SlideShare a Scribd company logo
1 of 20
Download to read offline
©2022 DARKTRACE
Carlos Gray
Product SME
©2022 DARKTRACE 2
HowAICanThinkLikeAnAttacker
3
HowcanAIthinklikean
attacker?
WhyshouldAIthinklikean
attacker?
WhyAI?
MissionStatement:
Freetheworldofcyber
disruption.
• Pre-2000s - Creeper, Birth of Antivirus, Internet: Birth of Attacks
• 2000s - Criminal Groups Financed : Frequency of Attacks
• 2010s - Age of Ransomware : Sophisitication of Attacks
• 2020s - Future of Cybersecurity : AI Powered Attacks
©2022 DARKTRACE 4
EvolutionofCyberThreats
5
166%
Mandiant(2022)
4.3 million
IBM(2022)
Increase in Zero
Days
Average cost of
cyber disruption
52%
Rapid7(2021)
42:52
Splunk(2022)
Exploitations
began with
Zero Days
Median
Exploitation time
for Ransomware
CurrentTrendsofCyberThreats
7
Signature-based
Technology
Evidence-based
Threat Prediction
Known
Focused on the
business, not the threat
Known threat actors
Unknown actors
Unknown
attacks
Rules-based Technology
• Research-driven with a ‘problem first’ approach
• Experts across multiple disciplines
• Cutting edge – allowed to fail
• Today’s research becomes tomorrow’s product
• 100+ patents filed
©2022 DARKTRACE 9
DarktraceCyberAIResearchCentre
“[The Centre] saw growth of 69.2% in related patent
applications in the three months ending November,
compared to the same period [the previous year] - the
highest percentage growth out of all companies tracked.”
- GlobalData
48% headcount
increase in 2021
24 doctorates
60 master’s degrees
1. First phase of AI was consumer Internet data; next
phase is ‘entity-centric’ and bespoke to your business
2. Explainable AI clearly communicates the what, when,
why, and how
3. AI is making decisions or helping humans make
better decisions
4. AI continuously feeds back information to improve
outcomes
©2022 DARKTRACE 10
TrendsinAI
DarktraceDETECT
DarktraceCyber AI ANALYST
DarktraceRESPOND
DarktraceCyber AI LOOP
Self-Learning AI
ExplainableAI
Micro-DecisionMaking
AI Feedback
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
FPO
• Hardens defenses inside and out environments by feeding back
critical information to other parts of the Continuous AI Loop
• Identifies key assets across the organization
• Visualizes attack paths and enables scenario-based wargaming
• Runs real-world and simulated attacks with auto-switching at unsafe
levels
©2022 DARKTRACE 15
DarktracePREVENT
Know your enemy
• Learns normal’ ‘patterns of life’ to discover unpredictable cyber-threats
• Complete visibility across the workforce
• Learns ‘on the job’
• Works seamlessly across all environments via an open and extensible architecture
©2022 DARKTRACE 16
DarktraceDETECT
See attacks instantly
• Based on an influx of continuously changing information, AI makes micro-decisions in seconds
• Proportionate and targeted actions
• Reacts faster than human teams
• Enforces normal business operations
©2022 DARKTRACE 17
DarktraceRESPOND
Disarm within seconds
• Provides a solution to heal from disruption
• Restores assets to their condition before an attack
• Empowers informed human decisions for healing from attack, while
avoiding organizational shutdown
• Automates and expedites the process restoring systems to “normal”
©2022 DARKTRACE 19
DarktraceHEAL
Restore back to health
• End-to-end cyber security
• Creates a bespoke, AI Self-Learning solution unique to each organization
• Frees the security team for high value work that only humans can do
• Protects revenue, secures the bottom line.
©2022 DARKTRACE 20
DarktraceCyberAILoop:TheBigIdeas
Strengthens security posture continuously in a virtuous AI feedback loop
©2022 DARKTRACE 21
ManagingCyberRisk
AttackSimulations
RedTeam Exercises
(blueandpurple)
PenetrationTesting
AttackSurface
Management
ThreatIntelligence
Vulnerability
management
ITAssetDiscovery
Hardensecurityinsideandout
©2022 DARKTRACE 24
UseCases
ITgovernance
Maliciousinfrastructure
Supplychainrisk
Subsidiary/M&Arisk
GDPR
Cloudrisks
APIsecurity
Dataleaks
Misconfigurations
ShadowIT
Blindspots
28
©2022 DARKTRACE

More Related Content

What's hot

Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team ExercisePeter Wood
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...Chris Gates
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKKatie Nickels
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConPurple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConJorge Orchilles
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 

What's hot (20)

Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Zero Trust : How to Get Started
Zero Trust : How to Get StartedZero Trust : How to Get Started
Zero Trust : How to Get Started
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConPurple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 

Similar to How AI can Think Like an Attacker (Carlos Gray at DarkTrace)

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceTony Zirnoon, CISSP
 
Хакеро-машинный интерфейс
Хакеро-машинный интерфейсХакеро-машинный интерфейс
Хакеро-машинный интерфейсPositive Hack Days
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesTony Zirnoon, CISSP
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile securityMobileSoft
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】Hacks in Taiwan (HITCON)
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Bindernitayart
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Andreas Sfakianakis
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud EnvironmentShapeBlue
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 

Similar to How AI can Think Like an Attacker (Carlos Gray at DarkTrace) (20)

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Хакеро-машинный интерфейс
Хакеро-машинный интерфейсХакеро-машинный интерфейс
Хакеро-машинный интерфейс
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile security
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 

More from Executive Leaders Network

Fuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdfFuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdfExecutive Leaders Network
 
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...Executive Leaders Network
 
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)Executive Leaders Network
 
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)Executive Leaders Network
 
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...Executive Leaders Network
 
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...Executive Leaders Network
 
Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...Executive Leaders Network
 
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...Executive Leaders Network
 
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)Executive Leaders Network
 
Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)Executive Leaders Network
 
How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...Executive Leaders Network
 
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...Executive Leaders Network
 
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...Executive Leaders Network
 
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)Executive Leaders Network
 
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)Executive Leaders Network
 
Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)Executive Leaders Network
 
The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)Executive Leaders Network
 
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...Executive Leaders Network
 
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...Executive Leaders Network
 

More from Executive Leaders Network (20)

Totally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdfTotally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdf
 
Fuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdfFuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdf
 
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
 
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
 
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
 
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
 
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
 
Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...
 
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
 
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
 
Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)
 
How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...
 
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
 
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
 
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
 
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
 
Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)
 
The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)
 
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
 
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
 

Recently uploaded

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 

Recently uploaded (20)

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 

How AI can Think Like an Attacker (Carlos Gray at DarkTrace)

  • 2. Carlos Gray Product SME ©2022 DARKTRACE 2 HowAICanThinkLikeAnAttacker
  • 4. • Pre-2000s - Creeper, Birth of Antivirus, Internet: Birth of Attacks • 2000s - Criminal Groups Financed : Frequency of Attacks • 2010s - Age of Ransomware : Sophisitication of Attacks • 2020s - Future of Cybersecurity : AI Powered Attacks ©2022 DARKTRACE 4 EvolutionofCyberThreats
  • 5. 5 166% Mandiant(2022) 4.3 million IBM(2022) Increase in Zero Days Average cost of cyber disruption 52% Rapid7(2021) 42:52 Splunk(2022) Exploitations began with Zero Days Median Exploitation time for Ransomware CurrentTrendsofCyberThreats
  • 6. 7 Signature-based Technology Evidence-based Threat Prediction Known Focused on the business, not the threat Known threat actors Unknown actors Unknown attacks Rules-based Technology
  • 7. • Research-driven with a ‘problem first’ approach • Experts across multiple disciplines • Cutting edge – allowed to fail • Today’s research becomes tomorrow’s product • 100+ patents filed ©2022 DARKTRACE 9 DarktraceCyberAIResearchCentre “[The Centre] saw growth of 69.2% in related patent applications in the three months ending November, compared to the same period [the previous year] - the highest percentage growth out of all companies tracked.” - GlobalData 48% headcount increase in 2021 24 doctorates 60 master’s degrees
  • 8. 1. First phase of AI was consumer Internet data; next phase is ‘entity-centric’ and bespoke to your business 2. Explainable AI clearly communicates the what, when, why, and how 3. AI is making decisions or helping humans make better decisions 4. AI continuously feeds back information to improve outcomes ©2022 DARKTRACE 10 TrendsinAI DarktraceDETECT DarktraceCyber AI ANALYST DarktraceRESPOND DarktraceCyber AI LOOP Self-Learning AI ExplainableAI Micro-DecisionMaking AI Feedback
  • 9. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. FPO
  • 10.
  • 11. • Hardens defenses inside and out environments by feeding back critical information to other parts of the Continuous AI Loop • Identifies key assets across the organization • Visualizes attack paths and enables scenario-based wargaming • Runs real-world and simulated attacks with auto-switching at unsafe levels ©2022 DARKTRACE 15 DarktracePREVENT Know your enemy
  • 12. • Learns normal’ ‘patterns of life’ to discover unpredictable cyber-threats • Complete visibility across the workforce • Learns ‘on the job’ • Works seamlessly across all environments via an open and extensible architecture ©2022 DARKTRACE 16 DarktraceDETECT See attacks instantly
  • 13. • Based on an influx of continuously changing information, AI makes micro-decisions in seconds • Proportionate and targeted actions • Reacts faster than human teams • Enforces normal business operations ©2022 DARKTRACE 17 DarktraceRESPOND Disarm within seconds
  • 14. • Provides a solution to heal from disruption • Restores assets to their condition before an attack • Empowers informed human decisions for healing from attack, while avoiding organizational shutdown • Automates and expedites the process restoring systems to “normal” ©2022 DARKTRACE 19 DarktraceHEAL Restore back to health
  • 15. • End-to-end cyber security • Creates a bespoke, AI Self-Learning solution unique to each organization • Frees the security team for high value work that only humans can do • Protects revenue, secures the bottom line. ©2022 DARKTRACE 20 DarktraceCyberAILoop:TheBigIdeas Strengthens security posture continuously in a virtuous AI feedback loop
  • 16. ©2022 DARKTRACE 21 ManagingCyberRisk AttackSimulations RedTeam Exercises (blueandpurple) PenetrationTesting AttackSurface Management ThreatIntelligence Vulnerability management ITAssetDiscovery
  • 19. 28