I am delighted to announce the titles of my upcoming presentations for the 2023 Black Hat ConferenceThe "Black Hat" conference is a well-known event in the cybersecurity world. It brings together security experts, researchers, hackers, and IT professionals to discuss and share the latest information on cybersecurity threats, vulnerabilities, and trends. The conference features presentations and workshops on various aspects of security and is known for revealing new hacking techniques and security tools. It's an important venue for professionals in the field to stay updated on emerging security issues and to learn about advanced methods to protect against cyber threats.
, both scheduled for August 10th. Here's a glimpse into what you can expect.
In this comprehensive session, I'll unveil how AIA branch of computer science that focuses on creating systems capable of performing tasks that typically require human intelligence. These tasks include learning, reasoning, problem-solving, perception, and language understanding. AI can be categorized into narrow or weak AI, which is designed for specific tasks, and general or strong AI, which has the capability of performing any intellectual task that a human being can. and Machine Learning A branch of computer science that focuses on creating systems capable of performing tasks that typically require human intelligence. These tasks include learning, reasoning, problem-solving, perception, and language understanding. AI can be categorized into narrow or weak AI, which is designed for specific tasks, and general or strong AI, which has the capability of performing any intellectual task that a human being can. , when applied innovatively, can untangle the intricacies of insider threats A security risk that originates from within the targeted organization, typically involving current or former employees, contractors, or business associates who have inside information concerning the organization's security practices, data, and computer systems. An insider threat can manifest in malicious actions such as theft of proprietary information, sabotage of systems, or data breaches, as well as unintentional actions that inadvertently cause harm or expose sensitive data. and nation-state In the context of cybersecurity, a nation-state refers to the involvement of national governments in cyber attacks or cyber espionage. These entities may engage in hacking to conduct espionage, influence geopolitics, or achieve strategic objectives, often using sophisticated methods and advanced technology. attacks, formidable challenges in our digital era.
Following this, my 20-minute capsule presentation, "Contextualized AI: Unleashing Cybersecurity'sCybersecurity refers to the practice of protecting computers, networks, programs, and data from unauthorized access, damage, or attack. It involves a range of strategies and technologies designed to safeguard digital assets from cyber threats like hacking, viruses, and data breaches. Cybersecurity measures are essential to prevent sensitive information from being stolen or tampered with, and to ensure the smooth functioning of digital systems. This field is increasingly important in our connected world, where a lot of personal, financial, and business activities are conducted online. Most Powerful Ally to Combat Insider Threats and APTs An Advanced Persistent Threat (APT) refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are often conducted by sophisticated attackers, such as nation-states or state-sponsored groups, targeting sensitive information. ", will delve deeper. Here, I'll specifically spotlight how AI/MLMachine Learning is a subset of artificial intelligence (AI) focused on building systems that learn from data. It enables computers to improve their performance on a specific task with data, without being explicitly programmed. This involves algorithms that can identify patterns, make decisions with minimal human intervention, and predict outcomes based on historical data. can shield digital systems against the subtleties of insider threats and Advanced Persistent Threats An Advanced Persistent Threat (APT) refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are often conducted by sophisticated attackers, such as nation-states or state-sponsored groups, targeting sensitive information. (APTs).
Drawing from my experience in the cybersecurity domain, I've recognized the imperative of leveraging disparate dataData, in everyday terms, refers to pieces of information stored in computers or digital systems. Think of it like entries in a digital filing system or documents saved on a computer. This includes everything from the details you enter on a website form, to the photos you take with your phone. These pieces of information are organized and stored as records in databases or as files in a storage system, allowing them to be easily accessed, managed, and used when needed. sources, and applying machine learning to tackle evolving and intricate threats. My upcoming presentations encapsulate stories from real investigations and deliver deep insights on how to find and detect insider threats and nation-state attackers, charting a path toward a more resilient digital future.
Join me at Black HatA hacker who violates computer security for malicious intent or personal gain. 2023 for a deep dive into these subjects and let's push the boundaries of cybersecurity together. Circle August 10th in your diaries; I look forward to a dynamic discussion.
Black Hat stands as the leading global event series for the cybersecurity community, bringing together top security professionals from all corners of the world. Attracting over 19,000 attendees, its flagship conference, Black Hat USA, returns to the Mandalay Bay Convention Center in Las Vegas, showcasing state-of-the-art research, pioneering techniques, and inventive tools to tackle the most urgent cybersecurity challenges of our time. The event begins with 4 days of TrainingsThe process of teaching an artificial intelligence (AI) system to make decisions or predictions based on data. This involves feeding large amounts of data into the AI algorithm, allowing it to learn and adapt. The training can involve various techniques like supervised learning, where the AI is given input-output pairs, or unsupervised learning, where the AI identifies patterns and relationships in the data on its own. The effectiveness of AI training is critical to the performance and accuracy of the AI system. (August 5-8) and continues with the main conference (August 9-10), offering attendees hands-on training, expert briefings, and networking The practice of designing, setting up, managing, and maintaining a collection of interconnected computers, servers, switches, routers, and other devices. Networking allows for the sharing of data, resources, and services among different devices and users. It encompasses a wide range of technologies, protocols, and devices to ensure seamless communication and transfer of data. Networking can be categorized into different types based on scale, scope, and purpose, such as Local Area Network (LAN), Wide Area Network (WAN), and Virtual Private Network (VPN). The field combines both hardware and software aspects of computing and telecommunications to achieve efficient and secure data communications. opportunities with like-minded professionals. This encourages collaboration and the sharing of knowledge to forge a more secure digital landscape.
See you there!