The advent of AI is revolutionizing both the world and cybersecurity, yet significant challenges remain. The Cyber Express has consulted with leading industry experts to uncover insights that will illuminate the AI transformation.
The latest issue of The Cyber Express explores the role of AI in securing digital assets, followed by its benefits and challenges. Stay ahead on this important topic and don’t miss out on valuable insights. https://thecyberexpress.com/
The advent of AI is revolutionizing both the world and cybersecurity, yet significant challenges remain. The Cyber Express has consulted with leading industry experts to uncover insights that will illuminate the AI transformation.
The latest issue of The Cyber Express explores the role of AI in securing digital assets, followed by its benefits and challenges. Stay ahead on this important topic and don’t miss out on valuable insights. https://thecyberexpress.com/
3.
ISSUE 02 TheCyberExpress
4
Contents
34
Artificial Intelligence and
The Top 6 Business Risks
CYBERVILLE
20
Biometric security
will be vital in a
postquantum future
FORESIGHT
10
Voice Networks are Under
Attack – is Anybody
Listening?
DIGEST
14
Behavioral Psychology,
A Boon For Insider Risk
Mitigation
INSIDER
7
FROM THE EDITOR
Past and Future in the
same frame
4.
ISSUE 02
TheCyberExpress 5
46
56
74
80
Using AI to Fight Human
Trafficking and Modern
Slavery… Can We Win?
Artificial Intelligence, Genuine
Training: Can Ai Help In
Learning Cybersecurity?
AI Arms Race: Hackers vs
Cybersecurity Professional, a
Battle for Digital Dominance
The Monthly Round-Up
THE COVER
ACADEMIA
BOTTOM LINE
NUGGETS
24
REGISTER
Risk Management Is
Nothing But Decision
Management
62 68
HOT SEAT SCOOP
How Secure Is Your
Connected Vehicle?
Quantum Cybersecurity
will Revolutionize the
Industry
5.
ISSUE 02 TheCyberExpress
6
Augustin Kurian
Editor-in-Chief
editor@thecyberexpress.com
Chandu Gopalakrishnan
Executive Editor
chandu@thecyberexpress.com
Avantika Chopra
Senior Sub-Editor
avantika@thecyberexpress.com
Vishwa Pandagle
Journalist
vishwa@thecyberexpress.com
Ashish Khaitan
Journalist
ashish@thecyberexpress.com
Vittal Chowdry
Senior Graphic Designer
vittal@thecyberexpress.com
Rajashakher Intha
Head - Marketing & Sales
raj@thecyberexpress.com
Mir Ali
Head - Partnerships
mir@thecyberexpress.com
Taruna Bose
Head - Digital Sales
taruna@thecyberexpress.com
Ashish Jaiswal
Conference Manager
ashish.j@thecyberexpress.com
Priti Chaubey
Content Strategist
priti.c@thecyberexpress.com
Ravi Gupta
SEO Analyst
ravi@thecyberexpress.com
Editorial Management
STAFF
*Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC.,
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher.
Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The
ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers
in writing.
Image credits: Shutterstock & Freepik
6.
ISSUE 02
TheCyberExpress 7
From The
Editor’s DESK
Artificial Intelligence: The
Bridge Between Utopia and
Dystopia
Myths, stories, and Greek
antiquities.
It was believed that
Hephaestus, the Greek god
of metallurgy, created and
programmed a giant bronze
warrior named Talos to protect
Crete. Talos is said to be a
futuristic cybernetic creature
that can think and feel.
It was believed that
Hephaestus created the
creature as part of his project,
which involved combining
neurological-computer
interfaces and living and non-
living components into one
massive being. The mythology
surrounding the creation of
the warrior is also said to be
the first example of people
thinking about the potential of
AI and intelligent robots.
Cut to the present, AI is all
around us, and data and
algorithms have become more
important to our lives than we
can fathom. And this is just the
beginning.
AI has the potential to
transform the way we interact
with the world around us. It
can assist us in performing
specific tasks based on its
capabilities and improve our
lives in several ways. But that’s
not all. The benefits of using
AI in the field of cybersecurity
are numerous. It can help
prevent and detect threats
before they occur, improving
the organisation’s efficiency.
However, the increasing use
of AI in the cybersecurity
industry has raised concerns
about the potential impact on
several vectors. In this edition,
we discuss AI and The Top 6
Business Risks in detail.
The Cover of the magazine
talks about something even
more grave and how AI can
become a tool for fixing a dire
problem. We highlight ways
of integrating data fusion and
AI tools, which can, in turn,
play a key role in fighting
and drastically reducing the
exponentially high number of
people forced into modern
slavery.
On the better side, we
talk about leveraging AI in
cybersecurity education. We
believe artificial Intelligence
can make complex terms and
topics relatively simpler, but
there is still a long way to go.
In our interviews, we have
Chuck Brooks, President
of Brooks Consulting
International, discussing how
AI and ML are disrupting
the cybersecurity space. We
also have Ash Hunt, Global
Chief Information Security
Officer (CISO) at the Apex
Group, discussing the risk
quantification, metrics, and
testing risk scenarios for
staying better prepared in
cyber risk management.
Connected devices come
with much data, and the vast
collection of highly sensitive
data in connected vehicles
necessitates an entirely new
level of security – especially
against ransomware, cyber
war, and other cyberattacks
that exploit software and
hardware flaws. The issue also
talks about the security of
connected vehicles.
Let us know what you liked
the best in this issue. Reach
out to us with your valuable
feedback at editorial@
thecyberexpress.com.
Editor-in-Chief
Augustin Kurian
9.
ISSUE 02 TheCyberExpress
10
Voice Networks
are Under Attack –
is Anybody
Listening?
- By Brian McDonald
Security Officer, Mutare, Inc.
Who would have guessed that, in 2022, the humble phone
would become a favorite weapon for cybercriminals intent
on infiltrating high-profile organizations in order to disrupt
operations, embed ransomware, advance extortion
schemes, and steal customer data?
Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite
the technological sophistication of their own offerings,
all fell victim to damaging data breaches perpetrated by
criminal agents whose point of entry was through a simple
phone call. This emerging threat vector has come to be
known as “voice phishing” or simply, vishing.
Obviously, there is nothing new about scam calls. However,
voice phishing has steadily evolved into a criminal art form.
DIGEST
11.
ISSUE 02 TheCyberExpress
12
Most commonly, the attack is perpetrated by an
adversary, either working alone or as part of an organized
cybercriminal gang, who first seeks out vulnerable human
targets through data mining and reconnaissance calling.
Once a connection is made, the impostor gains trust
through psychological manipulation (social engineering)
in order to extract protected information or account
login credentials. Sometimes the call comes on the
heels of a related email notification or text message.
Other times an email or text may include a call-back
number that connects the victim to a call center manned
by co-conspirator agents trained in social engineering
techniques. In all cases, the goal is the same: to lower the
resistance of the victim through the power of the human
voice connection.
Employees, unlike consumers, cannot simply ignore calls
from unknown sources, which makes them particularly
vulnerable to socially engineered manipulation. In fact,
a recent study showed that more than 37% of vishing
attempts actually would succeed at extracting the
desired action from unsuspecting human targets. When
combined with a phishing email (hybrid phishing/vishing),
the success rate rose to 75%.
2022 saw a startling 550% rise in reported enterprise
vishing attacks that affected a reported 70% of all
organizations, with several factors fueling this sharp
acceleration.
First, impostors have broadened their access to the
tools of deception thanks to digitalized public sources,
unprotected social media accounts, and the vast
repository of stolen information found on the Dark Web.
Some may add deep fake voice manipulation technology
to further their deceit. And, while the transition from
analog calling to Voice over Internet Protocol (VoIP)
over the past decade has enabled high quality, low
cost, global voice communications and collaboration, it
has also super-charged the ability of nefarious criminal
agents, using auto-dialers, pre-recorded messages,
caller ID spoofing, generous VoIP bandwidth and cheap,
untraceable overseas call centers, to reach thousands of
intended victims with little effort, expenditure, or risk.
DIGEST
TO READ THE FULL ISSUE
It appears that you have an ad-blocker running. By whitelisting SlideShare on your ad-blocker, you are supporting our community of content creators.
Hate ads?
We've updated our privacy policy.
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.