SlideShare a Scribd company logo
1 of 13
Download to read offline
HOWAICANHELPIN
CYBERSECURITY
My name is Priyanshu Ratnakar. I'm an
Indian teen entrepreneur. Founder, Director
and Chief Executive Officer of Protocol X.
I'm a cyber security practitioner. I was also
named in Your-story’s and Time of India's
Top 5 Youngest Entrepreneurs of India 2020
WHOAMI?
for more www.priyanshuratnakar.com
WHYAI?
Understanding the Concept
THEAIUMBRELLA
Ttypes Of AI
The next stage in the development of AI is to use machine learning (ML).
ML relies on neural networks—computer systems modeled on the
human brain and nervous system—which can classify information into
categories based on elements that those categories contain (for
example, photos of dogs or heavy metal songs). ML uses probability to
make decisions or predictions about data with a reasonable degree of
certainty. In addition, it is capable of refining itself when given feedback
on whether it is right or wrong. ML can modify how it analyzes data (or
what data is relevant) in order to improve its chances of making a
correct decision in the future. ML works relatively well for shape
detection, like identifying types of objects or letters for
transliteration.The neural networks used for ML were developed in the
1980s but, because they are computationally intensive, they have only
been viable on a large scale since the advent of graphics processing
units (GPUs) and high-performing CPUs.
MACHINELEARNING
Deep learning (DL) is essentially a subset of ML that
extends ML capabilities across multilayered neural
networks to go beyond just categorizing data. DL can
actually learn—self-train, essentially—from massive
amounts of data. With DL, it’s possible to combine the
unique ability of computers to process massive
amounts of information quickly, with the human-like
ability to take in, categorize, learn, and adapt.
Together, these skills allow modern DL programs to
perform advanced tasks, such as identifying
cancerous tissue in MRI scans. DL also makes it
possible to develop driverless cars and designer
medications that are tailored to an individual’s
genome.
DEEPLEARNING
to make useful decisions, they need us to provide
them with two things:
Lots and lots of relevant data
Specific rules on how to examine that data
AIHELPINGINDAILYLIFE
fingerprint
face recognition
Security and Surveillance
Antivrus
AIGONEWRONG
AIINCYBER
SECURITY
THE ROLE OF
HOWWILLAIAFFECT
CYBERSECURITY?
AI IN CYBER SECURITY
AIINCYBERSECURITY
IT Asset Inventory
Threat Exposure
Controls Effectiveness
Breach Risk Prediction
Incident response
Explainability
01
02
03
04
05
06
HOWDOHACKERSUSE
ARTIFICIALINTELLIGENCE?
AI Weaponization by Hackers
instagram.com/priyanshu_ratnakar
hello@priyanshuratnakar.com
THANKYOU!
facebook.com/ratnakarpriyanshu
www.priyanshuratnakar.com

More Related Content

What's hot

AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 

What's hot (20)

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
cyber security
cyber securitycyber security
cyber security
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to HOW AI CAN HELP IN CYBERSECURITY

Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
eswaralaldevadoss
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!
Kavika Roy
 

Similar to HOW AI CAN HELP IN CYBERSECURITY (20)

AI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptxAI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptx
 
The Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine LearningThe Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine Learning
 
The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
Tech Today.pptx
Tech Today.pptxTech Today.pptx
Tech Today.pptx
 
Machine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guideMachine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guide
 
Unveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docxUnveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docx
 
AI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptxAI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptx
 
Automated machine learning: the new data science challenge
Automated machine learning: the new data science challengeAutomated machine learning: the new data science challenge
Automated machine learning: the new data science challenge
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docx
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec ppt
 
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
 
Machine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdfMachine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdf
 
Artificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptxArtificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptx
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network converted
 
AI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdfAI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdf
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docx
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

HOW AI CAN HELP IN CYBERSECURITY

  • 2. My name is Priyanshu Ratnakar. I'm an Indian teen entrepreneur. Founder, Director and Chief Executive Officer of Protocol X. I'm a cyber security practitioner. I was also named in Your-story’s and Time of India's Top 5 Youngest Entrepreneurs of India 2020 WHOAMI? for more www.priyanshuratnakar.com
  • 6. The next stage in the development of AI is to use machine learning (ML). ML relies on neural networks—computer systems modeled on the human brain and nervous system—which can classify information into categories based on elements that those categories contain (for example, photos of dogs or heavy metal songs). ML uses probability to make decisions or predictions about data with a reasonable degree of certainty. In addition, it is capable of refining itself when given feedback on whether it is right or wrong. ML can modify how it analyzes data (or what data is relevant) in order to improve its chances of making a correct decision in the future. ML works relatively well for shape detection, like identifying types of objects or letters for transliteration.The neural networks used for ML were developed in the 1980s but, because they are computationally intensive, they have only been viable on a large scale since the advent of graphics processing units (GPUs) and high-performing CPUs. MACHINELEARNING Deep learning (DL) is essentially a subset of ML that extends ML capabilities across multilayered neural networks to go beyond just categorizing data. DL can actually learn—self-train, essentially—from massive amounts of data. With DL, it’s possible to combine the unique ability of computers to process massive amounts of information quickly, with the human-like ability to take in, categorize, learn, and adapt. Together, these skills allow modern DL programs to perform advanced tasks, such as identifying cancerous tissue in MRI scans. DL also makes it possible to develop driverless cars and designer medications that are tailored to an individual’s genome. DEEPLEARNING to make useful decisions, they need us to provide them with two things: Lots and lots of relevant data Specific rules on how to examine that data
  • 11. AIINCYBERSECURITY IT Asset Inventory Threat Exposure Controls Effectiveness Breach Risk Prediction Incident response Explainability 01 02 03 04 05 06