SlideShare a Scribd company logo
1 of 20
Download to read offline
AI VS
MALWARE
MARCO ZONTA
LA NUOVA GENERAZIONE DELLA SICUREZZA DIFENSIVA
SECURITY SUMMIT 2017
45 ANNI DI GUARDIE E LADRI...
TIMELINE 
1971 
1986
1992
2006
2010
dark avenger
EYEPYRAMID
I CATTIVI OGGI?
152,500,000
305,000,000
457,500,000
610,000,000
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
0
COSA DICONO?
La maggior parte dei vendor di sicurezza non analizzano
continuamente schemi di attacco non comprendendo in maniera
adeguata il panorama delle minacce dinamiche.
INTELLIGENZA /
ARTIFICIALE 
Se vuoi proteggere la tua organizzazione devi :
conoscere il tuo nemico
conoscere il tuo ambiente interno ed esterno
e Personalizzare le tue difese per compensare entrambi.
are you /
normal?   
DATA CHALLENGE
+10M
SANDBOX SUGLI ENPOINTS
VIRTUALIZZAZIONE
SANDBOX SUGLI ENPOINTS
SCENARIO DI ATTACCO
STAGE1
SFRUTTARE LA BRECCIA DEL NETWORK
STAGE2
ATTACCARE L'ADMIN
STAGE3
MOVIMENTO LATERALE
STAGE4
PERSISTENCE & EXFILTRATION
STAGE5
RISULTATO
“E' IMPOSSIBILE
RESISTERE AD UNA
IDEA QUANDO IL SUO
TEMPO E' GIUNTO”.
— VICTOR HUGO
GRAZIE!MARCO.ZONTA@CYTRIX.NET

More Related Content

Viewers also liked

ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانيا
ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانياﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانيا
ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانياجمعية النجاة الخيرية
 
Sistemas tecnologicos paulagrisales
Sistemas tecnologicos paulagrisalesSistemas tecnologicos paulagrisales
Sistemas tecnologicos paulagrisalespaugrissmj
 
Civil War in Russia
Civil War in RussiaCivil War in Russia
Civil War in RussiaRCB78
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approachSandeep Sabnani
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityAI Frontiers
 
An elephant in the learning analytics room – the obligation to act
An elephant in the learning analytics room –  the obligation to actAn elephant in the learning analytics room –  the obligation to act
An elephant in the learning analytics room – the obligation to actUniversity of South Africa (Unisa)
 

Viewers also liked (14)

ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانيا
ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانياﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانيا
ﺗﺮﻣﻴﻢ ﺑﻴﻮت اﻷﻳﺘﺎم واﻷراﻣﻞ في البانيا
 
портфоліо
портфоліопортфоліо
портфоліо
 
Sistemas tecnologicos paulagrisales
Sistemas tecnologicos paulagrisalesSistemas tecnologicos paulagrisales
Sistemas tecnologicos paulagrisales
 
Tarea seminario 3
Tarea seminario 3Tarea seminario 3
Tarea seminario 3
 
Civil War in Russia
Civil War in RussiaCivil War in Russia
Civil War in Russia
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approach
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Localização e fuso horário
Localização e fuso horárioLocalização e fuso horário
Localização e fuso horário
 
Testing IBM AI
Testing IBM AITesting IBM AI
Testing IBM AI
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
 
An elephant in the learning analytics room – the obligation to act
An elephant in the learning analytics room –  the obligation to actAn elephant in the learning analytics room –  the obligation to act
An elephant in the learning analytics room – the obligation to act
 
план конспект (Admin)
план конспект (Admin)план конспект (Admin)
план конспект (Admin)
 

AI vs MALWARE - La nuova generazione della sicurezza difensiva