SlideShare a Scribd company logo
1 of 38
Download to read offline
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
APPLIED MACHINE
LEARNING FOR DATA
EXFIL AND OTHER
FUN TOPICS
Matt Wolff, Chief Data Scientist
Brian Wallace, Security Researcher
Xuan Zhao, Data Scientist
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
GOALS OF THIS TALK:
APPLIED	MACHINE	LEARNING	
•  Iden5fy	suitable	problems	for	ML	approaches	
•  Demonstrate	by	example	how	to	apply	ML		
•  Help	jumpstart	addi5onal	research	in	the	Security	+	ML	space
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
WHO	WE	ARE/CYLANCE	
•  Endpoint	security	company	built	
around	the	capabili5es	of	
ar5ficial	intelligence	
•  Protec5ng	millions	of	enterprise	
endpoints	
•  Founded	in	2012,	$177	mm	
raised	
•  Booth	#1124	
Ma3	Wolff	
Chief	Data	Scien5st	
Brian	Wallace	
Senior	Security	Researcher	
Xuan	Zhao	
Data	Scien5st
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
TALK	
OVERVIEW	
•  Machine	Learning	Introduc5on	
•  NMAP	Clustering	
•  Feature	Spaces	
•  Distances	
•  Clustering	
•  Botnet	Panel	Iden5fica5on	
•  Classifica5on	
•  Feature	Reduc5on	
•  Obfusca5ng	Data	with	Markov	
Chains
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MACHINE	LEARNING	OVERVIEW	
•  Machine	learning	techniques	are	data	driven	
•  Available	data	should	be	able	to	solve	the	problem	in	a	meaningful	way	
•  Approaches	exist	for	dealing	with	raw	data,	as	well	as	labeled	
or	annotated	data
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MACHINE	LEARNING	OVERVIEW	
•  Given	some	data,	different	types	of	machine	learning	can	be	applied	
•  Clustering	is	useful	for	finding	similarity	across	dataset	to	uncover	
trends	or	other	insight	
•  With	labeled	data,	classifica5on	can	be	useful	to	build	predic5ve	models
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MACHINE	LEARNING	OVERVIEW	
•  OYen,	raw	data	has	to	be	transformed	in	some	way	to	be	used	
by	machine	learning	algorithms	
•  Typical	process	is	to	extract	features	from	data,	and	turn	those	
features	into	vectors		
•  Vectors	are	then	fed	into	ML	algorithms	for	training	or	other	purposes
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MACHINE	LEARNING	OVERVIEW	
•  Recommended	resources	
•  Scikit-learn.org	
•  Python	
•  Source	code	for	all	tools	in	this	talk	available	on	the	Cylance	public	git	
repo	
•  h^ps://github.com/CylanceSPEAR	
•  Should	be	able	to	pull	talk	source	and	start	modifying	as	needed	to	suit	
data	driven	problems	in	your	own	organiza5on	or	research	group.
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
•  NMAP	is	a	popular	port	scanning	tool	
•  Produces	large	amount	of	data	per	IP	address	
•  Scans	over	large	number	of	IPs	can	be	difficult	to	make	sense	of	
•  NMAP	Clustering	is	a	tool	which	clusters	(groups)	IPs	based	on	
their	open	ports,	services,	etc	
TOOL	–	NMAP	CLUSTERING
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
FEATURES	
•  Features	are	informa5ve,	discrimina5ve	informa5on	that	can	describe	a	
sample/observa5on/phenomenon/etc.	
•  Feature	extrac5on	is	pivotal	to	the	machine	learning	pipeline	
•  Our	features	are	based	on	NMAP	output	
•  Each	port	is	a	feature,	each	service	on	each	port	is	a	feature,	
each	version	of	each	service	on	each	port	is	a	feature,	etc	
•  Script	output	included	in	features	(including	website	
5tles,	public	keys,	etc)
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
VECTORS	
•  Numerical	representa5on	of	a	sample	(IP	in	NMAP	case)	
•  Array	of	values	which	represent	all	features	from	one	sample		
•  Vectors	can	be	thought	of	as	points	in	high	dimensional	space	
•  Each	feature	is	a	dimension,	the	value	of	the	feature	in	the	vector	is	the	
posi5on	in	that	dimension	
•  If	we	have	only	two	features,	it	is	really	easy	to	visualize
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
VECTORS	–	2D
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
VECTORS	–	3D	
File	 Filename	
Length	
Filesize	(kB)	 Size	of	
headers	(kB)	
calc.exe	 8	 918.528	 63	
notepad.exe	 11	 193.024	 45	
malware.exe	 11	 193.024	 10
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
𝑎		
𝑏		
𝑐		
•  Distance:	
	Describe	the	discrepancy	between	two	points	
•  Physical	distance	between	two	points:	
Pythagorean’s theorem:
DISTANCES	
a2	+	b2	=	c2
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
File	 Filename	Length	 Filesize	(kB)	 Size	of	headers	
(kb)	
calc.exe	 8	 918.528	 63	
notepad.exe	 11	 193.024	 45	
malware.exe	 11	 193.024	 10	
2D	 3D
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
DISTANCES	
Mul5ple	Distance	Metrics	–		
As long as an operation satisfy certain
mathematical criteria, it can be used as
a distance metric
Manhattan
Euclidean
Point 1
Point 2
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
CLUSTERING	
•  With	a	way	to	measure	distance,	we	can	group	items	by	how	
close	they	are,	aka	clustering	
•  Clusters	are	dis5nct	groups	of	samples	(IP)	which	have	been	
grouped	together	
•  Clustering	is	generally	unsupervised	learning	
•  Different	algorithms	with	different	configura5ons	group	these	
samples	in	different	ways
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
k-Means	
•  Clustering	algorithm	
•  User	supplies	k	(des5nated	number	of	clusters)	
•  All	samples	are	assigned	to	random	clusters	
•  Center	of	each	cluster	is	computed	by	taking	mean	(average)	
of	all	samples	in	cluster	
•  Samples	are	then	assigned	to	the	cluster	whose	center	they	are	closest	to		
•  Centers	are	recomputed,	algorithm	loops	un5l	no	samples	change	clusters
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
k-Means
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
NMAP	CLUSTERING	–	MANUAL/AUTOMATIC	
•  Manual	allows	you	to	supply	your	own	clustering	parameters	
•  Automa5c	tries	many	different	methods	with	theore5cally-found	
op5mal	parameters	and	picks	what	it	determines	to	be	the	best	
•  Demo	with	manual	strategy	
•  Demo	with	automa5c	strategy
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
NMAP	CLUSTERING	-	INTERACTIVE	
•  Incorporate	the	User’s	decision	into	the	
clustering	process.	
•  The	Clustering	result	will	be	customized	
according	to	customer’s	preference	in	this	way	
•  Process	(will	show	with	a	demo):		
1.  User	decide	whether	the	cluster	
needs	to	be	split	or	not:	
2.  If	yes,	then	split	using	divisive	clustering	
3.  If	no,	finalize	this	cluster	
4.  Recursively	split	un5l	users	are	
sa5sfied	with	all	the	clusters	
Y
YN
Finalized
N
Finalized
N
Finalized
Y	–	Split	
N	–	No	-	Split
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
TOOL	–	ID	PANEL	
•  Botnet	panels	(command	and	control	websites)	can	be	difficult	to	iden5fy	
•  Need	previous	knowledge	of	the	botnet	panels	
•  OYen	modified	to	avoid	detec5on	or	vanity	
•  Many	are	based	off	others,	so	dis5nguishing	can	be	difficult	
•  We	can	train	a	model	to	iden5fy	if	we	are	looking	at	a	bot	panel	and	which	
one	it	is,	with	a	small	number	of	requests	
•  Minimizing	the	number	of	requests	to	classify	improves	stealth	
and	rate	of	classifica5on
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
CLASSIFICATION	
•  This	is	a	classifica5on	problem	
•  Classifica5on	answers	“Is	it	what	we	are	looking	for?”	
•  Classifica5on	is	generally	supervised	learning		
•  Supervised	learning	requires	training	samples	to	have	labels	
•  Classifica5on	methods	range	from	simple	to	highly	complex
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
ID	PANEL	FEATURES	
•  Botnet	panels	are	similar	to	normal	websites	
•  Contain	various	file	types,	oYen	edited	
•  HTTP	response	codes	+	content	comparison	
•  Encoding	content	as	features	difficult	
•  ssDeep	provides	a	con5nuous	value	by	comparing	content
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
COLLECTING	DATA	
•  Collec5on	of	known	botnet	panels	
•  Request	all	known	paths	for	all	known	botnet	panel	types	
•  Store	HTTP	status	code	and	ssDeep	of	content	
•  Collec5on	of	sites	that	are	not	botnet	panels	needed	as	well
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
DECISION	TREES	
•  Decision	trees	are	simple	classifiers	
•  Splits	the	dataset	one	feature	at	a	
5me	un5l	decision	is	confident	
•  Results	in	a	tree	of	queries	where	
the	results	produce	a	decision	
•  Simple	to	train
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
ENSEMBLE	OF	DECISION	TREES	
•  A	single	decision	tree	may	be	over	focused	on	training	data	
•  Can	alleviate	this	problem	by	building	mul5ple	Decision	Trees	for	each	label	
•  Combining	the	results	allows	each	Decision	Tree	to	vote	
•  Par5al	answers	may	s5ll	be	of	interest	to	the	user	
•  Ensembles	can	obtain	be^er	predic5ve	performance	
Pony	DT1	 Pony	DT2	 Pony	DT3	 Dexter	DT1	 Dexter	DT2	 Dexter	DT3	 Zeus	DT1	 Zeus	DT2	 Zeus	DT3	
It’s	Pony
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
ID	PANEL	DEMO	–	COMMAND	LINE	
•  Quick	way	to	check	if	a	website	directory	contains	a	botnet	panel	
•  Easy	to	batch	searching	of	mul5ple	websites/directories	
•  Easy	to	grep	results
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
ID	PANEL	DEMO	–	CHROME	EXTENSION	
•  Every	website	directory	visited	is	tested	
•  Results	are	stored	in	browser	
•  ssDeep	ported	from	C	to	Javascript	
•  h^ps://github.com/kripken/emscripten	
•  Extension	available	in	Chrome	extension	store	(free,	of	course)
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
TOOL	–	MARKOV	OBFUSCATE	
•  Data	exfiltra5on	from	a	network	oYen	requires	avoiding	an	outbound	firewall	
•  Deep	packet	inspec5on	looks	to	block	anything	undesirable	
•  Easy	to	encrypt	data,	but	its	also	easy	to	drop	informa5on	that	can’t	be	read	
•  We	can	make	our	data	look	like	something	else	en5rely
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
•  Simple	machine	learning	method	for	characterizing	sequence	data	
•  Learns	the	transi5on	pa^ern	from	a	state	to	another	based	on	how	likely	a	state	
comes	aYer	another	state	in	the	training	data	
•  We	can	create	sequences	with	transi5on	pa^erns	that	are	learned	from	the	
data	it	was	trained	on	
MARKOV	CHAIN	
AAB	
BAB	
ABA	
A	 B	
A	 1	(25%)	 3	(75%)	
B	 2	(100%)	 0	(0%)	
TransiXon	Matrix	
Training	Data	
A	
B	
A	
A	
B	
A	
B	 P(ABB)	=	0	
P(ABA)	=	0.75	
P(AAB)	=	0.1875	
P(AAA)	=	0.0625
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
POPULAR	USE	CASES	OF	
MARKOV	CHAINS	
Weather	Predic,on	
Sunny	 Rainy	
Sunny	 0.9999	 0.0001	
Rainy	 0.9	 0.1	
Recommenda,on	
0.9	 0.95	
0.1	
0.05	
0.03	
0.13
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
ENCODING	DATA	WITH	A	MARKOV	CHAIN	
•  Given	a	transi5on	matrix,	we	can	sort	items	by	how	likely	they	are	to	
follow	our	current	item	
•  If	we	choose	the	5th	most	likely	item,	we	can	iden5fy	it’s	the	5th	most	
likely	with	a	model	trained	on	the	same	data	
•  This	encodes	the	number	5	in	the	transi5on	from	our	first	item	
to	our	second	item
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MARKOV	OBFUSCATE	-	ENCODING	
•  Train	our	model	with	a	book	
•  Observing	transi5ons	from	word	to	word	
•  Generate	data	based	on	transi5on	probabili5es	
•  Demo
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MARKOV	OBFUSCATE	-	WRAPPING	
•  Simple	to	transfer	our	data	through	a	pipeline	that	looks	
like	normal	HTTP	traffic	
•  Looks	like	a	user	pos5ng	to	their	blog	
•  Demo
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
MARKOV	OBFUSCATE	–	HAVING	FUN	
•  Train	our	models	on	Taylor	SwiY	lyrics	
•  Train	a	Markov	Model	based	on	Taylor	SwiY	songs	
•  Play	the	generate	lyrics	through	fes5val	with	tones/beats	
learned	from	songs	
•  First	live	“Tylance	SwiY”	concert,	demo
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
WRAPPING	UP	
•  Any	problem	where	there	is	a	significant	amount	of	data	generated	could	
benefit	from	a	machine	learning	approach	
•  Lots	of	great	online	resource	to	help	anyone	get	started	
•  Having	labeled	or	annotated	data	makes	more	ML	approached	viable	
compared	to	unlabeled	data
Applied	Machine	Learning	Ÿ	Wolff	Ÿ	Wallace	Ÿ	Zhao		
QUESTIONS?	
•  Email:	machinelearning@cylance.com	
•  Stop	by	booth	#1124	
•  Career	opportuni5es:	h^ps://www.cylance.com/cylance-careers

More Related Content

Similar to Applied Machine learning for data exfiltration and other fun topics

Operationalizing Machine Learning at Scale at Starbucks
Operationalizing Machine Learning at Scale at StarbucksOperationalizing Machine Learning at Scale at Starbucks
Operationalizing Machine Learning at Scale at StarbucksDatabricks
 
Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference HighlightsCSAIsrael
 
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...Agile Infrastructure Automation Presentation to Wall Street Technology Associ...
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...Alex Henthorn-Iwane
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
Securing The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpSecuring The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpDevOps.com
 
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...Rockwell Automation
 
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson Studio
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson StudioIBM Meetup on November 1, 2018: Machine Learning made easy with Watson Studio
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson StudioSvetlana Levitan, PhD
 
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud EconomicsVMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud EconomicsStorage Switzerland
 
Practical Defense
Practical DefensePractical Defense
Practical DefenseSean Whalen
 
Self-Driving Data Center
Self-Driving Data CenterSelf-Driving Data Center
Self-Driving Data CenterSergey A. Razin
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnJohn Moran
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Analytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopAnalytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopCCG
 
Simplifying AI and Machine Learning with Watson Studio
Simplifying AI and Machine Learning with Watson StudioSimplifying AI and Machine Learning with Watson Studio
Simplifying AI and Machine Learning with Watson StudioDataWorks Summit
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Cm9 secure code_training_1day_input sanitization
Cm9 secure code_training_1day_input sanitizationCm9 secure code_training_1day_input sanitization
Cm9 secure code_training_1day_input sanitizationdcervigni
 
High time to add machine learning to your information security stack
High time to add machine learning to your information security stackHigh time to add machine learning to your information security stack
High time to add machine learning to your information security stackMinhaz A V
 

Similar to Applied Machine learning for data exfiltration and other fun topics (20)

OWASP
OWASPOWASP
OWASP
 
Operationalizing Machine Learning at Scale at Starbucks
Operationalizing Machine Learning at Scale at StarbucksOperationalizing Machine Learning at Scale at Starbucks
Operationalizing Machine Learning at Scale at Starbucks
 
Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference Highlights
 
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...Agile Infrastructure Automation Presentation to Wall Street Technology Associ...
Agile Infrastructure Automation Presentation to Wall Street Technology Associ...
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Securing The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom UpSecuring The Cloud: Top Down and Bottom Up
Securing The Cloud: Top Down and Bottom Up
 
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...
RA TechED 2019 - IN10 - What Machine Learning can do for you using FactoryTal...
 
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson Studio
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson StudioIBM Meetup on November 1, 2018: Machine Learning made easy with Watson Studio
IBM Meetup on November 1, 2018: Machine Learning made easy with Watson Studio
 
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud EconomicsVMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
 
Practical Defense
Practical DefensePractical Defense
Practical Defense
 
Self-Driving Data Center
Self-Driving Data CenterSelf-Driving Data Center
Self-Driving Data Center
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Analytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual WorkshopAnalytics in a Day Ft. Synapse Virtual Workshop
Analytics in a Day Ft. Synapse Virtual Workshop
 
Simplifying AI and Machine Learning with Watson Studio
Simplifying AI and Machine Learning with Watson StudioSimplifying AI and Machine Learning with Watson Studio
Simplifying AI and Machine Learning with Watson Studio
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Cm9 secure code_training_1day_input sanitization
Cm9 secure code_training_1day_input sanitizationCm9 secure code_training_1day_input sanitization
Cm9 secure code_training_1day_input sanitization
 
High time to add machine learning to your information security stack
High time to add machine learning to your information security stackHigh time to add machine learning to your information security stack
High time to add machine learning to your information security stack
 
Collab365 Empower-Your-Applications-With-Azure-Machine-Learning
Collab365 Empower-Your-Applications-With-Azure-Machine-LearningCollab365 Empower-Your-Applications-With-Azure-Machine-Learning
Collab365 Empower-Your-Applications-With-Azure-Machine-Learning
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Applied Machine learning for data exfiltration and other fun topics