Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.

Slides:



Advertisements
Similar presentations
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Securing Information Systems
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Computer Crime and Information Technology Security
What does “secure” mean? Protecting Valuables
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer & Network Security
Information Warfare Playgrounds to Battlegrounds.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Hurdles in implementation of cyber security in India.
Information Warfare Playgrounds to Battlegrounds.
Azam Supervisor : Prof. Raj Jain
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Safe’n’Sec IT security solutions for enterprises of any size.
Information Systems Week 7 Securing Information Systems.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Artificial Intelligence. Real Threat Prevention.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Understanding and breaking the cyber kill chain
Proactive Incident Response
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Teck Chia Partner, Exponent.vc
Social Media Attacks.
Adversary playbook.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Active Cyber Security, OnDemand
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Conquering all phases of the attack lifecycle
Cyber Security Awareness Workshop
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
4 ways to stay safe online 1. Avoid viruses and phishing scams
AI in Cyber-security: Examples of Algorithms & Techniques
Threat Landscape for Data Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Security Agility: Creating a Multi-Disciplinary Framework
Week 7 Securing Information Systems
Strong Security for Your Weak Link:
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Artificial Intelligence Changes the Security Landscape
Home Internet Vulnerabilities
Four Generations of Security Devices Putting IDS in Context
Securing the Threats of Tomorrow, Today.
Chapter 21:Security Beyond Computer Networks: Information Assurance
Alysia Gooden | November 29th 2018
Faculty of Science IT Department By Raz Dara MA.
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Anatomy of a Large Scale Attack
Integrating Deep Learning with Cyber Forensics
Overview of deep learning
Strategic threat assessment
Computer Security By: Muhammed Anwar.
Detection Detect the breach and protect the data. By,
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
IoT in Healthcare: Life or Death
Presentation transcript:

Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential

Escalation of Cyber Crime Loss of function is the new weapon With many intelligent devices independently processing, data and control must be secured at every point Protect new vulnerabilities Detect intruders fast Recover quickly from an attack 280% increase in attacks on IoT devices1 146 days median time an attacker stays within a network without detection2 ~46 days recover time from an attack3 ~$20K daily cost of an attack3 Source: 2018, Gartner, Inc

Coding Makes a Machine Intelligent Subsets of AI can be applied to solving human problems in different ways Artificial intelligence (AI) mimics human behavior. Deep learning (DL) A subset of ML which uses deep artificial neural networks Chatbots, media delivery Deep learning Machine learning (ML) Algorithms that allow computers to learn from examples Machine learning Autonomous Driving Artificial intelligence Airframe Production

Hackers Use Artificial Intelligence Coding Bypassing CAPTCHA Improving Phishing Evasive Malware A reported 76% of organizations fell victim to phishing attacks in 2017. AI identifies valuable targets and quickly develop a profile of that target based on what they have tweeted in the past. Using this approach targets click on malicious links 30% of the time (compared to the 5-15% success rate of other automated approaches). AI performs checks to identify hardware configurations and if a human is operating the machine DeepLocker’s AI is trained to ensure that its payload only executes when it reaches a specific target, relying on three layers of concealment to prevent security tools from identifying the threat. Using AI techniques, researchers at Columbia were able to get by Google reCAPTCHA 98% of the time. Source: Artificial Intelligence Part 2: Cyber Criminals Get Smart with AI, August 27, 2018, Stephen Helm

We Need AI Coding for Protection 1. iBOT Detection Actionable data 2. Network Protection Algorithms 3. Fraud Detection Compute power 4. IT Infrastructure Protection

Thank you