SlideShare a Scribd company logo
Influence of Artificial
Intelligence in IS
Riyaz
Agenda
• Artificial Intelligence
• Industries and Jobs
• Adoption
• Drivers and variations
• Machine Learning
• Training Types
• Deep Learning
• Implementation & Products
• Internet of Things (IoT)
• Issues with IoT
• Attacks
• Security Analytics
• Usage of Data
• Advantages, Disadvantages, Recommendation & Conclusion
• Summary
• Q & A
2
Emerging Technologies
3
Artificial
Intelligence
4
https://youtu.be/1JzPeaVXS7k
What is AI?
1:a branch of computer science dealing with the simulation of intelligent
behavior in computers
2:the capability of a machine to imitate intelligent human behavior
• AI Effect  Problems already resolved are considered not AI.
• Originally coined by Standard computer scientist in 1956
• https://en.wikipedia.org/wiki/Artificial_intelligence
5
Continued (1)..
• AI is a science and technology based on disciplines such as:
• Data science
• Biology
• Psychology
• Mathematics
• Engineering
• Linguistics
6
Continued (2)..
• The main goal of AI is to create technology that allows
computers and machines to function in an intelligent manner.
Following are the problems AI tries to resolve:
• Learning
• Natural Language Processing
• Reasoning and problem solving
• Planning
• Creativity
• Social Intelligence
• General Intelligence
• Knowledge representation
• Perception
• Motion and manipulation 7
Around Us
• Product Recommendation  Amazon, Netflix
• Natural language translation  Google, Microsoft
• Spam detection  Google, Yahoo, MS, FB, Twitter
• Siri  Apple’s personal assistant
• Games  Call of Duty and Far Cry
• Customer Support  Chat Bots
8
Industries
https://www.outsecure.com/2017/04/26/artificial-intelligence-ai-security-strategy-for-companies-avoid-a-zero-sum-game/
9
Adoption
https://www.spiceworks.com/marketing/state-of-it/report/
10
Regional Adoption
• TAQNIA can automatically detect and monitor unusual
activities across vast amounts of terrain using Simularity AI
software
• Dubai Electricity and Water Authority use AI to answer
customer enquiries in both English and Arabic, through a 24-
hour chatbot.
• AI Gernas – Drone for traffic mgmt.
11
AI Jobs
• Manufacturing workers (19%)
• Banking (18%)
• Construction (10%)
• Public transport (9%)
• Financial analysis (9%)
• Insurance companies (8%)
• Taxi Drivers (7%)
• Farming (6%)
• Policing/Security (5%)
• Healthcare/hospitals (4%)
• Science (4%)
http://uk.businessinsider.com/industries-most-under-threat-from-artificial-intelligence-2017-6/#11-science-4-1
Oxford University study predicted 47% of jobs could be automated by 2033.
12
Revenue Drivers
http://assets.teradata.com/resourceCenter/downloads/AnalystReports/Teradata_Report_AI.pdf
13
AI in Security
14
https://hbr.org/2017/04/how-companies-are-already-using-ai
Key Drivers
• Computing performance and speed
• Advances in the implementation of Algorithms
• Ease of collecting data
15
AI Variations
• Strong AI  Simulate the actual human intelligence (Not Yet)
• Weak AI  Exhibit certain criteria but not all (Deep Blue)
• AI between  Inspired by human reasoning (IBM Watson)
• General AI  Ability to reason in general (Solve any problem)
• Narrow AI  Machines designed for specific purpose (Many)
16
Evolution of AI
17
Machine Learning
18
What is ML?
19
In a 2015 report, ISACA defined machine learning as:
The use of computing resources that have the ability to learn (acquire and apply
knowledge and skills that maximize the chance of success). These cognitive systems
have the potential to learn from business related interactions and deliver
evidence-based responses to transform how organizations think, act and operate.
http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/innovation-insights.aspx
Continued (1)
20
Malware Detection
• From Incident Response
• Is a file or event malicious? (Yes, No)
• If malicious, what type of malware is it? (Trojan, Worm, etc.)
• How can I quantify the risks of the attach? (High, Medium, Low)
• How can I determine if the attack is part of a larger campaign against
my infrastructure? (APT, spear phishing)
• How likely am I to get hit again? (Next hour, week, month) 21
Traditional Approaches
• Static
• Packet, file type and size
• Static property signatures
• Scalable but lacks coverage
• Behavioral
• Manually create “behavioral signatures”
• Better coverage, but not always scalable
• Reputation
• “Crowdsourcing” the detection
• Can’t detect targeted threats
22
Machine Learning
23
Continued ..
24
ML Training Methods
• Supervised Learning
• Unsupervised Learning
• Semi-supervised Learning
• Reinforcement Learning
25
Supervised Learning
26
Continued
27
Unsupervised Learning
28
Continued
29
Reinforcement Learning
• Deep Mind’s Go Game is based on this.
30
https://youtu.be/TnUYcTuZJpM
Machine Learning Flow
• Data Collection  Collecting data ahead of time
• Data Cleaning  Combining multiple data source, normalize
• Generate features  Max info is extracted from the data
• Model Supervised / Unsupervised Learning
• Label events output
• Use feedback to improve model 31
ML Algorithms
• Linear Regression
• Logistic Regression
• Decision Tree
• SVM
• Naive Bayes
• KNN
• K-Means
• Random Forest
• Dimensionality Reduction Algorithms
• Gradient Boosting algorithms
• GBM
• XGBoost
• LightGBM
• CatBoost 32
Deep Learning
• Study of artificial neural networks and related machine
learning algorithms that contain more than one hidden layer
• Type of machine learning inspired by the connections
between neurons in the human brain. Researchers developed
a man-made imitation of this biological connectivity known as
artificial neural networks (commonly known as neural nets).
• Deep learning can use both the common supervised learning
technique and the more complex and cutting edge alternative
of unsupervised learning.
33
ML Vs DL
34
Implementation
35
Continued (1)
https://www.tensorflow.org/
https://www.computerworlduk.com/galleries/data/machine-learning-tools-harness-artificial-intelligence-for-
your-business-3623891/
36
Continued (2)
• Common considerations include whether the tool will be a
standalone solution or integrated with an SIEM.
• It can also be part of a security operations center (SOC)
with red and blue teams harnessing it or another layer in the
architecture where resources are tight.
• It can be connected through a network switch SPAN port and
collect the data
• A stand-alone server or VM with lots of training data, huge
processing power & python
https://securityintelligence.com/why-machine-learning-is-an-essential-tool-in-the-cisos-arsenal/
37
Implementation Approach
• Use case definition  Determine the requirement you would
want to address (phishing, privilege users, malware, etc.)
• Pick Organization subsets  For PoC, pick couple of
departments from company
• Get Source access  Solutions need access to certain files, to
operate
• Understand the results  ML solutions deliver probabilistic
results based on a percentage. The solution must provide
supporting evidence when it flags an event so that analysts can
act on it.
38
Choosing a AI Vendor
• Vendor is using ML or AI ( Strong, Narrow)
• Technology used for Machine Learning (Deep learning,
Reinforcement)
• Limits of vendor’s ML
• Maintenance cost of ML Technology
https://www.csoonline.com/article/3211594/machine-learning/how-artificial-intelligence-fits-into-cybersecurity.html
39
Security Products (AI & ML)
• Password management
• https://cups.cs.cmu.edu/meter/
• Windows 10
• Google Recaptcha
• AI Powered AntiVirus Software
• Oracle Identity SOC &
Management cloud
https://rasoolirfan.com/2017/05/02/ai-cybersecurity/
40
Issues with ML
• ML is bad when there’s massive variation in the data that makes
training useless.
• Like any other technology, machine learning is not something
you can install once and forget about. You need to assure
continuous training with new datasets
• If data is not reviewed, attack code can be injected in to a
dataset.
• If normal behavior is not defined properly, attack is missed due
to false positive
41
ML Summary
• Machine learning is a type of artificial intelligence that enables
computers to detect patterns and establish baseline behavior
using algorithms that learn through training or observation.
• Ideal for detecting insider threats, zero day attacks coupled
with behavioral analysis machine learning is able to process
and analyze vast amounts of data that are simply impractical
for humans.
• Know your data. Without applying domain expertise to your
dataset, the result will be an overload of alerts and false
positives.
42
Internet of Things (IoT)
43
https://youtu.be/uFy_Pi1Smxk
AI and IoT
44
https://www.gartner.com/smarterwithgartner/gartners-top-10-technology-trends-2017/
Growth of IoT
• The IoT’s growth will in turn drive an exponential rise in the
volumes of data being generated.
• IDC estimating that the number of devices connected to the
Internet will surge from 11 billion in 2016 to 80 billion in 2025
• Generating 180 zettabytes of data every year, up from 4.4
zettabytes in 2013 and 44 zettabytes in 2020.
https://www.pwc.com/gx/en/industries/communications/assets/pwc-ai-and-iot.pdf
45
IoT Devices
• Smartphones
• Tablets
• Smart TVs
• Smart Lighting Systems
• Smart HVAC Systems
• Security Cameras and Systems
• Wireless Keyboards
• Wireless Mouses'
• Wireless Headsets
• DVRs
• Smart Cameras
• MiFi-like Routers and Hotspots 46
Security Issues..
• Encryption  IoT & Cloud is open
• Authentication  Unsecure end points
• Firmware updates  Outdated version
• Privacy  Personal data is readily available
• Web interface  Prone to SQL & cross-site scripting
• Backdoor  Poorly developed system
https://www.networkworld.com/article/3200030/internet-of-things/researchers-find-gaps-in-iot-security.html
47
Attack on IoT Devices
• Continuously scan the internet for the IP address of Internet
of things (IoT) devices.
• Using a table of more than 60 common factory default
usernames and passwords, and logs into them to infect them
with the Mirai malware.
• This piece of malicious code took advantage of devices
running out-of-date versions of the Linux kernel and relied on
the fact that most users do not change the default
usernames/passwords on their devices
• Took down GitHub, DYN, Netflix, Krebs, Twitter, and a number
of other major websites
48
IoT Data
49
IoT Data
50
IoT Summary
• Access controls for IoT devices
• Endpoint devices has to be hardened
• Information flow control has to be controlled
• Encryption between IoT and Cloud has to be with SSL/TLS
• Vendor patches to be rigorously tested and applied
• Authentication has to strong
• Data collected for AI need to be protected
51
Security Analytics
52
Too Much of Data
• The global median time from compromise to discovery has
dropped significantly from 146 days in 2015 to 99 days 2016,
but it is still not good enough.
• So it still takes 99 days to fix a critical vulnerability.
• Big Data is differentiated from traditional technologies in three
ways: the amount of data (volume), the rate of data generation
and transmission (velocity), and the types of structured and
unstructured data (variety)
https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html
53
Security Detection
• 1st Generation  IDS
• Layered security
• Prevention impossible
• 2nd Generation  Security Information & Event Management
(SIEM)
• Present actionable information to security analyst
• Correlate alerts from different IDS sensors
• 3rd Generation  Security Analytics for Security
• Contextual security analytics
• Long-term correlation
https://www.infosecurity-magazine.com/opinions/big-data-security-privacy/
54
Time to Respond
55
http://go.cloudera.com/ponemon
Security Analytics
http://go.cloudera.com/ponemon
56
Security Analytics Summary
• Time to Respond
• Key Arsenal for Incident Responders
• Integrate with existing security products
• Continuous feedback
• Know to reduce False Positives
57
Advantages & Disadvantages
58
Advantages
• User Behavior Analysis (UBA)
• Data Theft
• Prediction of Threats
• Risk Assessment
• Management of data
• Anomaly Detection
• Better Incident Response
59
http://www.securityweek.com/role-artificial-intelligence-cyber-security
Disadvantages
• Limitations of Data (CIA)
• AI driven ransomware/malware
• Privacy of Data
• Legal aspects of data analysis
• Unable to predict the possibilities
60
Recommendation
• The four critical steps they can take to do this are:
• Define a clear strategy on the expectations and value from the
AI systems. This should be clear and approved by the board.
• Perform a risk assessment that highlights the financial,
regulatory, brand reputation implications from a malfunction in
the AI system.
• Recognize clearly that the Business requires a strategic Security
& Privacy posture for the AI system to fully transform the
business.
• Intelligent systems have to be Cyber resilient to support the
intelligent systems, without which there is more potential for a
negative impact as opposed to the intended positive value from
AI systems. 61
Conclusion
• Synergy. Program computers to do the grunt work and leave
humans to the decision-making, incident management and
follow-up.
• AI is not a silver bullet. Experts suggest using it to automate
mundane and repetitive tasks, not as a replacement for human
judgment.
• Hackers are still using old standbys—stealing passwords, simple
malware, social engineering, etc. AI-generated attacks in the wild
aren’t (yet) common.
62
https://youtu.be/TnUYcTuZJpM
Summary
• Artificial Intelligence
• Machine Learning
• Internet of Things (IoT)
• Security Analytics
• Advantages & Disadvantages
63
Q & A?
64
Thank You
65
Riyaz
https://www.linkedin.com/in/riyaz145/

More Related Content

What's hot

Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of Intelligence
Abhishek Upadhyay
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
scoopnewsgroup
 
Machine Learning Risk Management
Machine Learning Risk ManagementMachine Learning Risk Management
Machine Learning Risk Management
Andrew Clark
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
Rishi Kant
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
Mark Underwood
 
Smart Data 2017 #AI & #FutureofWork
Smart Data 2017 #AI & #FutureofWorkSmart Data 2017 #AI & #FutureofWork
Smart Data 2017 #AI & #FutureofWork
Steve Ardire
 
NUS-ISS Learning Day 2018-Painting Today's digital landscape
NUS-ISS Learning Day 2018-Painting Today's digital landscapeNUS-ISS Learning Day 2018-Painting Today's digital landscape
NUS-ISS Learning Day 2018-Painting Today's digital landscape
NUS-ISS
 
Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know
Andrew Clark
 
Hadoop, Iot and Analytics- The Three Musketeers
Hadoop, Iot and Analytics- The Three MusketeersHadoop, Iot and Analytics- The Three Musketeers
Hadoop, Iot and Analytics- The Three Musketeers
Edureka!
 
Introduction to AI & ML
Introduction to AI & MLIntroduction to AI & ML
Introduction to AI & ML
Jai Porje
 
Developing cognitive applications v1
Developing cognitive applications v1Developing cognitive applications v1
Developing cognitive applications v1
Harsha Srivatsa
 
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
Patrick Van Renterghem
 
Prepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolutionPrepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolution
Ramkumar Ravichandran
 
Wiki stage 20151128 - v001
Wiki stage   20151128 - v001Wiki stage   20151128 - v001
Wiki stage 20151128 - v001
Enrico Busto
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
Next Dimension Inc.
 
Ai recent trends in technology v3
Ai   recent trends in technology v3Ai   recent trends in technology v3
Ai recent trends in technology v3
Sibasish Chowdhury
 
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
Geoffrey Fox
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
EMC
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
Megatris Comp
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
sahunamita10
 

What's hot (20)

Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of Intelligence
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Machine Learning Risk Management
Machine Learning Risk ManagementMachine Learning Risk Management
Machine Learning Risk Management
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
Smart Data 2017 #AI & #FutureofWork
Smart Data 2017 #AI & #FutureofWorkSmart Data 2017 #AI & #FutureofWork
Smart Data 2017 #AI & #FutureofWork
 
NUS-ISS Learning Day 2018-Painting Today's digital landscape
NUS-ISS Learning Day 2018-Painting Today's digital landscapeNUS-ISS Learning Day 2018-Painting Today's digital landscape
NUS-ISS Learning Day 2018-Painting Today's digital landscape
 
Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know Machine Learning: What Assurance Professionals Need to Know
Machine Learning: What Assurance Professionals Need to Know
 
Hadoop, Iot and Analytics- The Three Musketeers
Hadoop, Iot and Analytics- The Three MusketeersHadoop, Iot and Analytics- The Three Musketeers
Hadoop, Iot and Analytics- The Three Musketeers
 
Introduction to AI & ML
Introduction to AI & MLIntroduction to AI & ML
Introduction to AI & ML
 
Developing cognitive applications v1
Developing cognitive applications v1Developing cognitive applications v1
Developing cognitive applications v1
 
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
Fairness and Transparency: Algorithmic Explainability, some Legal and Ethical...
 
Prepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolutionPrepping the Analytics organization for Artificial Intelligence evolution
Prepping the Analytics organization for Artificial Intelligence evolution
 
Wiki stage 20151128 - v001
Wiki stage   20151128 - v001Wiki stage   20151128 - v001
Wiki stage 20151128 - v001
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
Ai recent trends in technology v3
Ai   recent trends in technology v3Ai   recent trends in technology v3
Ai recent trends in technology v3
 
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
AI-Driven Science and Engineering with the Global AI and Modeling Supercomput...
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
 

Similar to influence of AI in IS

AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
Ganesan Narayanasamy
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
Embarcados
 
Model governance in the age of data science & AI
Model governance in the age of data science & AIModel governance in the age of data science & AI
Model governance in the age of data science & AI
QuantUniversity
 
Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...
Analytics India Magazine
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
Alejandro Correa Bahnsen, PhD
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
AnandSRao1962
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
tlcj97
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawler
IoTCrawler
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Machine Learning Project Lifecycle
Machine Learning Project LifecycleMachine Learning Project Lifecycle
Machine Learning Project Lifecycle
Abdelhak MAHMOUDI
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Kalilur Rahman
 
AI for Software Engineering
AI for Software EngineeringAI for Software Engineering
AI for Software Engineering
Miroslaw Staron
 
Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems
Gautam Siwach
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
StampedeCon
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
 
Using Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIsUsing Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIs
Rakuten Group, Inc.
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
Diego Oppenheimer
 

Similar to influence of AI in IS (20)

AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
 
Model governance in the age of data science & AI
Model governance in the age of data science & AIModel governance in the age of data science & AI
Model governance in the age of data science & AI
 
Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawler
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Machine Learning Project Lifecycle
Machine Learning Project LifecycleMachine Learning Project Lifecycle
Machine Learning Project Lifecycle
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
 
AI for Software Engineering
AI for Software EngineeringAI for Software Engineering
AI for Software Engineering
 
Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Using Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIsUsing Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIs
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

influence of AI in IS

  • 2. Agenda • Artificial Intelligence • Industries and Jobs • Adoption • Drivers and variations • Machine Learning • Training Types • Deep Learning • Implementation & Products • Internet of Things (IoT) • Issues with IoT • Attacks • Security Analytics • Usage of Data • Advantages, Disadvantages, Recommendation & Conclusion • Summary • Q & A 2
  • 5. What is AI? 1:a branch of computer science dealing with the simulation of intelligent behavior in computers 2:the capability of a machine to imitate intelligent human behavior • AI Effect  Problems already resolved are considered not AI. • Originally coined by Standard computer scientist in 1956 • https://en.wikipedia.org/wiki/Artificial_intelligence 5
  • 6. Continued (1).. • AI is a science and technology based on disciplines such as: • Data science • Biology • Psychology • Mathematics • Engineering • Linguistics 6
  • 7. Continued (2).. • The main goal of AI is to create technology that allows computers and machines to function in an intelligent manner. Following are the problems AI tries to resolve: • Learning • Natural Language Processing • Reasoning and problem solving • Planning • Creativity • Social Intelligence • General Intelligence • Knowledge representation • Perception • Motion and manipulation 7
  • 8. Around Us • Product Recommendation  Amazon, Netflix • Natural language translation  Google, Microsoft • Spam detection  Google, Yahoo, MS, FB, Twitter • Siri  Apple’s personal assistant • Games  Call of Duty and Far Cry • Customer Support  Chat Bots 8
  • 11. Regional Adoption • TAQNIA can automatically detect and monitor unusual activities across vast amounts of terrain using Simularity AI software • Dubai Electricity and Water Authority use AI to answer customer enquiries in both English and Arabic, through a 24- hour chatbot. • AI Gernas – Drone for traffic mgmt. 11
  • 12. AI Jobs • Manufacturing workers (19%) • Banking (18%) • Construction (10%) • Public transport (9%) • Financial analysis (9%) • Insurance companies (8%) • Taxi Drivers (7%) • Farming (6%) • Policing/Security (5%) • Healthcare/hospitals (4%) • Science (4%) http://uk.businessinsider.com/industries-most-under-threat-from-artificial-intelligence-2017-6/#11-science-4-1 Oxford University study predicted 47% of jobs could be automated by 2033. 12
  • 15. Key Drivers • Computing performance and speed • Advances in the implementation of Algorithms • Ease of collecting data 15
  • 16. AI Variations • Strong AI  Simulate the actual human intelligence (Not Yet) • Weak AI  Exhibit certain criteria but not all (Deep Blue) • AI between  Inspired by human reasoning (IBM Watson) • General AI  Ability to reason in general (Solve any problem) • Narrow AI  Machines designed for specific purpose (Many) 16
  • 19. What is ML? 19 In a 2015 report, ISACA defined machine learning as: The use of computing resources that have the ability to learn (acquire and apply knowledge and skills that maximize the chance of success). These cognitive systems have the potential to learn from business related interactions and deliver evidence-based responses to transform how organizations think, act and operate. http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/innovation-insights.aspx
  • 21. Malware Detection • From Incident Response • Is a file or event malicious? (Yes, No) • If malicious, what type of malware is it? (Trojan, Worm, etc.) • How can I quantify the risks of the attach? (High, Medium, Low) • How can I determine if the attack is part of a larger campaign against my infrastructure? (APT, spear phishing) • How likely am I to get hit again? (Next hour, week, month) 21
  • 22. Traditional Approaches • Static • Packet, file type and size • Static property signatures • Scalable but lacks coverage • Behavioral • Manually create “behavioral signatures” • Better coverage, but not always scalable • Reputation • “Crowdsourcing” the detection • Can’t detect targeted threats 22
  • 25. ML Training Methods • Supervised Learning • Unsupervised Learning • Semi-supervised Learning • Reinforcement Learning 25
  • 30. Reinforcement Learning • Deep Mind’s Go Game is based on this. 30 https://youtu.be/TnUYcTuZJpM
  • 31. Machine Learning Flow • Data Collection  Collecting data ahead of time • Data Cleaning  Combining multiple data source, normalize • Generate features  Max info is extracted from the data • Model Supervised / Unsupervised Learning • Label events output • Use feedback to improve model 31
  • 32. ML Algorithms • Linear Regression • Logistic Regression • Decision Tree • SVM • Naive Bayes • KNN • K-Means • Random Forest • Dimensionality Reduction Algorithms • Gradient Boosting algorithms • GBM • XGBoost • LightGBM • CatBoost 32
  • 33. Deep Learning • Study of artificial neural networks and related machine learning algorithms that contain more than one hidden layer • Type of machine learning inspired by the connections between neurons in the human brain. Researchers developed a man-made imitation of this biological connectivity known as artificial neural networks (commonly known as neural nets). • Deep learning can use both the common supervised learning technique and the more complex and cutting edge alternative of unsupervised learning. 33
  • 37. Continued (2) • Common considerations include whether the tool will be a standalone solution or integrated with an SIEM. • It can also be part of a security operations center (SOC) with red and blue teams harnessing it or another layer in the architecture where resources are tight. • It can be connected through a network switch SPAN port and collect the data • A stand-alone server or VM with lots of training data, huge processing power & python https://securityintelligence.com/why-machine-learning-is-an-essential-tool-in-the-cisos-arsenal/ 37
  • 38. Implementation Approach • Use case definition  Determine the requirement you would want to address (phishing, privilege users, malware, etc.) • Pick Organization subsets  For PoC, pick couple of departments from company • Get Source access  Solutions need access to certain files, to operate • Understand the results  ML solutions deliver probabilistic results based on a percentage. The solution must provide supporting evidence when it flags an event so that analysts can act on it. 38
  • 39. Choosing a AI Vendor • Vendor is using ML or AI ( Strong, Narrow) • Technology used for Machine Learning (Deep learning, Reinforcement) • Limits of vendor’s ML • Maintenance cost of ML Technology https://www.csoonline.com/article/3211594/machine-learning/how-artificial-intelligence-fits-into-cybersecurity.html 39
  • 40. Security Products (AI & ML) • Password management • https://cups.cs.cmu.edu/meter/ • Windows 10 • Google Recaptcha • AI Powered AntiVirus Software • Oracle Identity SOC & Management cloud https://rasoolirfan.com/2017/05/02/ai-cybersecurity/ 40
  • 41. Issues with ML • ML is bad when there’s massive variation in the data that makes training useless. • Like any other technology, machine learning is not something you can install once and forget about. You need to assure continuous training with new datasets • If data is not reviewed, attack code can be injected in to a dataset. • If normal behavior is not defined properly, attack is missed due to false positive 41
  • 42. ML Summary • Machine learning is a type of artificial intelligence that enables computers to detect patterns and establish baseline behavior using algorithms that learn through training or observation. • Ideal for detecting insider threats, zero day attacks coupled with behavioral analysis machine learning is able to process and analyze vast amounts of data that are simply impractical for humans. • Know your data. Without applying domain expertise to your dataset, the result will be an overload of alerts and false positives. 42
  • 43. Internet of Things (IoT) 43 https://youtu.be/uFy_Pi1Smxk
  • 45. Growth of IoT • The IoT’s growth will in turn drive an exponential rise in the volumes of data being generated. • IDC estimating that the number of devices connected to the Internet will surge from 11 billion in 2016 to 80 billion in 2025 • Generating 180 zettabytes of data every year, up from 4.4 zettabytes in 2013 and 44 zettabytes in 2020. https://www.pwc.com/gx/en/industries/communications/assets/pwc-ai-and-iot.pdf 45
  • 46. IoT Devices • Smartphones • Tablets • Smart TVs • Smart Lighting Systems • Smart HVAC Systems • Security Cameras and Systems • Wireless Keyboards • Wireless Mouses' • Wireless Headsets • DVRs • Smart Cameras • MiFi-like Routers and Hotspots 46
  • 47. Security Issues.. • Encryption  IoT & Cloud is open • Authentication  Unsecure end points • Firmware updates  Outdated version • Privacy  Personal data is readily available • Web interface  Prone to SQL & cross-site scripting • Backdoor  Poorly developed system https://www.networkworld.com/article/3200030/internet-of-things/researchers-find-gaps-in-iot-security.html 47
  • 48. Attack on IoT Devices • Continuously scan the internet for the IP address of Internet of things (IoT) devices. • Using a table of more than 60 common factory default usernames and passwords, and logs into them to infect them with the Mirai malware. • This piece of malicious code took advantage of devices running out-of-date versions of the Linux kernel and relied on the fact that most users do not change the default usernames/passwords on their devices • Took down GitHub, DYN, Netflix, Krebs, Twitter, and a number of other major websites 48
  • 51. IoT Summary • Access controls for IoT devices • Endpoint devices has to be hardened • Information flow control has to be controlled • Encryption between IoT and Cloud has to be with SSL/TLS • Vendor patches to be rigorously tested and applied • Authentication has to strong • Data collected for AI need to be protected 51
  • 53. Too Much of Data • The global median time from compromise to discovery has dropped significantly from 146 days in 2015 to 99 days 2016, but it is still not good enough. • So it still takes 99 days to fix a critical vulnerability. • Big Data is differentiated from traditional technologies in three ways: the amount of data (volume), the rate of data generation and transmission (velocity), and the types of structured and unstructured data (variety) https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html 53
  • 54. Security Detection • 1st Generation  IDS • Layered security • Prevention impossible • 2nd Generation  Security Information & Event Management (SIEM) • Present actionable information to security analyst • Correlate alerts from different IDS sensors • 3rd Generation  Security Analytics for Security • Contextual security analytics • Long-term correlation https://www.infosecurity-magazine.com/opinions/big-data-security-privacy/ 54
  • 57. Security Analytics Summary • Time to Respond • Key Arsenal for Incident Responders • Integrate with existing security products • Continuous feedback • Know to reduce False Positives 57
  • 59. Advantages • User Behavior Analysis (UBA) • Data Theft • Prediction of Threats • Risk Assessment • Management of data • Anomaly Detection • Better Incident Response 59 http://www.securityweek.com/role-artificial-intelligence-cyber-security
  • 60. Disadvantages • Limitations of Data (CIA) • AI driven ransomware/malware • Privacy of Data • Legal aspects of data analysis • Unable to predict the possibilities 60
  • 61. Recommendation • The four critical steps they can take to do this are: • Define a clear strategy on the expectations and value from the AI systems. This should be clear and approved by the board. • Perform a risk assessment that highlights the financial, regulatory, brand reputation implications from a malfunction in the AI system. • Recognize clearly that the Business requires a strategic Security & Privacy posture for the AI system to fully transform the business. • Intelligent systems have to be Cyber resilient to support the intelligent systems, without which there is more potential for a negative impact as opposed to the intended positive value from AI systems. 61
  • 62. Conclusion • Synergy. Program computers to do the grunt work and leave humans to the decision-making, incident management and follow-up. • AI is not a silver bullet. Experts suggest using it to automate mundane and repetitive tasks, not as a replacement for human judgment. • Hackers are still using old standbys—stealing passwords, simple malware, social engineering, etc. AI-generated attacks in the wild aren’t (yet) common. 62 https://youtu.be/TnUYcTuZJpM
  • 63. Summary • Artificial Intelligence • Machine Learning • Internet of Things (IoT) • Security Analytics • Advantages & Disadvantages 63