SlideShare a Scribd company logo
©2022 DARKTRACE
Carlos Gray
Product SME
©2022 DARKTRACE 2
HowAICanThinkLikeAnAttacker
3
HowcanAIthinklikean
attacker?
WhyshouldAIthinklikean
attacker?
WhyAI?
MissionStatement:
Freetheworldofcyber
disruption.
• Pre-2000s - Creeper, Birth of Antivirus, Internet: Birth of Attacks
• 2000s - Criminal Groups Financed : Frequency of Attacks
• 2010s - Age of Ransomware : Sophisitication of Attacks
• 2020s - Future of Cybersecurity : AI Powered Attacks
©2022 DARKTRACE 4
EvolutionofCyberThreats
5
166%
Mandiant(2022)
4.3 million
IBM(2022)
Increase in Zero
Days
Average cost of
cyber disruption
52%
Rapid7(2021)
42:52
Splunk(2022)
Exploitations
began with
Zero Days
Median
Exploitation time
for Ransomware
CurrentTrendsofCyberThreats
7
Signature-based
Technology
Evidence-based
Threat Prediction
Known
Focused on the
business, not the threat
Known threat actors
Unknown actors
Unknown
attacks
Rules-based Technology
• Research-driven with a ‘problem first’ approach
• Experts across multiple disciplines
• Cutting edge – allowed to fail
• Today’s research becomes tomorrow’s product
• 100+ patents filed
©2022 DARKTRACE 9
DarktraceCyberAIResearchCentre
“[The Centre] saw growth of 69.2% in related patent
applications in the three months ending November,
compared to the same period [the previous year] - the
highest percentage growth out of all companies tracked.”
- GlobalData
48% headcount
increase in 2021
24 doctorates
60 master’s degrees
1. First phase of AI was consumer Internet data; next
phase is ‘entity-centric’ and bespoke to your business
2. Explainable AI clearly communicates the what, when,
why, and how
3. AI is making decisions or helping humans make
better decisions
4. AI continuously feeds back information to improve
outcomes
©2022 DARKTRACE 10
TrendsinAI
DarktraceDETECT
DarktraceCyber AI ANALYST
DarktraceRESPOND
DarktraceCyber AI LOOP
Self-Learning AI
ExplainableAI
Micro-DecisionMaking
AI Feedback
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
Self-Learning AI empowers a complete, always-on solution with
autonomous feedback continuously improving the state of security.
FPO
• Hardens defenses inside and out environments by feeding back
critical information to other parts of the Continuous AI Loop
• Identifies key assets across the organization
• Visualizes attack paths and enables scenario-based wargaming
• Runs real-world and simulated attacks with auto-switching at unsafe
levels
©2022 DARKTRACE 15
DarktracePREVENT
Know your enemy
• Learns normal’ ‘patterns of life’ to discover unpredictable cyber-threats
• Complete visibility across the workforce
• Learns ‘on the job’
• Works seamlessly across all environments via an open and extensible architecture
©2022 DARKTRACE 16
DarktraceDETECT
See attacks instantly
• Based on an influx of continuously changing information, AI makes micro-decisions in seconds
• Proportionate and targeted actions
• Reacts faster than human teams
• Enforces normal business operations
©2022 DARKTRACE 17
DarktraceRESPOND
Disarm within seconds
• Provides a solution to heal from disruption
• Restores assets to their condition before an attack
• Empowers informed human decisions for healing from attack, while
avoiding organizational shutdown
• Automates and expedites the process restoring systems to “normal”
©2022 DARKTRACE 19
DarktraceHEAL
Restore back to health
• End-to-end cyber security
• Creates a bespoke, AI Self-Learning solution unique to each organization
• Frees the security team for high value work that only humans can do
• Protects revenue, secures the bottom line.
©2022 DARKTRACE 20
DarktraceCyberAILoop:TheBigIdeas
Strengthens security posture continuously in a virtuous AI feedback loop
©2022 DARKTRACE 21
ManagingCyberRisk
AttackSimulations
RedTeam Exercises
(blueandpurple)
PenetrationTesting
AttackSurface
Management
ThreatIntelligence
Vulnerability
management
ITAssetDiscovery
Hardensecurityinsideandout
©2022 DARKTRACE 24
UseCases
ITgovernance
Maliciousinfrastructure
Supplychainrisk
Subsidiary/M&Arisk
GDPR
Cloudrisks
APIsecurity
Dataleaks
Misconfigurations
ShadowIT
Blindspots
28
©2022 DARKTRACE

More Related Content

What's hot

The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
Amazon Web Services
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Vijilan IT Security solutions
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
LearningwithRayYT
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
Motorola Solutions
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
TapOffice
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
Sylvain Martinez
 

What's hot (20)

The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 

Similar to How AI can Think Like an Attacker (Carlos Gray at DarkTrace)

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
ShapeBlue
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceTony Zirnoon, CISSP
 
Хакеро-машинный интерфейс
Хакеро-машинный интерфейсХакеро-машинный интерфейс
Хакеро-машинный интерфейс
Positive Hack Days
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesTony Zirnoon, CISSP
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
ISSA LA
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
uthayakumar174828
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile security
MobileSoft
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
African Cyber Security Summit
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Hacks in Taiwan (HITCON)
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Bindernitayart
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Andreas Sfakianakis
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
ShapeBlue
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 

Similar to How AI can Think Like an Attacker (Carlos Gray at DarkTrace) (20)

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Хакеро-машинный интерфейс
Хакеро-машинный интерфейсХакеро-машинный интерфейс
Хакеро-машинный интерфейс
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile security
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 

More from Executive Leaders Network

Totally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdfTotally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdf
Executive Leaders Network
 
Fuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdfFuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdf
Executive Leaders Network
 
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Executive Leaders Network
 
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Executive Leaders Network
 
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Executive Leaders Network
 
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Executive Leaders Network
 
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Executive Leaders Network
 
Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...
Executive Leaders Network
 
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Executive Leaders Network
 
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
Executive Leaders Network
 
Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)
Executive Leaders Network
 
How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...
Executive Leaders Network
 
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Executive Leaders Network
 
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Executive Leaders Network
 
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Executive Leaders Network
 
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Executive Leaders Network
 
Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)
Executive Leaders Network
 
The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)
Executive Leaders Network
 
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
Executive Leaders Network
 
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
Executive Leaders Network
 

More from Executive Leaders Network (20)

Totally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdfTotally Touchless_May 16 webinar.pdf
Totally Touchless_May 16 webinar.pdf
 
Fuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdfFuel your P2P with high quality e-invoice data.pdf
Fuel your P2P with high quality e-invoice data.pdf
 
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
Why Talent Optimisation Must Be Your 2025 Imperative (Mark McKormack at Fuel5...
 
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
Thrive in the World of Change (Joshua May and Richard Revis, Blackline and EY)
 
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
Accelerating Leadership Transformation (Andrew Golightly at EDF Energy)
 
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
Building a Resilient Finance Function for 2023 and Beyond (Tommaso Aquilante ...
 
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
Mitigate Risk and Reduce Operational Costs with Low Code Process Automation (...
 
Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...Creating Better Employee & Customer Experiences Through First-rate Facilities...
Creating Better Employee & Customer Experiences Through First-rate Facilities...
 
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
Procurement @ Avon Fire & Rescue Service (Tanya Nathan at Avon Fire & Rescue ...
 
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
How to Achieve Outstanding Employee Experience (Richard Burdon at IMI Precision)
 
Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)Getting Digitally Fit for the Future (Mary Kent at Magnox)
Getting Digitally Fit for the Future (Mary Kent at Magnox)
 
How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...How Successful HR Infrastructure Investment Blends Technology and Services (S...
How Successful HR Infrastructure Investment Blends Technology and Services (S...
 
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
Why and How You Should Lead the Evolution of Your People Ecosystem (Stephen O...
 
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...Transforming Procurement in a Financial Services Organisation Undergoing Sign...
Transforming Procurement in a Financial Services Organisation Undergoing Sign...
 
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
Strategic Procurement is the Lockdown Legacy (Stephen Carter at Ivalua)
 
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
Smart Sleep Strategy (Wendy Macartney at Nedbank Private Investment)
 
Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)Flexible Budgeting and Forecasting (George Bennett at University of London)
Flexible Budgeting and Forecasting (George Bennett at University of London)
 
The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)The Spirit of Vodafone (Helen Burchell at Vodafone)
The Spirit of Vodafone (Helen Burchell at Vodafone)
 
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
HR Transformation on a Blank Canvas (Nicola Sutherland at Steer Automotive Gr...
 
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
What Leaders Can Do to Navigate ‘the Great Resignation’ (Emma Carroll at Choo...
 

Recently uploaded

Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 

Recently uploaded (20)

Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 

How AI can Think Like an Attacker (Carlos Gray at DarkTrace)

  • 2. Carlos Gray Product SME ©2022 DARKTRACE 2 HowAICanThinkLikeAnAttacker
  • 4. • Pre-2000s - Creeper, Birth of Antivirus, Internet: Birth of Attacks • 2000s - Criminal Groups Financed : Frequency of Attacks • 2010s - Age of Ransomware : Sophisitication of Attacks • 2020s - Future of Cybersecurity : AI Powered Attacks ©2022 DARKTRACE 4 EvolutionofCyberThreats
  • 5. 5 166% Mandiant(2022) 4.3 million IBM(2022) Increase in Zero Days Average cost of cyber disruption 52% Rapid7(2021) 42:52 Splunk(2022) Exploitations began with Zero Days Median Exploitation time for Ransomware CurrentTrendsofCyberThreats
  • 6. 7 Signature-based Technology Evidence-based Threat Prediction Known Focused on the business, not the threat Known threat actors Unknown actors Unknown attacks Rules-based Technology
  • 7. • Research-driven with a ‘problem first’ approach • Experts across multiple disciplines • Cutting edge – allowed to fail • Today’s research becomes tomorrow’s product • 100+ patents filed ©2022 DARKTRACE 9 DarktraceCyberAIResearchCentre “[The Centre] saw growth of 69.2% in related patent applications in the three months ending November, compared to the same period [the previous year] - the highest percentage growth out of all companies tracked.” - GlobalData 48% headcount increase in 2021 24 doctorates 60 master’s degrees
  • 8. 1. First phase of AI was consumer Internet data; next phase is ‘entity-centric’ and bespoke to your business 2. Explainable AI clearly communicates the what, when, why, and how 3. AI is making decisions or helping humans make better decisions 4. AI continuously feeds back information to improve outcomes ©2022 DARKTRACE 10 TrendsinAI DarktraceDETECT DarktraceCyber AI ANALYST DarktraceRESPOND DarktraceCyber AI LOOP Self-Learning AI ExplainableAI Micro-DecisionMaking AI Feedback
  • 9. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. Self-Learning AI empowers a complete, always-on solution with autonomous feedback continuously improving the state of security. FPO
  • 10.
  • 11. • Hardens defenses inside and out environments by feeding back critical information to other parts of the Continuous AI Loop • Identifies key assets across the organization • Visualizes attack paths and enables scenario-based wargaming • Runs real-world and simulated attacks with auto-switching at unsafe levels ©2022 DARKTRACE 15 DarktracePREVENT Know your enemy
  • 12. • Learns normal’ ‘patterns of life’ to discover unpredictable cyber-threats • Complete visibility across the workforce • Learns ‘on the job’ • Works seamlessly across all environments via an open and extensible architecture ©2022 DARKTRACE 16 DarktraceDETECT See attacks instantly
  • 13. • Based on an influx of continuously changing information, AI makes micro-decisions in seconds • Proportionate and targeted actions • Reacts faster than human teams • Enforces normal business operations ©2022 DARKTRACE 17 DarktraceRESPOND Disarm within seconds
  • 14. • Provides a solution to heal from disruption • Restores assets to their condition before an attack • Empowers informed human decisions for healing from attack, while avoiding organizational shutdown • Automates and expedites the process restoring systems to “normal” ©2022 DARKTRACE 19 DarktraceHEAL Restore back to health
  • 15. • End-to-end cyber security • Creates a bespoke, AI Self-Learning solution unique to each organization • Frees the security team for high value work that only humans can do • Protects revenue, secures the bottom line. ©2022 DARKTRACE 20 DarktraceCyberAILoop:TheBigIdeas Strengthens security posture continuously in a virtuous AI feedback loop
  • 16. ©2022 DARKTRACE 21 ManagingCyberRisk AttackSimulations RedTeam Exercises (blueandpurple) PenetrationTesting AttackSurface Management ThreatIntelligence Vulnerability management ITAssetDiscovery
  • 19. 28