SlideShare a Scribd company logo
1 of 40
HACK IT
CONSULTANCY
We secure what matters the most to you
Who am i
“
• CEO of an award-winning organization as the best cybersecurity company in
Tanzania called HACK IT Consultancy
• With half a decade years of experience in cybersecurity, digital forensics,
training (technical & non-technical), publication, public speaking and
consultations
• Mr. Mchatta is also an award winner of the best cybersecurity expert by
blacks in cybersecurity (BIC)
• Certified in cybersecurity by ISC2 among other certifications
• Holder of MSc. and BSc.
“
Mchatta Kharim
Kenya
• Public Speaking
• Training
• CTF Competition
• Mentor
Tanzania
• Public Speaking
• Training
• CTF Competition
• Digital Forensics
• Penetration Testing
• Curriculum Creation
• Public Speaking
Egypt
• Public Speaking
• Public Speaking
Morocco
Rwanda
• Public Speaking
Nigeria
• Penetration testing
Ghana
• Penetration testing
• Public speaking
South Africa
• Penetration testing
Benin
Uganda
• Public Speaking
Experience in Africa
Experience in USA & Europe
• Penetration Testing US Department
of Defense
United States of America
UK
• Author at eForensics
Magazine
• Author at PenTest
Magazine
• Penetration testing
( Research Institute)
Poland
Germany
• Subject Matter Expert
(DW Swahili)
Artificial Intelligence
in
Cybersecurity
V I E W M O R E
AI IN CYBERSECURITY
TOPICS TO BE COVERED
Introduction
Benefits of AI
Concerns
Security concerns
Cybercriminals & AI
Counter cyber threats
Conclusion
Benefits of AI
Concerns
Security concerns
Cybercriminals & AI
Counter cyber threats
Conclusion
Concerns
Security concerns
Cybercriminals & AI
Counter cyber threats
Conclusion
Security concerns
Cybercriminals & AI
Counter cyber threats
Conclusion
Cybercriminals & AI
Counter cyber threats
Conclusion
Counter cyber threats
Conclusion
Conclusion
HERE WE GO
Artificial Intelligence
Artificial Intelligence
AI has been an integral part of our lives revolutionizing
the human advancement in technology making
improvements on the way people perform their daily
operations.
VI E W MORE
AI IN CYBERSECURITY
AI IN CYBERSECURITY
SIGNIFICANCE OF AI
AI IN CYBERSECURITY
SIGNIFICANCE OF AI
2
3
4
5
1
Reduction of human error
Reduction of risks i.e bomb defusing
24x7 availability
Perform repetitive tasks
Reach remote area’s i.e mars, ocean
AI IN CYBERSECURITY
CONCERNS OF AI
AI IN CYBERSECURITY
CONCERNS OF AI
2
3
4
5
1 AI might leave a lot of people unemployed
AI might be discriminatory
AI might make irrational decisions
AI might no emotions
AI has no ethics
AI IN CYBERSECURITY
SECURITY CONCERNS OF AI
AI IN CYBERSECURITY
SECURITY CONCERNS OF AI
2
3
4
5
1 Cybercriminals also use AI
Rise of sophisticated threats i.e deep fake
Rise of more script kiddie’s
AI if not configured properly might be a
point of compromise
AI can make decisions without human
oversight
AI IN CYBERSECURITY
CYBERCRIMINALS & AI
CYBERCRIMINALS & AI
AI IN CYBERSECURITY
We must not forget that cybercriminals are also
learning.They are constantly finding new ways on
which they can use technology to their advantage.
2
3
4
5
1 Cybercriminals use AI for phishing
Cybercriminals use AI for creating malware
Cybercriminals use AI for vhishing
Cybercriminals use AI for deep fake
Cybercriminals use AI for password cracking
AI IN CYBERSECURITY
COUNTERING NEW CYBER
THREATS
AI IN CYBERSECURITY
COUNTERING CYBER THREATS
2
3
4
5
1
As cybercriminals are getting smarter, as cybersecurity
experts we should make sure we utilize AI to its fullest.
Here are some ways cybersecurity experts can utilize AI
We can use AI to monitor network for attacks
We can use AI to detect attacks
We can use AI to prevent attacks
We can use AI to threat hunting on network
We can use AI to behavior analysis
AI IN CYBERSECURITY
CONCLUSION
AI IN CYBERSECURITY
CONCLUSION
As AI becomes more popular, we should
make sure that we use it with good intent.
MAY THE AI FORCE
BE WITHYOU
MAY THE AI FORCE
BE WITHYOU
1
Author: Kharim Mchatta
2
Email: info@hackitconsultancy.com
3
Website: www.h4k-it.com
4
Socials: hack it consultancy

More Related Content

What's hot

Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

What's hot (20)

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
AI in security
AI in securityAI in security
AI in security
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
The 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial IntelligenceThe 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial Intelligence
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 

Similar to AI in Cybersecurity | 2023

Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
delmount
 

Similar to AI in Cybersecurity | 2023 (20)

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
hacking
hackinghacking
hacking
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
How To Become an Ethical Hacker?
How To Become an Ethical Hacker?How To Become an Ethical Hacker?
How To Become an Ethical Hacker?
 
The hidden world Navigating the Dark Web
The hidden world Navigating the Dark WebThe hidden world Navigating the Dark Web
The hidden world Navigating the Dark Web
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
5 Key Decisions that Shape Your Infosec Carreer | Ladies in Cybersecurity 2019
5 Key Decisions that Shape Your Infosec Carreer | Ladies in Cybersecurity 20195 Key Decisions that Shape Your Infosec Carreer | Ladies in Cybersecurity 2019
5 Key Decisions that Shape Your Infosec Carreer | Ladies in Cybersecurity 2019
 
5 Key Decisions That Shape Your Infosec Career
5 Key Decisions That Shape Your Infosec Career5 Key Decisions That Shape Your Infosec Career
5 Key Decisions That Shape Your Infosec Career
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from KharimMchatta

More from KharimMchatta (11)

Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

AI in Cybersecurity | 2023