I am delighted to announce the titles of my upcoming presentations for the 2023 Black Hat ConferenceThe "Black Hat" conference is a well-known event in the cybersecurity world. It brings together security experts, researchers, hackers, and IT professionals to discuss and share the latest information on cybersecurity threats, vulnerabilities, and trends. The conference features presentations and workshops on various aspects of security and is known for revealing new hacking techniques and security tools. It's an important venue for professionals in the field to stay updated on emerging security issues and to learn about advanced methods to protect against cyber threats.
See More...
See Less...
, both scheduled for August 10th. Here's a glimpse into what you can expect.
From Chaos to Clarity: Leveraging AI and Machine Learning to Unravel Insider Threats and Nation-State Attacks
In this comprehensive session, I'll unveil how AIA branch of computer science that focuses on creating systems capable of performing tasks that typically require human intelligence. These tasks include learning, reasoning, problem-solving, perception, and language understanding. AI can be categorized into narrow or weak AI, which is designed for specific tasks, and general or strong AI, which has the capability of performing any intellectual task that a human being can.
See More...
See Less...
and Machine LearningMachine Learning is a subset of artificial intelligence (AI) focused on building systems that learn from data. It enables computers to improve their performance on a specific task with data, without being explicitly programmed. This involves algorithms that can identify patterns, make decisions with minimal human intervention, and predict outcomes based on historical data.
See More...
See Less...
, when applied innovatively, can untangle the intricacies of insider threatsA security risk that originates from within the targeted organization, typically involving current or former employees, contractors, or business associates who have inside information concerning the organization's security practices, data, and computer systems. An insider threat can manifest in malicious actions such as theft of proprietary information, sabotage of systems, or data breaches, as well as unintentional actions that inadvertently cause harm or expose sensitive data.
See More...
See Less...
and nation-state attacksRefers to a cyber attack initiated by a country against another country, organization, or individual. It typically involves sophisticated techniques and is motivated by political, economic, or military objectives.
See More...
See Less...
, formidable challenges in our digital era.
Following this, my 20-minute capsule presentation, "Contextualized AI: Unleashing Cybersecurity'sCybersecurity refers to the practice of protecting computers, networks, programs, and data from unauthorized access, damage, or attack. It involves a range of strategies and technologies designed to safeguard digital assets from cyber threats like hacking, viruses, and data breaches. Cybersecurity measures are essential to prevent sensitive information from being stolen or tampered with, and to ensure the smooth functioning of digital systems. This field is increasingly important in our connected world, where a lot of personal, financial, and business activities are conducted online.
See More...
See Less...
Most Powerful Ally to Combat Insider Threats and APTsAn Advanced Persistent Threat (APT) refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are often conducted by sophisticated attackers, such as nation-states or state-sponsored groups, targeting sensitive information.
See More...
See Less...
", will delve deeper. Here, I'll specifically spotlight how AI/MLMachine Learning is a subset of artificial intelligence (AI) focused on building systems that learn from data. It enables computers to improve their performance on a specific task with data, without being explicitly programmed. This involves algorithms that can identify patterns, make decisions with minimal human intervention, and predict outcomes based on historical data.
See More...
See Less...
can shield digital systems against the subtleties of insider threats and Advanced Persistent ThreatsAn Advanced Persistent Threat (APT) refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are often conducted by sophisticated attackers, such as nation-states or state-sponsored groups, targeting sensitive information.
See More...
See Less...
(APTs).
Drawing from my experience in the cybersecurity domain, I've recognized the imperative of leveraging disparate dataData, in everyday terms, refers to pieces of information stored in computers or digital systems. Think of it like entries in a digital filing system or documents saved on a computer. This includes everything from the details you enter on a website form, to the photos you take with your phone. These pieces of information are organized and stored as records in databases or as files in a storage system, allowing them to be easily accessed, managed, and used when needed.
See More...
See Less...
sources, and applying machine learning to tackle evolving and intricate threats. My upcoming presentations encapsulate stories from real investigations and deliver deep insights on how to find and detect insider threats and nation-state attackers, charting a path toward a more resilient digital future.
Join me at Black Hat 2023 for a deep dive into these subjects and let's push the boundaries of cybersecurity together. Circle August 10th in your diaries; I look forward to a dynamic discussion.
About Black Hat
Black Hat stands as the leading global event series for the cybersecurity community, bringing together top security professionals from all corners of the world. Attracting over 19,000 attendees, its flagship conference, Black Hat USA, returns to the Mandalay Bay Convention Center in Las Vegas, showcasing state-of-the-art research, pioneering techniques, and inventive tools to tackle the most urgent cybersecurity challenges of our time. The event begins with 4 days of Trainings (August 5-8) and continues with the main conference (August 9-10), offering attendees hands-on training, expert briefings, and networking opportunities with like-minded professionals. This encourages collaboration and the sharing of knowledge to forge a more secure digital landscape.
See you there!