SlideShare a Scribd company logo
Combating
Cybersecurity
Threats with AI and Machine Learning
Col Inderjeet Singh
CIO , Vara United Ltd
"The development of full artificial intelligence could
spell the end of the human race.” - Stephen Hawking,
theoretical physicist, cosmologist, author
“I don’t understand why some people are not
concerned” – Bill Gates, co-founder of Microsoft
Kalashnikovs of tomorrow
Man or Machine? Advanced Behavioral Attacks
Imagine a business email
compromise attack
you get an email to wire payment for an
invoice from the CFO
The email is written from your CFO
natural language processing from emails
You’re suspicious and call the CFO
But your phone is compromised
You’re connected to adversary who has
a speechbot with your CFO’s Voice
Science fiction or possible today?
https://www.youtube.com/watch?v=Nu-nlQqFCKg
Microsoft Real-Time Translation (2012)
1950s – 2000s
AI & ML
core developments
multi-industry
before
Is AI/ML New? No*
2006
deep learning
Netflix Prize
2014 2016 2018
ensembling
decision trees
CAML
deep learning
(mobile)
AI services
ImageNet
after
2008 2009 2012
Fourth Industrial Revolution
AI is contributing to a the transformation of society at a rate
that is 10 times faster and at 300 times the scale, with an
estimated impact that is 3000 times of the 1st Industrial
Revolution.
- McKinsey Global Institute
Robotic Process Automation Machine Learning Algorithms
Artificial Intelligence
Applications of Artificial Intelligence
Healthcare
Military
Cyber Security
Finance
Accounting & Law
Surgical System Prosthetic Limbs
Space Program All-in-one Floor Cleaner
Your Digital Secretary
Walk Like a Man
Self-driving cars
The AI and ML Revolution is Here
AI and ML Demystified / @carologic / MWUX2017
Decision Making: Self Driving (autonomous) vehicles
Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University
24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands-
free_Driving.jpg
DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
The AI and ML Revolution is Here
AI-generated art
L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style
https://arxiv.org/pdf/1508.06576v1.pdf
The AI and ML Revolution is Here
Computational perception – face recognition (and speech, text, social, video, etc.)
https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face-
verification.pdf
The AI and ML Revolution is Here
#RSAC
The Current Cyber Landscape Favors
Malicious Actors
SEC reveals it was hacked, information may have
been used for illegal stock trades
in October or November 2016, but wasn’t discovered
by the firm until March 2017
The Cost of Cyber Security Operations
Continues to Increase without Mitigating Risk
Anthem: Hacked Database Included 78.8 Million People
”Big Four” accounting firm Deloitte was likely breached
Global information solutions company, Equifax, has reported a major
cybersecurity incident affecting 143 million consumers in the US.
Most cybersecurity Attacks today are automated, from
AI-powered Distributed Denial of Service (DDOS)
attacks to phishing scams and ransomware.
You Can’t Afford To Stay Stagnant:
• In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to
be worth more than $150 billion.
• Global cybersecurity spending will exceed $1 trillion from 2017 to 2021
• The cybersecurity market grew by roughly 35 X over 13 years.
• We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the
8-10 % projected over the next five years.
The Increased Threat Landscape
• $1 billion: Cost of ransomware attacks alone last year
• $158: Average global cost of data breach per lost or stolen record
• 25% of large organizations experience recurring incidents
• 229 days: the average time to identify a malicious attack
Cylance,Inc.Confidential
The Future of Security
Past Present Future
AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE
SPOND
Pre-Execution
Humans Needed
Post-Execution
Pre-Execution
No Humans
Threat actors could also employ AI tools to discover new vulnerabilities and design
exploits and other attacks, in a fraction of the time it's taking them now.
AI could be used as an effective tool to help them decide what, who and when to
attack.
Looking into the heart of AI’s Dark Secret
What’s inside the box?
Algorithmic regulation –
where and how?
Are we willing to let
machines make decisions
we don’t understand?
Self modifying algorithms
– who to interrogate?
#RSAC
AI fighting
Cybercrime
Applications of AI in Cyber Security
• Intrusion detection
• Examples
– Malicious JavaScript and other scripts
– Malicious Non-Executable Files
– Malicious Executable Files
• Inappropriate Web and Email Content
• Phishing
– Derive probabilistic models of phishing attacks
– Derive probabilistic reputation models for URLs
• Make Security Simple
• AI not only improves efficacy, it also changes the deployment
model and makes cybersecurity implementation and operation
a seamless, smooth process.
• Because of the advanced features of ML, you no longer employ
traditional AV technology and tactics, including:
• Incremental storage
• Scanning machines
• Re-imaging machines
• You can remove large endpoint agents that create performance
friction for enterprise users.
AI Changes the Deployment Game
• Use minimal system resources (1-2% CPU usage and 40-
50 MB of memory)
• Prevent attacks with superior speed (in milliseconds)
• Replace ineffective traditional AV tools (or augment
existing security)
• Achieve efficacy rates of greater than 99% (compared to
50-60% with antiquated signature-based AV)
AI and Machine Learning Helps You:
AI / ML Adoption
Benefits
Automated protection
Faster response and protection
Personalization
Learn to adapt to me, unobtrusively
Usability
Drivers
Scaling and velocity
Humans are slow
Humans are
expensive Data
growth
Automation
Threats evolve. Do you?
Sophistication
Complex threats
360-degree protection
Firewalls talking to email servers
and endpoints
Doing AI & ML (Correctly) is Hard!
FEATURES / DIMENSIONS
• Static attributes
• Dynamic behaviors
• Reputation
• Relations
• Sequential state
ADVANCED TECHNIQUES
• Ensembling
• Boosting
• Sequential Learning
• Deep Learning
• Automation at Scale
BOUNTIFUL DATA
• 9 Trillion rows of security data
• 4.5B queries processed daily from 175M
endpoint devices
• 2B emails scanned daily
• 1B previously unseen web requests
scanned daily
• Outputs from other systems & products
LEADING EXPERTS
• Dedicated org of recognized
machine learning experts
• Experts-attack
investigation team
• Centuries of combined ML
experience
The Future of AI & ML in Cybersecurity
now
Superpowers for analysts
hunting for targeted spearphishing attacks 100x
faster
Threat detection systems that learn to
learn Real-time conversation monitoring
for
social engineering, cyberbullying, fake news,
help,
etc.
future
Predictive Protection
AI / ML that anticipates attacks and automatically reconfigures for
protection.
The Future of AI & ML in Cybersecurity
Fighting an existential threat?
Reach me on Social Media:
Facebook: Technology Evangeist Twitter Handle: @InderBarara
LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/
Email me at: inderjit.barara@gmail.com
Thanx

More Related Content

What's hot

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
AI in security
AI in securityAI in security
AI in security
Subrat Panda, PhD
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
scoopnewsgroup
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
Rishi Kant
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
Faction XYZ
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
Infosec
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
SmartlearningUK
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 

What's hot (20)

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
AI in security
AI in securityAI in security
AI in security
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 

Similar to Combating Cyber Security Using Artificial Intelligence

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
Eoin Keary
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
Bill Gibbs
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
SiskaFitrianingrum
 
#AI: In Whose Image?
#AI: In Whose Image?#AI: In Whose Image?
#AI: In Whose Image?
George Tilesch
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
DATA SECURITY SOLUTIONS
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3
Stefan Streichsbier
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
tlcj97
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey4
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
Andris Soroka
 

Similar to Combating Cyber Security Using Artificial Intelligence (20)

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
#AI: In Whose Image?
#AI: In Whose Image?#AI: In Whose Image?
#AI: In Whose Image?
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 

More from Inderjeet Singh

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Inderjeet Singh
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
Inderjeet Singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
Inderjeet Singh
 

More from Inderjeet Singh (7)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Combating Cyber Security Using Artificial Intelligence

  • 1. Combating Cybersecurity Threats with AI and Machine Learning Col Inderjeet Singh CIO , Vara United Ltd
  • 2. "The development of full artificial intelligence could spell the end of the human race.” - Stephen Hawking, theoretical physicist, cosmologist, author “I don’t understand why some people are not concerned” – Bill Gates, co-founder of Microsoft
  • 4. Man or Machine? Advanced Behavioral Attacks Imagine a business email compromise attack you get an email to wire payment for an invoice from the CFO The email is written from your CFO natural language processing from emails You’re suspicious and call the CFO But your phone is compromised You’re connected to adversary who has a speechbot with your CFO’s Voice Science fiction or possible today? https://www.youtube.com/watch?v=Nu-nlQqFCKg Microsoft Real-Time Translation (2012)
  • 5. 1950s – 2000s AI & ML core developments multi-industry before Is AI/ML New? No* 2006 deep learning Netflix Prize 2014 2016 2018 ensembling decision trees CAML deep learning (mobile) AI services ImageNet after 2008 2009 2012
  • 6. Fourth Industrial Revolution AI is contributing to a the transformation of society at a rate that is 10 times faster and at 300 times the scale, with an estimated impact that is 3000 times of the 1st Industrial Revolution. - McKinsey Global Institute
  • 7. Robotic Process Automation Machine Learning Algorithms Artificial Intelligence
  • 8. Applications of Artificial Intelligence Healthcare Military Cyber Security Finance Accounting & Law
  • 9. Surgical System Prosthetic Limbs Space Program All-in-one Floor Cleaner Your Digital Secretary Walk Like a Man
  • 10. Self-driving cars The AI and ML Revolution is Here
  • 11. AI and ML Demystified / @carologic / MWUX2017 Decision Making: Self Driving (autonomous) vehicles Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University 24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands- free_Driving.jpg DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
  • 12. The AI and ML Revolution is Here
  • 13. AI-generated art L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style https://arxiv.org/pdf/1508.06576v1.pdf The AI and ML Revolution is Here
  • 14. Computational perception – face recognition (and speech, text, social, video, etc.) https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face- verification.pdf The AI and ML Revolution is Here
  • 15. #RSAC The Current Cyber Landscape Favors Malicious Actors SEC reveals it was hacked, information may have been used for illegal stock trades in October or November 2016, but wasn’t discovered by the firm until March 2017 The Cost of Cyber Security Operations Continues to Increase without Mitigating Risk Anthem: Hacked Database Included 78.8 Million People ”Big Four” accounting firm Deloitte was likely breached Global information solutions company, Equifax, has reported a major cybersecurity incident affecting 143 million consumers in the US. Most cybersecurity Attacks today are automated, from AI-powered Distributed Denial of Service (DDOS) attacks to phishing scams and ransomware.
  • 16. You Can’t Afford To Stay Stagnant: • In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to be worth more than $150 billion. • Global cybersecurity spending will exceed $1 trillion from 2017 to 2021 • The cybersecurity market grew by roughly 35 X over 13 years. • We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the 8-10 % projected over the next five years. The Increased Threat Landscape • $1 billion: Cost of ransomware attacks alone last year • $158: Average global cost of data breach per lost or stolen record • 25% of large organizations experience recurring incidents • 229 days: the average time to identify a malicious attack
  • 17. Cylance,Inc.Confidential The Future of Security Past Present Future AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE SPOND Pre-Execution Humans Needed Post-Execution Pre-Execution No Humans Threat actors could also employ AI tools to discover new vulnerabilities and design exploits and other attacks, in a fraction of the time it's taking them now. AI could be used as an effective tool to help them decide what, who and when to attack.
  • 18. Looking into the heart of AI’s Dark Secret What’s inside the box? Algorithmic regulation – where and how? Are we willing to let machines make decisions we don’t understand? Self modifying algorithms – who to interrogate?
  • 20. Applications of AI in Cyber Security • Intrusion detection • Examples – Malicious JavaScript and other scripts – Malicious Non-Executable Files – Malicious Executable Files • Inappropriate Web and Email Content • Phishing – Derive probabilistic models of phishing attacks – Derive probabilistic reputation models for URLs
  • 21. • Make Security Simple • AI not only improves efficacy, it also changes the deployment model and makes cybersecurity implementation and operation a seamless, smooth process. • Because of the advanced features of ML, you no longer employ traditional AV technology and tactics, including: • Incremental storage • Scanning machines • Re-imaging machines • You can remove large endpoint agents that create performance friction for enterprise users. AI Changes the Deployment Game
  • 22. • Use minimal system resources (1-2% CPU usage and 40- 50 MB of memory) • Prevent attacks with superior speed (in milliseconds) • Replace ineffective traditional AV tools (or augment existing security) • Achieve efficacy rates of greater than 99% (compared to 50-60% with antiquated signature-based AV) AI and Machine Learning Helps You:
  • 23. AI / ML Adoption Benefits Automated protection Faster response and protection Personalization Learn to adapt to me, unobtrusively Usability Drivers Scaling and velocity Humans are slow Humans are expensive Data growth Automation Threats evolve. Do you? Sophistication Complex threats 360-degree protection Firewalls talking to email servers and endpoints
  • 24. Doing AI & ML (Correctly) is Hard! FEATURES / DIMENSIONS • Static attributes • Dynamic behaviors • Reputation • Relations • Sequential state ADVANCED TECHNIQUES • Ensembling • Boosting • Sequential Learning • Deep Learning • Automation at Scale BOUNTIFUL DATA • 9 Trillion rows of security data • 4.5B queries processed daily from 175M endpoint devices • 2B emails scanned daily • 1B previously unseen web requests scanned daily • Outputs from other systems & products LEADING EXPERTS • Dedicated org of recognized machine learning experts • Experts-attack investigation team • Centuries of combined ML experience
  • 25. The Future of AI & ML in Cybersecurity now Superpowers for analysts hunting for targeted spearphishing attacks 100x faster Threat detection systems that learn to learn Real-time conversation monitoring for social engineering, cyberbullying, fake news, help, etc. future
  • 26. Predictive Protection AI / ML that anticipates attacks and automatically reconfigures for protection. The Future of AI & ML in Cybersecurity
  • 28. Reach me on Social Media: Facebook: Technology Evangeist Twitter Handle: @InderBarara LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/ Email me at: inderjit.barara@gmail.com Thanx