctly) is Hard!
FEATURES / DIMENSIONS
• Static attributes
• Dynamic behaviors
• Reputation
• Relations
• Sequential state
ADVANCED TECHNIQUES
• Ensembling
• Boosting
• Sequential Learning
• Deep Learning
• Automation at Scale
BOUNTIFUL DATA
• 9 Trillion rows of security data
• 4.5B queries processed daily from 175M
endpoint devices
• 2B emails scanned daily
• 1B previously unseen web requests
scanned daily
• Outputs from other systems & products
LEADING EXPERTS
• Dedicated org of recognized
machine learning experts
• Experts-attack
investigation team
• Centuries of combined ML
experience
The Future of AI & ML in Cybersecurity
now
Superpowers for analysts
hunting for targeted spearphishing attacks 100x
faster
Threat detection systems that learn to
learn Real-time conversation monitoring
for
social engineering, cyberbullying, fake news,
help,
etc.
future
Predictive Protection
AI / ML that anticipates attacks and automatically reconfigures for
protection.
The Future of AI & ML in Cybersecurity
Fighting an existential threat?
Reach me on Social Media:
Facebook: Technology Evangeist Twitter Handle: @InderBarara
LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/
Email me at: inderjit.barara@gmail.com
Thanx

Weitere ähnliche Inhalte

Was ist angesagt?

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 

Was ist angesagt? (20)

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
AI in security
AI in securityAI in security
AI in security
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Ähnlich wie Combating Cyber Security Using Artificial Intelligence

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxyugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxyugandharadahiphale2
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud versionEoin Keary
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Stefan Streichsbier
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Sciencetlcj97
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 

Ähnlich wie Combating Cyber Security Using Artificial Intelligence (20)

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
#AI: In Whose Image?
#AI: In Whose Image?#AI: In Whose Image?
#AI: In Whose Image?
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 

Mehr von Inderjeet Singh

Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisInderjeet Singh
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singhInderjeet Singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile ConvergenceInderjeet Singh
 

Mehr von Inderjeet Singh (7)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
 

Kürzlich hochgeladen

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Combating Cyber Security Using Artificial Intelligence

  • 1. Combating Cybersecurity Threats with AI and Machine Learning Col Inderjeet Singh CIO , Vara United Ltd
  • 2. "The development of full artificial intelligence could spell the end of the human race.” - Stephen Hawking, theoretical physicist, cosmologist, author “I don’t understand why some people are not concerned” – Bill Gates, co-founder of Microsoft
  • 4. Man or Machine? Advanced Behavioral Attacks Imagine a business email compromise attack you get an email to wire payment for an invoice from the CFO The email is written from your CFO natural language processing from emails You’re suspicious and call the CFO But your phone is compromised You’re connected to adversary who has a speechbot with your CFO’s Voice Science fiction or possible today? https://www.youtube.com/watch?v=Nu-nlQqFCKg Microsoft Real-Time Translation (2012)
  • 5. 1950s – 2000s AI & ML core developments multi-industry before Is AI/ML New? No* 2006 deep learning Netflix Prize 2014 2016 2018 ensembling decision trees CAML deep learning (mobile) AI services ImageNet after 2008 2009 2012
  • 6. Fourth Industrial Revolution AI is contributing to a the transformation of society at a rate that is 10 times faster and at 300 times the scale, with an estimated impact that is 3000 times of the 1st Industrial Revolution. - McKinsey Global Institute
  • 7. Robotic Process Automation Machine Learning Algorithms Artificial Intelligence
  • 8. Applications of Artificial Intelligence Healthcare Military Cyber Security Finance Accounting & Law
  • 9. Surgical System Prosthetic Limbs Space Program All-in-one Floor Cleaner Your Digital Secretary Walk Like a Man
  • 10. Self-driving cars The AI and ML Revolution is Here
  • 11. AI and ML Demystified / @carologic / MWUX2017 Decision Making: Self Driving (autonomous) vehicles Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University 24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands- free_Driving.jpg DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
  • 12. The AI and ML Revolution is Here
  • 13. AI-generated art L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style https://arxiv.org/pdf/1508.06576v1.pdf The AI and ML Revolution is Here
  • 14. Computational perception – face recognition (and speech, text, social, video, etc.) https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face- verification.pdf The AI and ML Revolution is Here
  • 15. #RSAC The Current Cyber Landscape Favors Malicious Actors SEC reveals it was hacked, information may have been used for illegal stock trades in October or November 2016, but wasn’t discovered by the firm until March 2017 The Cost of Cyber Security Operations Continues to Increase without Mitigating Risk Anthem: Hacked Database Included 78.8 Million People ”Big Four” accounting firm Deloitte was likely breached Global information solutions company, Equifax, has reported a major cybersecurity incident affecting 143 million consumers in the US. Most cybersecurity Attacks today are automated, from AI-powered Distributed Denial of Service (DDOS) attacks to phishing scams and ransomware.
  • 16. You Can’t Afford To Stay Stagnant: • In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to be worth more than $150 billion. • Global cybersecurity spending will exceed $1 trillion from 2017 to 2021 • The cybersecurity market grew by roughly 35 X over 13 years. • We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the 8-10 % projected over the next five years. The Increased Threat Landscape • $1 billion: Cost of ransomware attacks alone last year • $158: Average global cost of data breach per lost or stolen record • 25% of large organizations experience recurring incidents • 229 days: the average time to identify a malicious attack
  • 17. Cylance,Inc.Confidential The Future of Security Past Present Future AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE SPOND Pre-Execution Humans Needed Post-Execution Pre-Execution No Humans Threat actors could also employ AI tools to discover new vulnerabilities and design exploits and other attacks, in a fraction of the time it's taking them now. AI could be used as an effective tool to help them decide what, who and when to attack.
  • 18. Looking into the heart of AI’s Dark Secret What’s inside the box? Algorithmic regulation – where and how? Are we willing to let machines make decisions we don’t understand? Self modifying algorithms – who to interrogate?
  • 20. Applications of AI in Cyber Security • Intrusion detection • Examples – Malicious JavaScript and other scripts – Malicious Non-Executable Files – Malicious Executable Files • Inappropriate Web and Email Content • Phishing – Derive probabilistic models of phishing attacks – Derive probabilistic reputation models for URLs
  • 21. • Make Security Simple • AI not only improves efficacy, it also changes the deployment model and makes cybersecurity implementation and operation a seamless, smooth process. • Because of the advanced features of ML, you no longer employ traditional AV technology and tactics, including: • Incremental storage • Scanning machines • Re-imaging machines • You can remove large endpoint agents that create performance friction for enterprise users. AI Changes the Deployment Game
  • 22. • Use minimal system resources (1-2% CPU usage and 40- 50 MB of memory) • Prevent attacks with superior speed (in milliseconds) • Replace ineffective traditional AV tools (or augment existing security) • Achieve efficacy rates of greater than 99% (compared to 50-60% with antiquated signature-based AV) AI and Machine Learning Helps You:
  • 23. AI / ML Adoption Benefits Automated protection Faster response and protection Personalization Learn to adapt to me, unobtrusively Usability Drivers Scaling and velocity Humans are slow Humans are expensive Data growth Automation Threats evolve. Do you? Sophistication Complex threats 360-degree protection Firewalls talking to email servers and endpoints
  • 24. Doing AI & ML (Correctly) is Hard! FEATURES / DIMENSIONS • Static attributes • Dynamic behaviors • Reputation • Relations • Sequential state ADVANCED TECHNIQUES • Ensembling • Boosting • Sequential Learning • Deep Learning • Automation at Scale BOUNTIFUL DATA • 9 Trillion rows of security data • 4.5B queries processed daily from 175M endpoint devices • 2B emails scanned daily • 1B previously unseen web requests scanned daily • Outputs from other systems & products LEADING EXPERTS • Dedicated org of recognized machine learning experts • Experts-attack investigation team • Centuries of combined ML experience
  • 25. The Future of AI & ML in Cybersecurity now Superpowers for analysts hunting for targeted spearphishing attacks 100x faster Threat detection systems that learn to learn Real-time conversation monitoring for social engineering, cyberbullying, fake news, help, etc. future
  • 26. Predictive Protection AI / ML that anticipates attacks and automatically reconfigures for protection. The Future of AI & ML in Cybersecurity
  • 28. Reach me on Social Media: Facebook: Technology Evangeist Twitter Handle: @InderBarara LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/ Email me at: inderjit.barara@gmail.com Thanx