Presentation is loading. Please wait.

Presentation is loading. Please wait.

Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.

Similar presentations


Presentation on theme: "Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential."— Presentation transcript:

1 Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential

2 Escalation of Cyber Crime
Loss of function is the new weapon With many intelligent devices independently processing, data and control must be secured at every point Protect new vulnerabilities Detect intruders fast Recover quickly from an attack 280% increase in attacks on IoT devices1 146 days median time an attacker stays within a network without detection2 ~46 days recover time from an attack3 ~$20K daily cost of an attack3 Source: 2018, Gartner, Inc

3 Coding Makes a Machine Intelligent
Subsets of AI can be applied to solving human problems in different ways Artificial intelligence (AI) mimics human behavior. Deep learning (DL) A subset of ML which uses deep artificial neural networks Chatbots, media delivery Deep learning Machine learning (ML) Algorithms that allow computers to learn from examples Machine learning Autonomous Driving Artificial intelligence Airframe Production

4 Hackers Use Artificial Intelligence Coding
Bypassing CAPTCHA Improving Phishing Evasive Malware A reported 76% of organizations fell victim to phishing attacks in 2017. AI identifies valuable targets and quickly develop a profile of that target based on what they have tweeted in the past. Using this approach targets click on malicious links 30% of the time (compared to the 5-15% success rate of other automated approaches). AI performs checks to identify hardware configurations and if a human is operating the machine DeepLocker’s AI is trained to ensure that its payload only executes when it reaches a specific target, relying on three layers of concealment to prevent security tools from identifying the threat. Using AI techniques, researchers at Columbia were able to get by Google reCAPTCHA 98% of the time. Source: Artificial Intelligence Part 2: Cyber Criminals Get Smart with AI, August 27, 2018, Stephen Helm

5 We Need AI Coding for Protection
1. iBOT Detection Actionable data 2. Network Protection Algorithms 3. Fraud Detection Compute power 4. IT Infrastructure Protection

6 Thank you


Download ppt "Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential."

Similar presentations


Ads by Google