Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
For Reference watch my YouTube Video - https://youtu.be/NqvNFwa0hQc
Hey Everyone!
This is my complete talk in a virtual conference for cybersecurity researchers that has been hosted by Bsides Maharashtra and thanks to them that they provided me an opportunity to share my thoughts and knowledge with passionate and budding cybersecurity researchers, Hackers, Bug Hunters, and geeks. My talk is all about the detailed explanation of AI in Cyber Security and this should be listened to by every Cyber Sec Person who wants to learn about How AI Can Help In Cyber Security. I have explained the most and every basic to advance information. So do give it a look and understand the concepts and share as much as you can. Thank you Bsides Maharashtra for inviting me. I am happy and excited to be a part of your event.
If you want to invite me for a webinar or conference connect
mail: hello@priyanshuratnakar.com or priyanshuratnakar@protonmail.com
vent details
Date - 25th to 27th November 2020
CTF
Workshop
Speaker session
website - https://bsidesmaharashtra.com/
Security BSides is a community-driven framework for building events by and for information security community members. These events are already happening in major cities all over the world! We are responsible for organizing an independent BSides approved event for Delhi, India. We’re a volunteer organized event (we have no paid staff), and we truly strive to keep information accessible for everyone.
The idea behind the Security BSides Delhi is to organize an Information Security gathering where professionals, experts, researchers, and InfoSec enthusiasts come together to discuss. It creates opportunities for individuals to both presents and participates in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
Feel free to use the slide but give credit somewhere :)
I was invited to present a talk on "Artificial Intelligence for Cyber Security" for #GirlsInAIHack2021 by #TeenInAIFiji. It was my honor to be there and share my words with the participants and I wish all the participants the best wishes.
Girls from 25 counties aged 12-18 had participated in this Hackathon. They were using Hot Technologies like AI and ML to fight world problems to make good. The event was started on #InternationalWomensDay2021. Total of 1000 participations
500+ Mentors & Organizers
120+ International Speakers were part of it
You can watch it here - https://youtu.be/rhWyt68yuI0
If you want to invite me for a webinar or conference connect
mail: hello@priyanshuratnakar.com or priyanshuratnakar@protonmail.com
You can use the slides but give credit somewhere
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
There are many uses of artificial intelligence in cyber security. Although artificial intelligence has so many advantages over human intelligence, it is dependent on humans. Due to the ever-increasing demand for engineers, there is a bright scope in the field of cyber security. Avantika University is one of the top engineering colleges in India.
To know more details, visit us at : https://www.avantikauniversity.edu.in/engineering-colleges/use-of-artificial-intelligence-in-cyber-security.php
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
If you are interested in understsanding a bit more the potential of Artifical Intelligence in Cybersecurity, you might want to have a look at this overview.
Written from my CISO -and non AI expert- point of view, for fellow security professional to navigate the AI hype, and (hopefully!) make better, informed decisions :-)
All feedback welcome !
“AI is the new electricity” proclaims Andrew Ng, co-founder of Google Brain. Just as we need to know how to safely harness electricity, we also need to know how to securely employ AI to power our businesses. In some scenarios, the security of AI systems can impact human safety. On the flip side, AI can also be misused by cyber-adversaries and so we need to understand how to counter them.
This talk will provide food for thought in 3 areas:
Security of AI systems
Use of AI in cybersecurity
Malicious use of AI
For Reference watch my YouTube Video - https://youtu.be/NqvNFwa0hQc
Hey Everyone!
This is my complete talk in a virtual conference for cybersecurity researchers that has been hosted by Bsides Maharashtra and thanks to them that they provided me an opportunity to share my thoughts and knowledge with passionate and budding cybersecurity researchers, Hackers, Bug Hunters, and geeks. My talk is all about the detailed explanation of AI in Cyber Security and this should be listened to by every Cyber Sec Person who wants to learn about How AI Can Help In Cyber Security. I have explained the most and every basic to advance information. So do give it a look and understand the concepts and share as much as you can. Thank you Bsides Maharashtra for inviting me. I am happy and excited to be a part of your event.
If you want to invite me for a webinar or conference connect
mail: hello@priyanshuratnakar.com or priyanshuratnakar@protonmail.com
vent details
Date - 25th to 27th November 2020
CTF
Workshop
Speaker session
website - https://bsidesmaharashtra.com/
Security BSides is a community-driven framework for building events by and for information security community members. These events are already happening in major cities all over the world! We are responsible for organizing an independent BSides approved event for Delhi, India. We’re a volunteer organized event (we have no paid staff), and we truly strive to keep information accessible for everyone.
The idea behind the Security BSides Delhi is to organize an Information Security gathering where professionals, experts, researchers, and InfoSec enthusiasts come together to discuss. It creates opportunities for individuals to both presents and participates in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
Feel free to use the slide but give credit somewhere :)
I was invited to present a talk on "Artificial Intelligence for Cyber Security" for #GirlsInAIHack2021 by #TeenInAIFiji. It was my honor to be there and share my words with the participants and I wish all the participants the best wishes.
Girls from 25 counties aged 12-18 had participated in this Hackathon. They were using Hot Technologies like AI and ML to fight world problems to make good. The event was started on #InternationalWomensDay2021. Total of 1000 participations
500+ Mentors & Organizers
120+ International Speakers were part of it
You can watch it here - https://youtu.be/rhWyt68yuI0
If you want to invite me for a webinar or conference connect
mail: hello@priyanshuratnakar.com or priyanshuratnakar@protonmail.com
You can use the slides but give credit somewhere
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
There are many uses of artificial intelligence in cyber security. Although artificial intelligence has so many advantages over human intelligence, it is dependent on humans. Due to the ever-increasing demand for engineers, there is a bright scope in the field of cyber security. Avantika University is one of the top engineering colleges in India.
To know more details, visit us at : https://www.avantikauniversity.edu.in/engineering-colleges/use-of-artificial-intelligence-in-cyber-security.php
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
If you are interested in understsanding a bit more the potential of Artifical Intelligence in Cybersecurity, you might want to have a look at this overview.
Written from my CISO -and non AI expert- point of view, for fellow security professional to navigate the AI hype, and (hopefully!) make better, informed decisions :-)
All feedback welcome !
“AI is the new electricity” proclaims Andrew Ng, co-founder of Google Brain. Just as we need to know how to safely harness electricity, we also need to know how to securely employ AI to power our businesses. In some scenarios, the security of AI systems can impact human safety. On the flip side, AI can also be misused by cyber-adversaries and so we need to understand how to counter them.
This talk will provide food for thought in 3 areas:
Security of AI systems
Use of AI in cybersecurity
Malicious use of AI
Cyber Security.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Every single security company is talking about how they are using machine learning—as a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights.
In this session, we will discuss:
• Limitations of machine learning and issues of explainability
• Where deep learning should never be applied
• Examples of how the blind application of algorithms can lead to wrong results
A technical seminar delivered on Machine learning in cybersecurity. Machine learning is trending and desired subject this presentation demonstrates how machine learning can be used to protect IT infrastructure
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
▪ “AI techniques in cyber-security applications”. Invited speech at “Sunetdagarna våren 2019” (conference of the association of Swedish universities), April 1-4 2019, Växjö, Sweden.
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Cybersecurity marketers have also gotten hold of machine learning and it has become the buzzword du jour in many respects. When you're able to cut through the clutter, you will find that machine learning is more than just a buzzword and we should work to fully understand its benefits without overly relying on it as a silver bullet.
Visit - https://www.siemplify.co/blog/what-machine-learning-means-for-security-operations/
How is ai important to the future of cyber security Robert Smith
Today’s era is driven by technology in every aspect of our lives, so much that we’ve now increased our dependence on technology on a daily basis. With an increase in the dependency, we’re now very vulnerable and exposed to the intermittent threat posed as cyber-attacks. Cyber-attack threats have plagued businesses, corporates, governments, and institutions.
Security in the age of Artificial IntelligenceFaction XYZ
Keynote Presentation for ISACA Belgium 2017 on how artificial intelligence is influencing the cyber security industry, and what current and future developments there are
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
Artificial intelligence (AI) and machine learning are changing how cybercriminals carry out cyberattacks — and how cybersecurity professionals defend against them.
Join Infosec Skills author Emmanuel Tsukerman to get an inside look at these new technologies, their impact on cybersecurity and what it means for your career, including:
-Different attack methods that leverage machine learning
-Current and future uses of machine learning and AI within cybersecurity
-New skills and roles for cybersecurity professionals
-A live deepfake demonstration
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
These slides outline how AI is influencing cybersecurity.
Note that they were used in the keynote speech at the event "Defense and Security 2023" held in Thailand on November 8, 2023.
With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities. Hence, the need to protect information assets and ensure information security receives adequate attention.
In this session, I will discuss how AI and Machine Learning can be applied in detecting, predicting and preventing cyber security/information security vulnerabilities and what are the benefits of using Machine Learning and AI. We also touch upon some of the tools available to perform the same.
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
Discover how AI is reshaping cybersecurity. This presentation delves into AI's role in enhancing threat detection, the balance of innovation and risk, and the strategies shaping the future of digital defense.
Cyber Security.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Every single security company is talking about how they are using machine learning—as a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights.
In this session, we will discuss:
• Limitations of machine learning and issues of explainability
• Where deep learning should never be applied
• Examples of how the blind application of algorithms can lead to wrong results
A technical seminar delivered on Machine learning in cybersecurity. Machine learning is trending and desired subject this presentation demonstrates how machine learning can be used to protect IT infrastructure
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
▪ “AI techniques in cyber-security applications”. Invited speech at “Sunetdagarna våren 2019” (conference of the association of Swedish universities), April 1-4 2019, Växjö, Sweden.
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Cybersecurity marketers have also gotten hold of machine learning and it has become the buzzword du jour in many respects. When you're able to cut through the clutter, you will find that machine learning is more than just a buzzword and we should work to fully understand its benefits without overly relying on it as a silver bullet.
Visit - https://www.siemplify.co/blog/what-machine-learning-means-for-security-operations/
How is ai important to the future of cyber security Robert Smith
Today’s era is driven by technology in every aspect of our lives, so much that we’ve now increased our dependence on technology on a daily basis. With an increase in the dependency, we’re now very vulnerable and exposed to the intermittent threat posed as cyber-attacks. Cyber-attack threats have plagued businesses, corporates, governments, and institutions.
Security in the age of Artificial IntelligenceFaction XYZ
Keynote Presentation for ISACA Belgium 2017 on how artificial intelligence is influencing the cyber security industry, and what current and future developments there are
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
Artificial intelligence (AI) and machine learning are changing how cybercriminals carry out cyberattacks — and how cybersecurity professionals defend against them.
Join Infosec Skills author Emmanuel Tsukerman to get an inside look at these new technologies, their impact on cybersecurity and what it means for your career, including:
-Different attack methods that leverage machine learning
-Current and future uses of machine learning and AI within cybersecurity
-New skills and roles for cybersecurity professionals
-A live deepfake demonstration
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
These slides outline how AI is influencing cybersecurity.
Note that they were used in the keynote speech at the event "Defense and Security 2023" held in Thailand on November 8, 2023.
With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities. Hence, the need to protect information assets and ensure information security receives adequate attention.
In this session, I will discuss how AI and Machine Learning can be applied in detecting, predicting and preventing cyber security/information security vulnerabilities and what are the benefits of using Machine Learning and AI. We also touch upon some of the tools available to perform the same.
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
Discover how AI is reshaping cybersecurity. This presentation delves into AI's role in enhancing threat detection, the balance of innovation and risk, and the strategies shaping the future of digital defense.
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
Presentation on the 2015-2016 State of Cybersecurity and Third Party Vendor Risk Management, presented by Matt Pascussi and Rishi Singh.
This presentation was sponsored by TekSystems.
Necmiye Genc, SITA, at International Women's Day Global Event Series. The information security field is expected to see a deficit of 1.5 professionals by 2020. In the face of the desperate need for information security professionals, the report released by (ISC)2, the education and certification body of information security professionals, depicts that women have represented only 10% of the total security workforce. This talk aims to build awareness of the opportunities that exist in security for women of all backgrounds and to introduce advanced technologies such as analytics, threat intelligence and digital forensics to help burgeoning security professionals.
Web security – everything we know is wrong cloud versionEoin Keary
A revised version for 2017 on an old OWASP talk from 2015.
Web application security, Development security challenges and how we are approaching cyber security incorrectly for years...but there is hope!!
Digital Transformation and Innovation on http://denreymer.com
- Merging the Real World and the Virtual World
- Intelligence Everywhere
- The New IT Reality Emerges
http://www.gartner.com//it/content/2940400/2940420/january_15_top_10_technology_trends_2015_dcearley.pdf
ERAU webinar november 2016 cyber security Bill Gibbs
Embry-Riddle Aeronautical University Professor Dr. Jon Haass presents a webinar on Cyber Security. Called Cyber Security Problems and Solutions. Dr. Haass developed the nation's first cyber security bachelor's degree program, which is offered at the ERAU campus in Prescott, Arizona.
In the software engineering world, change is the only constant. And in the course of the last decades, the frequency of that change has exploded. What Agile has brought to software teams, DevOps is now bringing to the entire organization. And the results speak for themselves. The DevOps high-performers are killing it. Insane deploy frequencies of features, high reliability of applications, and high productivity of cross-functional teams have amplified the speed at which ideas become a reality.
In parallel, Application Security was doing its own thing and to a large part remained oblivious to all the impressive improvements that were happening in software engineering. Because breaking an application doesn’t need any knowledge of how it was created in the first place.
This talk will cover anti-patterns that are preventing application security from being adopted by development teams, such as:
* Issues Overload
* Acronym Overuse
* Sales team Wall
The advent of AI is revolutionizing both the world and cybersecurity, yet significant challenges remain. The Cyber Express has consulted with leading industry experts to uncover insights that will illuminate the AI transformation.
The latest issue of The Cyber Express explores the role of AI in securing digital assets, followed by its benefits and challenges. Stay ahead on this important topic and don’t miss out on valuable insights. https://thecyberexpress.com/
As cyberattacks grow in volume and complexity in recent years, Artificial Intelligence (AI) helps under-resourced security operations analysts stay ahead of threats. From millions of research papers, blogs, and news stories to pressurize intelligence, AI provides instant results to help you fight through the noise of thousands of daily alerts, drastically reducing response time.
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
DSS participated in this year's "IBM Connect" event organized by regional IBM's VAD - ALSO Baltics. DSS spoke about importance of IT Security in new - digital world that is developing. New technologies bring new business opportunities but as well bring also new security threats and risks that have to be considered in first place.
Similar to Combating Cyber Security Using Artificial Intelligence (20)
Some young people have never known a world without social media. Around 91 percent of 16-24 year olds use the internet for social networking.They use social media now more than ever before. Give away information without thinking or knowing the consequences. Get sucked into a world of online games and dangerous online trends. There have even been cases where suicide games were trending online, that children all encouraged each other to participate in. It can be a dark and unpredictable place.
In the presentation Titled " Bitcoin and Ransomware Analysis " we discuss ransomware and how bitcoin are being utlised in cyber crime. we also have look at Bitcoin mining, trading and block chain concept.
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
Ransomware - a malicious software used by hackers to block access to a computer system until a ransom is paid. Attackers contact the user with ransom demands. Most attackers request payment in Bitcoin (the crypto-currency). Even if you pay the ransom, the attackers may not deliver the key to unencrypt files.
As ransomware attacks continue to grow in number and sophistication, individual PC users and organizations should reassess their current security strategy. There is a common misconception that adding layers of automated defence technologies will reduce the risk of falling victim to ransomware attacks. While endpoint security products and secure email gateways can offer some level of protection, sooner or later a phishing email, which is the most widely-used attack vector, will penetrate defences and user will be faced with determining whether or not an email is legitimate or part of an attack.
E governance and digital india by col inderjit singhInderjeet Singh
E-Governance in India, a major initiative under the ‘National e-Governance Plan’ (NeGP) of the Department of Electronics and Information Technology (DeitY), Ministry of Communications and Information Technology, Government of India, was approved in 2006 and it is the backbone of ‘Digital India’ vision.
E-Governance is about Government’s interaction with government, it’s way of conducting business with companies and delivering services to its citizens by leveraging Information and Communication Technology (ICT) enabled strategies for ensuring transparency, efficiency, and accountability in the process which is not only faster but also more personalized and can be accessed 24 hours a day, seven days a week. It also entails integrating services across different governmental agencies in order to reduce cost structures, simplify interaction and improve overall service delivery in real time.
Internet based e-commerce has besides, great advantages, posed many threats because of its being what is popularly called faceless and borderless.Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. In addition to privacy concerns, other ethical issues are involved with electronic commerce. The Internet offers unprecedented ease of access to a vast array of goods and services. The rapidly expanding arena of "click and mortar" and the largely unregulated cyberspace medium have however prompted concerns about both privacy and data security.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. "The development of full artificial intelligence could
spell the end of the human race.” - Stephen Hawking,
theoretical physicist, cosmologist, author
“I don’t understand why some people are not
concerned” – Bill Gates, co-founder of Microsoft
4. Man or Machine? Advanced Behavioral Attacks
Imagine a business email
compromise attack
you get an email to wire payment for an
invoice from the CFO
The email is written from your CFO
natural language processing from emails
You’re suspicious and call the CFO
But your phone is compromised
You’re connected to adversary who has
a speechbot with your CFO’s Voice
Science fiction or possible today?
https://www.youtube.com/watch?v=Nu-nlQqFCKg
Microsoft Real-Time Translation (2012)
5. 1950s – 2000s
AI & ML
core developments
multi-industry
before
Is AI/ML New? No*
2006
deep learning
Netflix Prize
2014 2016 2018
ensembling
decision trees
CAML
deep learning
(mobile)
AI services
ImageNet
after
2008 2009 2012
6. Fourth Industrial Revolution
AI is contributing to a the transformation of society at a rate
that is 10 times faster and at 300 times the scale, with an
estimated impact that is 3000 times of the 1st Industrial
Revolution.
- McKinsey Global Institute
11. AI and ML Demystified / @carologic / MWUX2017
Decision Making: Self Driving (autonomous) vehicles
Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University
24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands-
free_Driving.jpg
DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
13. AI-generated art
L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style
https://arxiv.org/pdf/1508.06576v1.pdf
The AI and ML Revolution is Here
14. Computational perception – face recognition (and speech, text, social, video, etc.)
https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face-
verification.pdf
The AI and ML Revolution is Here
15. #RSAC
The Current Cyber Landscape Favors
Malicious Actors
SEC reveals it was hacked, information may have
been used for illegal stock trades
in October or November 2016, but wasn’t discovered
by the firm until March 2017
The Cost of Cyber Security Operations
Continues to Increase without Mitigating Risk
Anthem: Hacked Database Included 78.8 Million People
”Big Four” accounting firm Deloitte was likely breached
Global information solutions company, Equifax, has reported a major
cybersecurity incident affecting 143 million consumers in the US.
Most cybersecurity Attacks today are automated, from
AI-powered Distributed Denial of Service (DDOS)
attacks to phishing scams and ransomware.
16. You Can’t Afford To Stay Stagnant:
• In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to
be worth more than $150 billion.
• Global cybersecurity spending will exceed $1 trillion from 2017 to 2021
• The cybersecurity market grew by roughly 35 X over 13 years.
• We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the
8-10 % projected over the next five years.
The Increased Threat Landscape
• $1 billion: Cost of ransomware attacks alone last year
• $158: Average global cost of data breach per lost or stolen record
• 25% of large organizations experience recurring incidents
• 229 days: the average time to identify a malicious attack
17. Cylance,Inc.Confidential
The Future of Security
Past Present Future
AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE
SPOND
Pre-Execution
Humans Needed
Post-Execution
Pre-Execution
No Humans
Threat actors could also employ AI tools to discover new vulnerabilities and design
exploits and other attacks, in a fraction of the time it's taking them now.
AI could be used as an effective tool to help them decide what, who and when to
attack.
18. Looking into the heart of AI’s Dark Secret
What’s inside the box?
Algorithmic regulation –
where and how?
Are we willing to let
machines make decisions
we don’t understand?
Self modifying algorithms
– who to interrogate?
20. Applications of AI in Cyber Security
• Intrusion detection
• Examples
– Malicious JavaScript and other scripts
– Malicious Non-Executable Files
– Malicious Executable Files
• Inappropriate Web and Email Content
• Phishing
– Derive probabilistic models of phishing attacks
– Derive probabilistic reputation models for URLs
21. • Make Security Simple
• AI not only improves efficacy, it also changes the deployment
model and makes cybersecurity implementation and operation
a seamless, smooth process.
• Because of the advanced features of ML, you no longer employ
traditional AV technology and tactics, including:
• Incremental storage
• Scanning machines
• Re-imaging machines
• You can remove large endpoint agents that create performance
friction for enterprise users.
AI Changes the Deployment Game
22. • Use minimal system resources (1-2% CPU usage and 40-
50 MB of memory)
• Prevent attacks with superior speed (in milliseconds)
• Replace ineffective traditional AV tools (or augment
existing security)
• Achieve efficacy rates of greater than 99% (compared to
50-60% with antiquated signature-based AV)
AI and Machine Learning Helps You:
23. AI / ML Adoption
Benefits
Automated protection
Faster response and protection
Personalization
Learn to adapt to me, unobtrusively
Usability
Drivers
Scaling and velocity
Humans are slow
Humans are
expensive Data
growth
Automation
Threats evolve. Do you?
Sophistication
Complex threats
360-degree protection
Firewalls talking to email servers
and endpoints
24. Doing AI & ML (Correctly) is Hard!
FEATURES / DIMENSIONS
• Static attributes
• Dynamic behaviors
• Reputation
• Relations
• Sequential state
ADVANCED TECHNIQUES
• Ensembling
• Boosting
• Sequential Learning
• Deep Learning
• Automation at Scale
BOUNTIFUL DATA
• 9 Trillion rows of security data
• 4.5B queries processed daily from 175M
endpoint devices
• 2B emails scanned daily
• 1B previously unseen web requests
scanned daily
• Outputs from other systems & products
LEADING EXPERTS
• Dedicated org of recognized
machine learning experts
• Experts-attack
investigation team
• Centuries of combined ML
experience
25. The Future of AI & ML in Cybersecurity
now
Superpowers for analysts
hunting for targeted spearphishing attacks 100x
faster
Threat detection systems that learn to
learn Real-time conversation monitoring
for
social engineering, cyberbullying, fake news,
help,
etc.
future
26. Predictive Protection
AI / ML that anticipates attacks and automatically reconfigures for
protection.
The Future of AI & ML in Cybersecurity