SlideShare a Scribd company logo
Combating
Cybersecurity
Threats with AI and Machine Learning
Col Inderjeet Singh
CIO , Vara United Ltd
"The development of full artificial intelligence could
spell the end of the human race.” - Stephen Hawking,
theoretical physicist, cosmologist, author
“I don’t understand why some people are not
concerned” – Bill Gates, co-founder of Microsoft
Kalashnikovs of tomorrow
Man or Machine? Advanced Behavioral Attacks
Imagine a business email
compromise attack
you get an email to wire payment for an
invoice from the CFO
The email is written from your CFO
natural language processing from emails
You’re suspicious and call the CFO
But your phone is compromised
You’re connected to adversary who has
a speechbot with your CFO’s Voice
Science fiction or possible today?
https://www.youtube.com/watch?v=Nu-nlQqFCKg
Microsoft Real-Time Translation (2012)
1950s – 2000s
AI & ML
core developments
multi-industry
before
Is AI/ML New? No*
2006
deep learning
Netflix Prize
2014 2016 2018
ensembling
decision trees
CAML
deep learning
(mobile)
AI services
ImageNet
after
2008 2009 2012
Fourth Industrial Revolution
AI is contributing to a the transformation of society at a rate
that is 10 times faster and at 300 times the scale, with an
estimated impact that is 3000 times of the 1st Industrial
Revolution.
- McKinsey Global Institute
Robotic Process Automation Machine Learning Algorithms
Artificial Intelligence
Applications of Artificial Intelligence
Healthcare
Military
Cyber Security
Finance
Accounting & Law
Surgical System Prosthetic Limbs
Space Program All-in-one Floor Cleaner
Your Digital Secretary
Walk Like a Man
Self-driving cars
The AI and ML Revolution is Here
AI and ML Demystified / @carologic / MWUX2017
Decision Making: Self Driving (autonomous) vehicles
Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University
24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands-
free_Driving.jpg
DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
The AI and ML Revolution is Here
AI-generated art
L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style
https://arxiv.org/pdf/1508.06576v1.pdf
The AI and ML Revolution is Here
Computational perception – face recognition (and speech, text, social, video, etc.)
https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face-
verification.pdf
The AI and ML Revolution is Here
#RSAC
The Current Cyber Landscape Favors
Malicious Actors
SEC reveals it was hacked, information may have
been used for illegal stock trades
in October or November 2016, but wasn’t discovered
by the firm until March 2017
The Cost of Cyber Security Operations
Continues to Increase without Mitigating Risk
Anthem: Hacked Database Included 78.8 Million People
”Big Four” accounting firm Deloitte was likely breached
Global information solutions company, Equifax, has reported a major
cybersecurity incident affecting 143 million consumers in the US.
Most cybersecurity Attacks today are automated, from
AI-powered Distributed Denial of Service (DDOS)
attacks to phishing scams and ransomware.
You Can’t Afford To Stay Stagnant:
• In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to
be worth more than $150 billion.
• Global cybersecurity spending will exceed $1 trillion from 2017 to 2021
• The cybersecurity market grew by roughly 35 X over 13 years.
• We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the
8-10 % projected over the next five years.
The Increased Threat Landscape
• $1 billion: Cost of ransomware attacks alone last year
• $158: Average global cost of data breach per lost or stolen record
• 25% of large organizations experience recurring incidents
• 229 days: the average time to identify a malicious attack
Cylance,Inc.Confidential
The Future of Security
Past Present Future
AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE
SPOND
Pre-Execution
Humans Needed
Post-Execution
Pre-Execution
No Humans
Threat actors could also employ AI tools to discover new vulnerabilities and design
exploits and other attacks, in a fraction of the time it's taking them now.
AI could be used as an effective tool to help them decide what, who and when to
attack.
Looking into the heart of AI’s Dark Secret
What’s inside the box?
Algorithmic regulation –
where and how?
Are we willing to let
machines make decisions
we don’t understand?
Self modifying algorithms
– who to interrogate?
#RSAC
AI fighting
Cybercrime
Applications of AI in Cyber Security
• Intrusion detection
• Examples
– Malicious JavaScript and other scripts
– Malicious Non-Executable Files
– Malicious Executable Files
• Inappropriate Web and Email Content
• Phishing
– Derive probabilistic models of phishing attacks
– Derive probabilistic reputation models for URLs
• Make Security Simple
• AI not only improves efficacy, it also changes the deployment
model and makes cybersecurity implementation and operation
a seamless, smooth process.
• Because of the advanced features of ML, you no longer employ
traditional AV technology and tactics, including:
• Incremental storage
• Scanning machines
• Re-imaging machines
• You can remove large endpoint agents that create performance
friction for enterprise users.
AI Changes the Deployment Game
• Use minimal system resources (1-2% CPU usage and 40-
50 MB of memory)
• Prevent attacks with superior speed (in milliseconds)
• Replace ineffective traditional AV tools (or augment
existing security)
• Achieve efficacy rates of greater than 99% (compared to
50-60% with antiquated signature-based AV)
AI and Machine Learning Helps You:
AI / ML Adoption
Benefits
Automated protection
Faster response and protection
Personalization
Learn to adapt to me, unobtrusively
Usability
Drivers
Scaling and velocity
Humans are slow
Humans are
expensive Data
growth
Automation
Threats evolve. Do you?
Sophistication
Complex threats
360-degree protection
Firewalls talking to email servers
and endpoints
Doing AI & ML (Correctly) is Hard!
FEATURES / DIMENSIONS
• Static attributes
• Dynamic behaviors
• Reputation
• Relations
• Sequential state
ADVANCED TECHNIQUES
• Ensembling
• Boosting
• Sequential Learning
• Deep Learning
• Automation at Scale
BOUNTIFUL DATA
• 9 Trillion rows of security data
• 4.5B queries processed daily from 175M
endpoint devices
• 2B emails scanned daily
• 1B previously unseen web requests
scanned daily
• Outputs from other systems & products
LEADING EXPERTS
• Dedicated org of recognized
machine learning experts
• Experts-attack
investigation team
• Centuries of combined ML
experience
The Future of AI & ML in Cybersecurity
now
Superpowers for analysts
hunting for targeted spearphishing attacks 100x
faster
Threat detection systems that learn to
learn Real-time conversation monitoring
for
social engineering, cyberbullying, fake news,
help,
etc.
future
Predictive Protection
AI / ML that anticipates attacks and automatically reconfigures for
protection.
The Future of AI & ML in Cybersecurity
Fighting an existential threat?
Reach me on Social Media:
Facebook: Technology Evangeist Twitter Handle: @InderBarara
LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/
Email me at: inderjit.barara@gmail.com
Thanx
Ad

More Related Content

What's hot (20)

AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
Faction XYZ
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Eng Hasan Shamroukh CISCO Exams Author
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
AI in security
AI in securityAI in security
AI in security
Subrat Panda, PhD
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
SmartlearningUK
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
Faction XYZ
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
RajathV2
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
SmartlearningUK
 

Similar to Combating Cyber Security Using Artificial Intelligence (20)

AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Group 8 Advanced Cybersecurity Applications using AI.pptx
Group 8 Advanced Cybersecurity Applications using AI.pptxGroup 8 Advanced Cybersecurity Applications using AI.pptx
Group 8 Advanced Cybersecurity Applications using AI.pptx
apsapssingh9
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptxstanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
CalvinLim55
 
2024 Security Outlook & Essential Security Practices
2024 Security Outlook & Essential Security Practices2024 Security Outlook & Essential Security Practices
2024 Security Outlook & Essential Security Practices
Dan Houser
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
Eoin Keary
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
Bill Gibbs
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
SiskaFitrianingrum
 
#AI: In Whose Image?
#AI: In Whose Image?#AI: In Whose Image?
#AI: In Whose Image?
George Tilesch
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
Juan Carlos Olivares Rojas
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
DATA SECURITY SOLUTIONS
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
imoliviabennett
 
AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024
Michael Noel
 
THE FUTURE TRENDS OF IT with slide .pptx
THE FUTURE TRENDS OF IT with slide .pptxTHE FUTURE TRENDS OF IT with slide .pptx
THE FUTURE TRENDS OF IT with slide .pptx
Raashidh
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptxicon-aiincs-obusolini201809131800-190310184140.pptx
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Group 8 Advanced Cybersecurity Applications using AI.pptx
Group 8 Advanced Cybersecurity Applications using AI.pptxGroup 8 Advanced Cybersecurity Applications using AI.pptx
Group 8 Advanced Cybersecurity Applications using AI.pptx
apsapssingh9
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptxstanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
CalvinLim55
 
2024 Security Outlook & Essential Security Practices
2024 Security Outlook & Essential Security Practices2024 Security Outlook & Essential Security Practices
2024 Security Outlook & Essential Security Practices
Dan Houser
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
Eoin Keary
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
Bill Gibbs
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
SiskaFitrianingrum
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
imoliviabennett
 
AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024
Michael Noel
 
THE FUTURE TRENDS OF IT with slide .pptx
THE FUTURE TRENDS OF IT with slide .pptxTHE FUTURE TRENDS OF IT with slide .pptx
THE FUTURE TRENDS OF IT with slide .pptx
Raashidh
 
Ad

More from Inderjeet Singh (7)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Inderjeet Singh
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
Inderjeet Singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
Inderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Inderjeet Singh
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
Inderjeet Singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
Inderjeet Singh
 
Ad

Recently uploaded (20)

Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 

Combating Cyber Security Using Artificial Intelligence

  • 1. Combating Cybersecurity Threats with AI and Machine Learning Col Inderjeet Singh CIO , Vara United Ltd
  • 2. "The development of full artificial intelligence could spell the end of the human race.” - Stephen Hawking, theoretical physicist, cosmologist, author “I don’t understand why some people are not concerned” – Bill Gates, co-founder of Microsoft
  • 4. Man or Machine? Advanced Behavioral Attacks Imagine a business email compromise attack you get an email to wire payment for an invoice from the CFO The email is written from your CFO natural language processing from emails You’re suspicious and call the CFO But your phone is compromised You’re connected to adversary who has a speechbot with your CFO’s Voice Science fiction or possible today? https://www.youtube.com/watch?v=Nu-nlQqFCKg Microsoft Real-Time Translation (2012)
  • 5. 1950s – 2000s AI & ML core developments multi-industry before Is AI/ML New? No* 2006 deep learning Netflix Prize 2014 2016 2018 ensembling decision trees CAML deep learning (mobile) AI services ImageNet after 2008 2009 2012
  • 6. Fourth Industrial Revolution AI is contributing to a the transformation of society at a rate that is 10 times faster and at 300 times the scale, with an estimated impact that is 3000 times of the 1st Industrial Revolution. - McKinsey Global Institute
  • 7. Robotic Process Automation Machine Learning Algorithms Artificial Intelligence
  • 8. Applications of Artificial Intelligence Healthcare Military Cyber Security Finance Accounting & Law
  • 9. Surgical System Prosthetic Limbs Space Program All-in-one Floor Cleaner Your Digital Secretary Walk Like a Man
  • 10. Self-driving cars The AI and ML Revolution is Here
  • 11. AI and ML Demystified / @carologic / MWUX2017 Decision Making: Self Driving (autonomous) vehicles Junior, a robotic Volkswagen Passat, in a parking lot at Stanford University 24 October 2009, By: Steve Jurvetson https://en.wikipedia.org/wiki/File:Hands- free_Driving.jpg DISRUPTING – AUTO,TRANSPORTATION, PARKING, CITY PLANING
  • 12. The AI and ML Revolution is Here
  • 13. AI-generated art L. Gatys, A.S. Ecker and M. Bethge, A Neural Algorithm of Artistic Style https://arxiv.org/pdf/1508.06576v1.pdf The AI and ML Revolution is Here
  • 14. Computational perception – face recognition (and speech, text, social, video, etc.) https://research.fb.com/wp-content/uploads/2016/11/deepface-closing-the-gap-to-human-level-performance-in-face- verification.pdf The AI and ML Revolution is Here
  • 15. #RSAC The Current Cyber Landscape Favors Malicious Actors SEC reveals it was hacked, information may have been used for illegal stock trades in October or November 2016, but wasn’t discovered by the firm until March 2017 The Cost of Cyber Security Operations Continues to Increase without Mitigating Risk Anthem: Hacked Database Included 78.8 Million People ”Big Four” accounting firm Deloitte was likely breached Global information solutions company, Equifax, has reported a major cybersecurity incident affecting 143 million consumers in the US. Most cybersecurity Attacks today are automated, from AI-powered Distributed Denial of Service (DDOS) attacks to phishing scams and ransomware.
  • 16. You Can’t Afford To Stay Stagnant: • In 2004, the global cybersecurity market was worth $3.5 billion — and in 2018 we expect it to be worth more than $150 billion. • Global cybersecurity spending will exceed $1 trillion from 2017 to 2021 • The cybersecurity market grew by roughly 35 X over 13 years. • We anticipate 12-15 % Y-o -Y cybersecurity market growth through 2021, compared to the 8-10 % projected over the next five years. The Increased Threat Landscape • $1 billion: Cost of ransomware attacks alone last year • $158: Average global cost of data breach per lost or stolen record • 25% of large organizations experience recurring incidents • 229 days: the average time to identify a malicious attack
  • 17. Cylance,Inc.Confidential The Future of Security Past Present Future AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RE SPOND Pre-Execution Humans Needed Post-Execution Pre-Execution No Humans Threat actors could also employ AI tools to discover new vulnerabilities and design exploits and other attacks, in a fraction of the time it's taking them now. AI could be used as an effective tool to help them decide what, who and when to attack.
  • 18. Looking into the heart of AI’s Dark Secret What’s inside the box? Algorithmic regulation – where and how? Are we willing to let machines make decisions we don’t understand? Self modifying algorithms – who to interrogate?
  • 20. Applications of AI in Cyber Security • Intrusion detection • Examples – Malicious JavaScript and other scripts – Malicious Non-Executable Files – Malicious Executable Files • Inappropriate Web and Email Content • Phishing – Derive probabilistic models of phishing attacks – Derive probabilistic reputation models for URLs
  • 21. • Make Security Simple • AI not only improves efficacy, it also changes the deployment model and makes cybersecurity implementation and operation a seamless, smooth process. • Because of the advanced features of ML, you no longer employ traditional AV technology and tactics, including: • Incremental storage • Scanning machines • Re-imaging machines • You can remove large endpoint agents that create performance friction for enterprise users. AI Changes the Deployment Game
  • 22. • Use minimal system resources (1-2% CPU usage and 40- 50 MB of memory) • Prevent attacks with superior speed (in milliseconds) • Replace ineffective traditional AV tools (or augment existing security) • Achieve efficacy rates of greater than 99% (compared to 50-60% with antiquated signature-based AV) AI and Machine Learning Helps You:
  • 23. AI / ML Adoption Benefits Automated protection Faster response and protection Personalization Learn to adapt to me, unobtrusively Usability Drivers Scaling and velocity Humans are slow Humans are expensive Data growth Automation Threats evolve. Do you? Sophistication Complex threats 360-degree protection Firewalls talking to email servers and endpoints
  • 24. Doing AI & ML (Correctly) is Hard! FEATURES / DIMENSIONS • Static attributes • Dynamic behaviors • Reputation • Relations • Sequential state ADVANCED TECHNIQUES • Ensembling • Boosting • Sequential Learning • Deep Learning • Automation at Scale BOUNTIFUL DATA • 9 Trillion rows of security data • 4.5B queries processed daily from 175M endpoint devices • 2B emails scanned daily • 1B previously unseen web requests scanned daily • Outputs from other systems & products LEADING EXPERTS • Dedicated org of recognized machine learning experts • Experts-attack investigation team • Centuries of combined ML experience
  • 25. The Future of AI & ML in Cybersecurity now Superpowers for analysts hunting for targeted spearphishing attacks 100x faster Threat detection systems that learn to learn Real-time conversation monitoring for social engineering, cyberbullying, fake news, help, etc. future
  • 26. Predictive Protection AI / ML that anticipates attacks and automatically reconfigures for protection. The Future of AI & ML in Cybersecurity
  • 28. Reach me on Social Media: Facebook: Technology Evangeist Twitter Handle: @InderBarara LinkedIn: InderBarara Blog: https://technologyevaneglist.wordpress.com/ Email me at: [email protected] Thanx