SlideShare a Scribd company logo
*** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023
2 AI Meets 21st
C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023
AI Meets 21st
C Security: Trends & Scenarios!
(1) AI Fundamentals: Past & Present
a) 20thC Security was focused upon physical metaphors of secure perimeters modelled
upon medieval models of ancient castle moats & defensive high walls. Indeed the early
Cybersecurity from the 90s was also based upon Dual Firewalls & Malware Protection.
b) 21stC Security has evolved to metaphors based upon Networked Intelligence & the
emergence of Machine Learning, Neural Networks & Artificial Intelligence. These are
becoming embedded in practically ALL devices & security assets across ALL sectors. Whilst
20thC Security was focused upon Space with Defence @ Speed of Sound, 21stC Security is
focused upon Real-Time with Defence @ Speed of Light.
c) AI vs. Human “DNA” Intelligence: Human Intelligence based upon Genetic DNA “Software”
has evolved over Millions of Years. By comparison AI emerged around 80 years ago during
the midst of the WW2 (1943 – Neural Networks – McCulloch & Pitts). AI is potentially much
more powerful since it may be networked across multiple servers with massive
Tera/PetaByte Databases for Training, Adaptation & Learning. This has strong implications
for the deployment of AI within Security Applications during 5 to 10 years. AI may be
considered to have evolved at least 106
faster than physical “DNA” intelligence & recent
work on Chat GPT & GPT-4 demonstrate these developments @ Evolutionary “Light Speed”.
So we already see practical AI tools in multiple security applications which we briefly discuss
& summarise in the following sections.
(2) Current AI Security Trends: 2020s
a) Real-Time AI Behaviour Modelling: AI excels at Pattern Recognition & Analysis through
trained Deep Learning Networks. Such Learning Applications are already applied for
CyberSecurity Modelling of Enterprise Networks as well as Staff Movements & Behaviours in
Secure Offices & Industrial Premises. Indeed, we are likely to see such AI Mediated
Behavioural Movement being extended to other sectors such as Educational Campuses,
Business Parks & Smart Communities & Cities.
b) Intelligent Multi Media CCTV Surveillance: An early application of AI was integration into
CCTV Network Software for Movement Detection & Object Analysis. I predict that by 2025
more than 70% of CCTV Networks will be AI-Enabled, and by 2030 it will become a de-facto
specified requirement. Already in China such Intelligent CCTV Security Networks are widely
deployed across Smart Cities with populations exceeding 10Million Citizens.
c) Blockchain & Encryption: Blockchain & Encryption are close IT Cousins of AI & will often
be found working together in Business & Industrial Applications. Security requires secrecy &
anonymity in networked transactions whilst AI provides the intelligence catalyst for apps.
*** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023
3 AI Meets 21st
C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023
Finally Blockchain provides transparency & an open networked archive for all categories of
financial & related transactions which can be searched by AI Data Mining Applications for
potential fraud, corruption or misuse of business funds.
d) Privacy & Secure Data Analysis: A contemporary theme is personal privacy & data
security which may also be secured more effectively with Machine Learning & AI Tools.
e) Biometrics & Data Forensics: AI can ease the deployment of all forms of Biometrics from
Finger Prints, Retina & Iris Scans to 3D Facial Recognition. The most common AI Biometric &
Forensic Tool is Deep Learning using Neural Networks & Graphics Processors such as NVIDIA.
Once trained, such AI Applications can “instantly” recognise & classify such biometric data
for a range of applications from Law Enforcement to Access Control.
f) GPT – ChatBots: As a final AI Application I mention to latest developments in Intelligent
ChatBots, particularly the latest developed by OpenAI & featured as GPT-4 on Bing! The
GPT-4 launched in March 2023 and has impressive credentials across multiple sectors. I
experimented with GPT-4 and gave it the task of providing software for “Detecting
Movement in a Networked Security CCTV Environment”. Within seconds I was provided with
suitable code written in Python & C++ Languages together with summary documentation
regarding how the programming code worked. Clearly ChatBots that are specifically trained
further with Deep Plug-Ins will transform software coding & programming not only in the
Security Sector but for ALL AI Applications within the next 3 to 5 years.
(3) AI Security Opportunities: Sector by Sector
ALL Market Sectors will be impacted by AI Tools within the next 3 to 5 Years! Here we
briefly explore those of current interest relating to potential AI Security investments.
a) Industrial Safety – This sector has the greatest need of Intelligent Security due to the
massive installed base of legacy devices such as PLCs (Programmable Logic Controllers) and
SCADA/ICS (Supervisory & Industrial Control Systems. In addition, many industrial sites such
as oil refineries & manufacturing facilities cover extensive territories requiring in-depth
access security & perimeter management. AI Tools can be embedded in practically all
security assets including the industrial plan CCTV surveillance, PCS/SCADA/ICS, plant access,
perimeter management & behavioural movement of staff & contractors. AI can also be used
to track all the valuable & secure assets that could include nuclear fuel rods, military
hardware, radioactive & dangerous chemical materials, and other strategic goods. Finally
networks AI tools can provide real-time alerts relating to leakages, explosions & other
critical incidents that may arise in large industrial plants.
b) Life Sciences – The healthcare, medical & life sciences sector has already been the focus
of significant AI development during the last 10 years. Applications include the tracking of
pharmaceutical drugs (value chain from manufacture to dispensing), AI tools for Biologic
*** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023
4 AI Meets 21st
C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023
mRNA Vaccine development, real-time triage for A&E Admissions, and decision support
during complex surgery & analysis of 3D MRI/CAT/Optical Eye scans.
c) Business Services – There will be wide scope for the applications of AGI ChatBots (GPT-4)
to the provision of professional services such as Software Coding, Legal/Solicitors, and
professional consultancy in ALL spheres of business including financial services. Indeed, it is
referenced that the investment Bankers JP Morgan are already experimenting with
applications of ChatGPT in the provision of Wealth Management Services! With regard to
security, AI can provide real-time checks on professional credentials, advice &
recommendations. In addition AI will become embedded in Business Service Applications for
Office Security, Staff HR Processes & General Staff Management.
d) Data & Physical Storage: Data has become the primary resource for the “Information
Society” and Data Security is critical for Persons, Business & Government. AI Tools can
provide Protection against Data Theft, Misuse, Fake Data & Manipulation. The science of
encryption is developing rapidly into new fields that permit searching & analysing Data in
anonymously whilst preserving the Privacy of Personal Information. I have reviewed more
than 30 scientific papers during the last 2 years relating to this theme, and practically ALL
include some embedded AI Tool such as Deep Learning or Machine Learning Networks.
e) Cybersecurity – AI has been successfully applied to the Cybersecurity field now for more
than 10 years. Indeed, practically ALL leading Cybersecurity businesses are deploying
enterprise wide solutions that have embedded Intelligence. These include Neural Networks,
Behavioural Modelling, Zero Day Malware Alerts, Unsupervised Bayesian Machine Learning,
and Real-Time Ransom Ware Detection. The 1st
into this market was almost certainly the
Cambridge based Darktrace, but most other international competitors are now adopting
similar AI based tools.
f) Hardware Security – AI can provide management of massive networks of IoT devices
within Business, Industrial, Government Organisations as well as Smart Communities,
Campuses & Cities. This will include active IoT Tagging (such as Apple Airtags) as well as
tracking & management of ALL key assets with homes, cars, businesses & industry. Already
we see the emerging market for Smart Homes with intelligent remote management of
Heating Systems, Home CCTV, Lighting & Refrigerators. In fact there are already Home CCTV
Products with Embedded AI for Asset Identification & Movement Detection (Human or Pet
Animal), and soon it seems certain they will include 3D Facial Recognition.
(4) Future Speculative AI Scenarios:
a) 2030 – MetaVerse & Chatbots: By 2030 we will see GPT ChatBots in every profession
including Financial Services, Law, Education, Medical Care & Computer Programming. These
will provide a massive disruption to National & International Society and already companies
such as British Telecom are predicting the replacement of significant numbers of staff in
*** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023
5 AI Meets 21st
C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023
roles such as customer services being partially replaced by AI ChatBots! The Metaverse will
also develop extensively with support from AI Tools for Character/Avatars and the creation
of the fully immersible 4D Augmented Reality Environments.
b) 2050 – Dual Physical-Cyber Society: By 2050 we may expect Networked AI to have such
powerful tools for learning, adaptation & knowledge that we will move to a Dual Society of
Human “DNA” Life and Cyber “AI” Life. We do not expect the AIS to be “conscious” – yet(!) –
but there need to be extremely strong security rules, regulations and laws for the
preservation of Controls within our Human Culture, Business & Society.
c) 2075 – Emergence of “Pseudo Consciousness” : We mentioned earlier that AI is evolving
much faster than classic human “DNA” life due to the AI power of communication &
networking at the “Speed of Light”. Indeed – Cyber AI Tools will become the Masters of
Time & Light! Just as Humans have colonised & conquered Geographical “Space”, we can
conceive of AIS colonising Time & the Electro-Magnetic Spectrum from Gamma Rays,
through Light to Radio Waves & Beyond!
d) 2100 & Beyond – Intelligent “Cyber-Life” : We mentioned that AI was born around 80
years ago with the definition of Artificial Neural Networks in 1943 by McCulloch & Pitts.
Now if we look 80+ years into the 22nd
Century we may see the emergence of “Conscious
Cyber-AI Networked Life” it is not for sure this is even scientifically possible. However, as
humans we should mitigate against this risk and ensure that we embed over-riding security
controls into semi-autonomous AI systems to prevent the possibility CyberPandemic &
Extinction of Intelligent “DNA” Life!
5) Conclusions – AI will revolutionise both Security & Society during next 5 to 10 years, and
will dominate 21stC trends just as nuclear energy dominated 20thC Society. The end-point
of 2100+ is unpredictable but will surely result in AGI being a existential threat to humanity
unless security & control issues are fully addressed within next 10 to 20 years.
a) In the short term from now to 2030, we will see an explosion of AI Security Applications in
every market sector. This will grow at similar speed to the global colonisation of the Internet
& more recently Smart Phones. At present it is really too early to spot the market leaders
since most of the AI Security Unicorns in 2030 will be Private Start-Ups today. But during the
next 2 to 3 years we will see the green shoots emerging from those, such as maybe OPENAI,
that are set to drive the commercial markets & narrative of the next 10 to 20 years just as
GOOGLE led the Worldwide Internet & Search Marketplace from 1998 for the last 25 Years!
6) PostScript: This year is 50 Years since I started my PhD in “Stochastic Machine Learning”
@ Maths Dept, Cambridge Uni, UK - http://www.valentina.net/vaza/CyberDocs/Thesis.pdf .
It is amazing how AI has finally bloomed after the 70s “AI Winter”, the slow emergence of
“Expert Systems” in 80s & “Advanced Neural Nets” in the 90s with maturity & commercial
applications in the 21st
C ! It has been a privilege to have witnessed 50 years of AI Evolution!

More Related Content

Similar to AI Meets 21stC Security: Trends & Scenarios!

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
Anastasiia Konoplova
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoT
Mr Risman
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
Takayuki Yamazaki
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
ijtsrd
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Martin Ruubel
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIML
VijaySharma802
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
Smarter.World
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
Deva Johnson
 
Applications of Iot.pptx
Applications of Iot.pptxApplications of Iot.pptx
Applications of Iot.pptx
Dhruv Kamal
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
Δρ. Γιώργος K. Κασάπης
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
XDuce Corporation
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
SameerShaik43
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
IoT Tunisia
 

Similar to AI Meets 21stC Security: Trends & Scenarios! (20)

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoT
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIML
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
Applications of Iot.pptx
Applications of Iot.pptxApplications of Iot.pptx
Applications of Iot.pptx
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
 

More from Dr David Probert

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
Dr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
Dr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Dr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Dr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
Dr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
Dr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
Dr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
Dr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
Dr David Probert
 

More from Dr David Probert (20)

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

AI Meets 21stC Security: Trends & Scenarios!

  • 1.
  • 2. *** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023 2 AI Meets 21st C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023 AI Meets 21st C Security: Trends & Scenarios! (1) AI Fundamentals: Past & Present a) 20thC Security was focused upon physical metaphors of secure perimeters modelled upon medieval models of ancient castle moats & defensive high walls. Indeed the early Cybersecurity from the 90s was also based upon Dual Firewalls & Malware Protection. b) 21stC Security has evolved to metaphors based upon Networked Intelligence & the emergence of Machine Learning, Neural Networks & Artificial Intelligence. These are becoming embedded in practically ALL devices & security assets across ALL sectors. Whilst 20thC Security was focused upon Space with Defence @ Speed of Sound, 21stC Security is focused upon Real-Time with Defence @ Speed of Light. c) AI vs. Human “DNA” Intelligence: Human Intelligence based upon Genetic DNA “Software” has evolved over Millions of Years. By comparison AI emerged around 80 years ago during the midst of the WW2 (1943 – Neural Networks – McCulloch & Pitts). AI is potentially much more powerful since it may be networked across multiple servers with massive Tera/PetaByte Databases for Training, Adaptation & Learning. This has strong implications for the deployment of AI within Security Applications during 5 to 10 years. AI may be considered to have evolved at least 106 faster than physical “DNA” intelligence & recent work on Chat GPT & GPT-4 demonstrate these developments @ Evolutionary “Light Speed”. So we already see practical AI tools in multiple security applications which we briefly discuss & summarise in the following sections. (2) Current AI Security Trends: 2020s a) Real-Time AI Behaviour Modelling: AI excels at Pattern Recognition & Analysis through trained Deep Learning Networks. Such Learning Applications are already applied for CyberSecurity Modelling of Enterprise Networks as well as Staff Movements & Behaviours in Secure Offices & Industrial Premises. Indeed, we are likely to see such AI Mediated Behavioural Movement being extended to other sectors such as Educational Campuses, Business Parks & Smart Communities & Cities. b) Intelligent Multi Media CCTV Surveillance: An early application of AI was integration into CCTV Network Software for Movement Detection & Object Analysis. I predict that by 2025 more than 70% of CCTV Networks will be AI-Enabled, and by 2030 it will become a de-facto specified requirement. Already in China such Intelligent CCTV Security Networks are widely deployed across Smart Cities with populations exceeding 10Million Citizens. c) Blockchain & Encryption: Blockchain & Encryption are close IT Cousins of AI & will often be found working together in Business & Industrial Applications. Security requires secrecy & anonymity in networked transactions whilst AI provides the intelligence catalyst for apps.
  • 3. *** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023 3 AI Meets 21st C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023 Finally Blockchain provides transparency & an open networked archive for all categories of financial & related transactions which can be searched by AI Data Mining Applications for potential fraud, corruption or misuse of business funds. d) Privacy & Secure Data Analysis: A contemporary theme is personal privacy & data security which may also be secured more effectively with Machine Learning & AI Tools. e) Biometrics & Data Forensics: AI can ease the deployment of all forms of Biometrics from Finger Prints, Retina & Iris Scans to 3D Facial Recognition. The most common AI Biometric & Forensic Tool is Deep Learning using Neural Networks & Graphics Processors such as NVIDIA. Once trained, such AI Applications can “instantly” recognise & classify such biometric data for a range of applications from Law Enforcement to Access Control. f) GPT – ChatBots: As a final AI Application I mention to latest developments in Intelligent ChatBots, particularly the latest developed by OpenAI & featured as GPT-4 on Bing! The GPT-4 launched in March 2023 and has impressive credentials across multiple sectors. I experimented with GPT-4 and gave it the task of providing software for “Detecting Movement in a Networked Security CCTV Environment”. Within seconds I was provided with suitable code written in Python & C++ Languages together with summary documentation regarding how the programming code worked. Clearly ChatBots that are specifically trained further with Deep Plug-Ins will transform software coding & programming not only in the Security Sector but for ALL AI Applications within the next 3 to 5 years. (3) AI Security Opportunities: Sector by Sector ALL Market Sectors will be impacted by AI Tools within the next 3 to 5 Years! Here we briefly explore those of current interest relating to potential AI Security investments. a) Industrial Safety – This sector has the greatest need of Intelligent Security due to the massive installed base of legacy devices such as PLCs (Programmable Logic Controllers) and SCADA/ICS (Supervisory & Industrial Control Systems. In addition, many industrial sites such as oil refineries & manufacturing facilities cover extensive territories requiring in-depth access security & perimeter management. AI Tools can be embedded in practically all security assets including the industrial plan CCTV surveillance, PCS/SCADA/ICS, plant access, perimeter management & behavioural movement of staff & contractors. AI can also be used to track all the valuable & secure assets that could include nuclear fuel rods, military hardware, radioactive & dangerous chemical materials, and other strategic goods. Finally networks AI tools can provide real-time alerts relating to leakages, explosions & other critical incidents that may arise in large industrial plants. b) Life Sciences – The healthcare, medical & life sciences sector has already been the focus of significant AI development during the last 10 years. Applications include the tracking of pharmaceutical drugs (value chain from manufacture to dispensing), AI tools for Biologic
  • 4. *** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023 4 AI Meets 21st C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023 mRNA Vaccine development, real-time triage for A&E Admissions, and decision support during complex surgery & analysis of 3D MRI/CAT/Optical Eye scans. c) Business Services – There will be wide scope for the applications of AGI ChatBots (GPT-4) to the provision of professional services such as Software Coding, Legal/Solicitors, and professional consultancy in ALL spheres of business including financial services. Indeed, it is referenced that the investment Bankers JP Morgan are already experimenting with applications of ChatGPT in the provision of Wealth Management Services! With regard to security, AI can provide real-time checks on professional credentials, advice & recommendations. In addition AI will become embedded in Business Service Applications for Office Security, Staff HR Processes & General Staff Management. d) Data & Physical Storage: Data has become the primary resource for the “Information Society” and Data Security is critical for Persons, Business & Government. AI Tools can provide Protection against Data Theft, Misuse, Fake Data & Manipulation. The science of encryption is developing rapidly into new fields that permit searching & analysing Data in anonymously whilst preserving the Privacy of Personal Information. I have reviewed more than 30 scientific papers during the last 2 years relating to this theme, and practically ALL include some embedded AI Tool such as Deep Learning or Machine Learning Networks. e) Cybersecurity – AI has been successfully applied to the Cybersecurity field now for more than 10 years. Indeed, practically ALL leading Cybersecurity businesses are deploying enterprise wide solutions that have embedded Intelligence. These include Neural Networks, Behavioural Modelling, Zero Day Malware Alerts, Unsupervised Bayesian Machine Learning, and Real-Time Ransom Ware Detection. The 1st into this market was almost certainly the Cambridge based Darktrace, but most other international competitors are now adopting similar AI based tools. f) Hardware Security – AI can provide management of massive networks of IoT devices within Business, Industrial, Government Organisations as well as Smart Communities, Campuses & Cities. This will include active IoT Tagging (such as Apple Airtags) as well as tracking & management of ALL key assets with homes, cars, businesses & industry. Already we see the emerging market for Smart Homes with intelligent remote management of Heating Systems, Home CCTV, Lighting & Refrigerators. In fact there are already Home CCTV Products with Embedded AI for Asset Identification & Movement Detection (Human or Pet Animal), and soon it seems certain they will include 3D Facial Recognition. (4) Future Speculative AI Scenarios: a) 2030 – MetaVerse & Chatbots: By 2030 we will see GPT ChatBots in every profession including Financial Services, Law, Education, Medical Care & Computer Programming. These will provide a massive disruption to National & International Society and already companies such as British Telecom are predicting the replacement of significant numbers of staff in
  • 5. *** AI MEETS 21STC SECURITY: TRENDS & SCENARIOS! * May 19, 2023 5 AI Meets 21st C Security: Trends & Scenarios – Dr David Probert – www.VAZA.com – May 2023 roles such as customer services being partially replaced by AI ChatBots! The Metaverse will also develop extensively with support from AI Tools for Character/Avatars and the creation of the fully immersible 4D Augmented Reality Environments. b) 2050 – Dual Physical-Cyber Society: By 2050 we may expect Networked AI to have such powerful tools for learning, adaptation & knowledge that we will move to a Dual Society of Human “DNA” Life and Cyber “AI” Life. We do not expect the AIS to be “conscious” – yet(!) – but there need to be extremely strong security rules, regulations and laws for the preservation of Controls within our Human Culture, Business & Society. c) 2075 – Emergence of “Pseudo Consciousness” : We mentioned earlier that AI is evolving much faster than classic human “DNA” life due to the AI power of communication & networking at the “Speed of Light”. Indeed – Cyber AI Tools will become the Masters of Time & Light! Just as Humans have colonised & conquered Geographical “Space”, we can conceive of AIS colonising Time & the Electro-Magnetic Spectrum from Gamma Rays, through Light to Radio Waves & Beyond! d) 2100 & Beyond – Intelligent “Cyber-Life” : We mentioned that AI was born around 80 years ago with the definition of Artificial Neural Networks in 1943 by McCulloch & Pitts. Now if we look 80+ years into the 22nd Century we may see the emergence of “Conscious Cyber-AI Networked Life” it is not for sure this is even scientifically possible. However, as humans we should mitigate against this risk and ensure that we embed over-riding security controls into semi-autonomous AI systems to prevent the possibility CyberPandemic & Extinction of Intelligent “DNA” Life! 5) Conclusions – AI will revolutionise both Security & Society during next 5 to 10 years, and will dominate 21stC trends just as nuclear energy dominated 20thC Society. The end-point of 2100+ is unpredictable but will surely result in AGI being a existential threat to humanity unless security & control issues are fully addressed within next 10 to 20 years. a) In the short term from now to 2030, we will see an explosion of AI Security Applications in every market sector. This will grow at similar speed to the global colonisation of the Internet & more recently Smart Phones. At present it is really too early to spot the market leaders since most of the AI Security Unicorns in 2030 will be Private Start-Ups today. But during the next 2 to 3 years we will see the green shoots emerging from those, such as maybe OPENAI, that are set to drive the commercial markets & narrative of the next 10 to 20 years just as GOOGLE led the Worldwide Internet & Search Marketplace from 1998 for the last 25 Years! 6) PostScript: This year is 50 Years since I started my PhD in “Stochastic Machine Learning” @ Maths Dept, Cambridge Uni, UK - http://www.valentina.net/vaza/CyberDocs/Thesis.pdf . It is amazing how AI has finally bloomed after the 70s “AI Winter”, the slow emergence of “Expert Systems” in 80s & “Advanced Neural Nets” in the 90s with maturity & commercial applications in the 21st C ! It has been a privilege to have witnessed 50 years of AI Evolution!