SlideShare a Scribd company logo
1 of 13
Download to read offline
HOWAICANHELPIN
CYBERSECURITY
My name is Priyanshu Ratnakar. I'm an
Indian teen entrepreneur. Founder, Director
and Chief Executive Officer of Protocol X.
I'm a cyber security practitioner. I was also
named in Your-story’s and Time of India's
Top 5 Youngest Entrepreneurs of India 2020
WHOAMI?
for more www.priyanshuratnakar.com
WHYAI?
Understanding the Concept
THEAIUMBRELLA
Ttypes Of AI
The next stage in the development of AI is to use machine learning (ML).
ML relies on neural networks—computer systems modeled on the
human brain and nervous system—which can classify information into
categories based on elements that those categories contain (for
example, photos of dogs or heavy metal songs). ML uses probability to
make decisions or predictions about data with a reasonable degree of
certainty. In addition, it is capable of refining itself when given feedback
on whether it is right or wrong. ML can modify how it analyzes data (or
what data is relevant) in order to improve its chances of making a
correct decision in the future. ML works relatively well for shape
detection, like identifying types of objects or letters for
transliteration.The neural networks used for ML were developed in the
1980s but, because they are computationally intensive, they have only
been viable on a large scale since the advent of graphics processing
units (GPUs) and high-performing CPUs.
MACHINELEARNING
Deep learning (DL) is essentially a subset of ML that
extends ML capabilities across multilayered neural
networks to go beyond just categorizing data. DL can
actually learn—self-train, essentially—from massive
amounts of data. With DL, it’s possible to combine the
unique ability of computers to process massive
amounts of information quickly, with the human-like
ability to take in, categorize, learn, and adapt.
Together, these skills allow modern DL programs to
perform advanced tasks, such as identifying
cancerous tissue in MRI scans. DL also makes it
possible to develop driverless cars and designer
medications that are tailored to an individual’s
genome.
DEEPLEARNING
to make useful decisions, they need us to provide
them with two things:
Lots and lots of relevant data
Specific rules on how to examine that data
AIHELPINGINDAILYLIFE
fingerprint
face recognition
Security and Surveillance
Antivrus
AIGONEWRONG
AIINCYBER
SECURITY
THE ROLE OF
HOWWILLAIAFFECT
CYBERSECURITY?
AI IN CYBER SECURITY
AIINCYBERSECURITY
IT Asset Inventory
Threat Exposure
Controls Effectiveness
Breach Risk Prediction
Incident response
Explainability
01
02
03
04
05
06
HOWDOHACKERSUSE
ARTIFICIALINTELLIGENCE?
AI Weaponization by Hackers
instagram.com/priyanshu_ratnakar
hello@priyanshuratnakar.com
THANKYOU!
facebook.com/ratnakarpriyanshu
www.priyanshuratnakar.com

More Related Content

What's hot

Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityPratap Dangeti
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsZoneFox
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurityscoopnewsgroup
 

What's hot (20)

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
AI in security
AI in securityAI in security
AI in security
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 

Similar to HOW AI CAN HELP IN CYBERSECURITY

AI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptxAI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptxsphinx Worldbiz
 
The Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine LearningThe Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine LearningGayathriB80
 
The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)RR IT Zone
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...eswaralaldevadoss
 
Tech Today.pptx
Tech Today.pptxTech Today.pptx
Tech Today.pptxSlimShehu
 
Machine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guideMachine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guideNeil Johnson
 
Unveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docxUnveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docxgreendigital
 
AI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptxAI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptxbajajrishabh96tech
 
Automated machine learning: the new data science challenge
Automated machine learning: the new data science challengeAutomated machine learning: the new data science challenge
Automated machine learning: the new data science challengeIJECEIAES
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docxAliParsa22
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec pptsterlingit
 
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...PARAMASIVANCHELLIAH
 
Machine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdfMachine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdfCIO Look Magazine
 
Artificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptxArtificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptxChetnaGoyal16
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network convertedJanu Jahnavi
 
AI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdfAI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdfJPLoft Solutions
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxNetiApps
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!Kavika Roy
 

Similar to HOW AI CAN HELP IN CYBERSECURITY (20)

AI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptxAI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptx
 
The Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine LearningThe Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine Learning
 
The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
Tech Today.pptx
Tech Today.pptxTech Today.pptx
Tech Today.pptx
 
Machine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guideMachine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guide
 
Unveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docxUnveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docx
 
AI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptxAI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptx
 
Automated machine learning: the new data science challenge
Automated machine learning: the new data science challengeAutomated machine learning: the new data science challenge
Automated machine learning: the new data science challenge
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docx
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec ppt
 
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
 
Machine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdfMachine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdf
 
Artificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptxArtificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptx
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network converted
 
AI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdfAI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdf
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docx
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

HOW AI CAN HELP IN CYBERSECURITY

  • 2. My name is Priyanshu Ratnakar. I'm an Indian teen entrepreneur. Founder, Director and Chief Executive Officer of Protocol X. I'm a cyber security practitioner. I was also named in Your-story’s and Time of India's Top 5 Youngest Entrepreneurs of India 2020 WHOAMI? for more www.priyanshuratnakar.com
  • 6. The next stage in the development of AI is to use machine learning (ML). ML relies on neural networks—computer systems modeled on the human brain and nervous system—which can classify information into categories based on elements that those categories contain (for example, photos of dogs or heavy metal songs). ML uses probability to make decisions or predictions about data with a reasonable degree of certainty. In addition, it is capable of refining itself when given feedback on whether it is right or wrong. ML can modify how it analyzes data (or what data is relevant) in order to improve its chances of making a correct decision in the future. ML works relatively well for shape detection, like identifying types of objects or letters for transliteration.The neural networks used for ML were developed in the 1980s but, because they are computationally intensive, they have only been viable on a large scale since the advent of graphics processing units (GPUs) and high-performing CPUs. MACHINELEARNING Deep learning (DL) is essentially a subset of ML that extends ML capabilities across multilayered neural networks to go beyond just categorizing data. DL can actually learn—self-train, essentially—from massive amounts of data. With DL, it’s possible to combine the unique ability of computers to process massive amounts of information quickly, with the human-like ability to take in, categorize, learn, and adapt. Together, these skills allow modern DL programs to perform advanced tasks, such as identifying cancerous tissue in MRI scans. DL also makes it possible to develop driverless cars and designer medications that are tailored to an individual’s genome. DEEPLEARNING to make useful decisions, they need us to provide them with two things: Lots and lots of relevant data Specific rules on how to examine that data
  • 11. AIINCYBERSECURITY IT Asset Inventory Threat Exposure Controls Effectiveness Breach Risk Prediction Incident response Explainability 01 02 03 04 05 06