SlideShare a Scribd company logo
First Line of Defense for
Cybersecurity: AI
Prof. Ahmed Banafa
IoT Blockchain AI Expert | Faculty | Author | Keynote
Speaker
College of Engineering
San Jose State University
San Jose, CA USA
Prof. Ahmed Banafa has extensive experience in
research, operations and management, with focus
on IoT, Blockchain and AI. He is a reviewer and a
technical contributor for the publication of several
technical books. He served as a faculty several at
well-known universities and colleges, including the
University of California, Berkeley; California State
University-East Bay; San Jose State University; and
University of Massachusetts.
He is the recipient of several awards, including
Distinguished Tenured Staff Award of 2013,
Instructor of the year for 2013, 2014, and Certificate
of Honor for Instructor from the City and County of
San Francisco. He was named as number one tech
voice to follow by LinkedIn in 2016, his researches
featured in many reputable sites and magazines
including Forbes, IEEE and MIT Technology Review,
and Interviewed by ABC, CBS, NBC and Fox TV
and Radio stations.
• This article is the first of two parts dealing with cybersecurity : Prat 1:
First Line of Defense for Cybersecurity : AI. Part 2 : Second Line of
Defense for Cybersecurity: Blockchain.
• The year 2017 wasn't a great year for cyber-security; we saw a large
number of high-profile cyber attacks; including Uber, Deloitte, Equifax
and the now infamous WannaCry ransomware attack, and 2018
started with a bang too with the hacking of Winter Olympics.
• The frightening truth about increasingly cyber-attacks is that most
businesses and the cybersecurity industry itself are not prepared.
Despite the constant flow of security updates and patches, the
number of attacks continues to rise.
• Beyond the lack of preparedness on the business level, the
cybersecurity workforce itself is also having an incredibly hard time
keeping up with demand.
• By 2021, there are estimated to be an astounding 3.5 million unfilled
cybersecurity positions worldwide, the current staff is overworked
with an average of 52 hours a week, not an ideal situation to keep up
with non-stop threats.
• Given the state of cybersecurity today, the implementation of AI
systems into the mix can serve as a real turning point.
• New AI algorithms use Machine Learning (ML) to adapt over time,
and make it easier to respond to cybersecurity risks.
• However, new generations of malware and cyber-attacks can be
difficult to detect with conventional cybersecurity protocols. They
evolve over time, so more dynamic approaches are necessary.
• Another great benefit of AI systems in cybersecurity is that they will
free up an enormous amount of time for tech employees.
• Another way AI systems can help is by categorizing attacks based on
threat level.
• While there’s still a fair amount of work to be done here, but when
machine learning principles are incorporated into your systems, they
can actually adapt over time, giving you a dynamic edge over cyber
criminals.
• Unfortunately, there will always be limits of #AI, and human-machine
teams will be the key to solving increasingly complex #cybersecurity
challenges. But as our models become effective at detecting threats,
bad actors will look for ways to confuse the models.
• It’s a field called adversarial machine learning, or adversarial AI. Bad
actors will study how the underlying models work and work to either
confuse the models — what experts call poisoning the models, or
machine learning poisoning (MLP) – or focus on a wide range of
evasion techniques, essentially looking for ways they can circumvent
the models.
First line of defense for cybersecurity : AI
Four Fundamental Security Practices
With all the hype surrounding AI we tend to overlook a very important
fact. The best defense against a potential AI cyber-attack is rooted in
maintaining a fundamental security posture that incorporates
continuous monitoring, user education, diligent patch management
and basic configuration controls to address vulnerabilities. All explained
below:
Identifying the Patterns
• AI is all about patterns. Hackers, for example, look for patterns in
server and firewall configurations, use of outdated operating systems,
user actions and response tactics and more. These patterns give them
information about network vulnerabilities they can exploit.
• Network administrators also look for patterns. In addition to scanning
for patterns in the way hackers attempt intrusions, they are trying to
identify potential anomalies like spikes in network traffic, irregular
types of network traffic, unauthorized user logins and other red flags.
• By collecting data and monitoring the state of their network under
normal operating conditions, administrators can set up their systems
to automatically detect when something unusual takes place -- a
suspicious network login, for example, or access through a known bad
IP.
• This fundamental security approach has worked extraordinarily well
in preventing more traditional types of attacks, such as malware or
phishing. It can also be used very effectively in deterring AI-enabled
threats.
Educating the Users
• An organization could have the best monitoring systems in the world,
but the work they do can all be undermined by a single employee
clicking on the wrong email.
• Social engineering continues to be a large security challenge for
businesses because workers easily can be tricked into clicking on
suspicious attachments, emails and links.
• Employees are considered by many as the weakest links in the
security chain, as evidenced by a recent survey that found that
careless and untrained insiders represented the top source of security
threats.
• Educating users on what not to do is just as important as putting
security safeguards in place. Experts agree that routine user testing
reinforces training.
• Agencies must also develop plans that require all employees to
understand their individual roles in the battle for better security. And
don't forget a response and recovery plan, so everyone knows what
to do and expect when a breach occurs.
• Test these plans for effectiveness. Don’t wait for an exploit to find a
hole in the process.
Patching the Holes
• Hackers know when a patch is released, and in addition to trying to
find a way around that patch, they will not hesitate to test if an
agency has implemented the fix. Not applying patches opens the door
to potential attacks -- and if the hacker is using AI, those attacks can
come much faster and be even more insidious.
Checking Off the Controls
• The Center for Internet Security (CIS) has issued a set of controls
designed to provide agencies with a checklist for better security
implementations.
• While there are 20 actions in total, implementing at least the top five
-- device inventories, software tracking, security configurations,
vulnerability assessments and control of administrative privileges --
can eliminate roughly 85 percent of an organization’s vulnerabilities.
• All of these practices -- monitoring, user education, patch
management and adherence to CIS controls -- can help agencies
fortify themselves against even the most sophisticated AI attacks.
First line of defense for cybersecurity : AI
Challenges Facing AI in Cybersecurity
AI-Powered Attacks
• AI/Machine Learning (ML) software has the ability to "learn" from the
consequences of past events in order to help predict and identify
cybersecurity threats.
• According to a report by Webroot, AI is used by approximately 87% of
US cybersecurity professionals.
• However, AI may prove to be a double-edged sword as 91% of
security professionals are concerned that hackers will use AI to launch
even more sophisticated cyber-attacks.
• For example, AI can be used to automate the collection of certain
information — perhaps relating to a specific organization — which
may be sourced from support forums, code repositories, social media
platforms and more.
• Additionally, AI may be able to assist hackers when it comes to
cracking passwords by narrowing down the number of probable
passwords based on geography, demographics and other such
factors.
More Sandbox-Evading Malware
• In recent years, sandboxing technology has become an increasingly
popular method for detecting and preventing malware infections.
However, cyber-criminals are finding more ways to evade this
technology.
• For example, new strains of malware are able to recognize when they
are inside a sandbox, and wait until they are outside the sandbox
before executing the malicious code.
Ransomware and IoT
• We should be very careful not to underestimate the potential damage
IoT ransomware could cause. For example, hackers may choose to
target critical systems such as power grids.
• Should the victim fail to the pay the ransom within a short period of
time, the attackers may choose to shut down the grid. Alternatively,
they may choose to target factory lines, smart cars and home
appliances such as smart fridges, smart ovens and more.
• This fear was realized with a massive distributed denial of service
attack that crippled the servers of services like Twitter, NetFlix ,
NYTimes, and PayPal across the U.S. on October 21st , 2016.
• It’s the result of an immense assault that involved millions of Internet
addresses and malicious software, according to Dyn, the prime victim
of that attack. "One source of the traffic for the attacks was devices
infected by the Mirai botnet".
• The attack comes amid heightened cybersecurity fears and a rising
number of Internet security breaches. Preliminary indications suggest
that countless Internet of Things (IoT) devices that power everyday
technology like closed-circuit cameras and smart-home devices were
hijacked by the malware, and used against the servers.
A Rise of State-Sponsored Attacks
• The rise of nation state cyber-attacks is perhaps one of the most
concerning areas of cyber-security. Such attacks are usually politically
motivated, and go beyond financial gain.
• Instead, they are typically designed to acquire intelligence that can be
used to obstruct the objectives of a given political entity. They may
also be used to target electronic voting systems in order to
manipulate public opinion in some way.
• As you would expect, state-sponsored attacks are targeted,
sophisticated, well-funded and have the potential to be incredibly
disruptive. Of course, given the level of expertise and finance that is
behind these attacks, they may prove very difficult to protect against.
• Governments must ensure that their internal networks are isolated
from the internet, and ensure that extensive security checks are
carried out on all staff members. Likewise, staff will need to be
sufficiently trained to spot potential attacks.
Shortage of Skilled Staff
• By practically every measure, cybersecurity threats are growing more
numerous and sophisticated each passing day, a state of affairs that
doesn't bode well for an IT industry struggling with a security skills
shortage.
• With less security talent to go around, there's a growing concern that
businesses will lack the expertise to thwart network attacks and
prevent data breaches in the years ahead.
IT infrastructure
• A modern enterprise has just too many IT systems, spread across
geographies. Manual tracking of the health of these systems, even
when they operate in a highly integrated manner, poses massive
challenges. For most businesses, the only practical method of
embracing advanced (and expensive) cybersecurity technologies is to
prioritize their IT systems and cover those that they deem critical for
business continuity. Currently, cybersecurity is reactive.
• That is to say that in most cases, it helps alert IT staff about data
breaches, identity theft, suspicious applications, and suspicious
activities. So, cybersecurity is currently more of an enabler of disaster
management and mitigation. This leaves a crucial question
unanswered — what about not letting cybercrime happen at all?
The Future of Cybersecurity and AI
• In the security world AI has a very clear-cut potential for good. The
industry is notoriously unbalanced, with the bad actors getting to pick
from thousands of vulnerabilities to launch their attacks, along with
deploying an ever-increasing arsenal of tools to evade detection once
they have breached a system.
• While they only have to be successful once, the security experts
tasked with defending a system have to stop every attack, every time.
• With the advanced resources, intelligence and motivation to
complete an attack found in high level attacks, and the sheer number
of attacks happening every day, victory eventually becomes
impossible for the defenders.
• The analytical speed and power of our dream security AI would be
able to tip these scales at last, leveling the playing field for the
security practitioners who currently have to constantly defend at
scale against attackers who can pick a weak spot at their leisure.
• Instead, even the well-planned and concealed attacks could be
quickly found and defeated.
• Of course, such a perfect security AI is some way off. Not only would
this AI need to be a bona fide simulated mind that can pass the Turing
Test, it would also need to be a fully trained cyber security
professional, capable of replicating the decisions made by the most
experienced security engineer, but on a vast scale.
• Before we reach the brilliant AI seen in Sci-Fi, we need to go through
some fairly testing stages – although these still have huge value in
themselves.
• Some truly astounding breakthroughs are happening all the time.
When it matures as a technology it will be one of the most
astounding developments in history, changing the human condition in
ways similar to and bigger than, electricity, flight, and the Internet,
because we are entering the AI-era.
Thank you!
https://www.linkedin.com/in/ahmedbanafa
ahmed.banafa@sjsu.edu
@BanafaAhmed

More Related Content

PPTX
Cyber Security Awareness
PDF
Scams and-fraud-presentation
PPTX
Data breach presentation
PPTX
Cyber Law And Ethics
PPTX
Banks and cybersecurity v2
PPTX
CyberCrimes
PPTX
Cyber crime
PDF
Cyber security awareness for students
Cyber Security Awareness
Scams and-fraud-presentation
Data breach presentation
Cyber Law And Ethics
Banks and cybersecurity v2
CyberCrimes
Cyber crime
Cyber security awareness for students

What's hot (20)

PPT
Chapter 4
PPTX
Cyber crime presentation school level
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
Information security
PPSX
Cyber security awareness for students
PPTX
Cyber crime ppt new
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Social Engineering new.pptx
PPTX
Cyber security ppt
PPT
Cyber Crime and Prevention Tips
PPTX
Cyber crime and security
PPTX
Computer crime
PPTX
Cybercrime a growing threat of 21 st century !!!
PDF
Overview of Information Security & Privacy
PPTX
Cyber Crime
PPTX
Introduction to cyber security
PPT
Internet Fraud
PPTX
Cyber security presentation
PDF
Email phising and spoofing hurting your business
PPT
Fraud Detection Techniques
Chapter 4
Cyber crime presentation school level
Cyber security government ppt By Vishwadeep Badgujar
Information security
Cyber security awareness for students
Cyber crime ppt new
Cyber crime-140128140443-phpapp02 (1)
Social Engineering new.pptx
Cyber security ppt
Cyber Crime and Prevention Tips
Cyber crime and security
Computer crime
Cybercrime a growing threat of 21 st century !!!
Overview of Information Security & Privacy
Cyber Crime
Introduction to cyber security
Internet Fraud
Cyber security presentation
Email phising and spoofing hurting your business
Fraud Detection Techniques
Ad

Similar to First line of defense for cybersecurity : AI (20)

PPTX
AI and cyber security presentationit is very good
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PDF
AI in Cybersecurity: The New Frontier of Defense and Risk | CyberPro Magazine
PDF
Digital marketing revolution in 2025 for business people
PDF
presentazione informatica per sito web scuola
PPTX
Untitled design_20241205_00009_0000.pptx
PPTX
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
PDF
Artificial Intelligence and Machine Learning Algorithms Are Used to Detect an...
PPTX
Green and Cyan Modern Animated Tech Presentation.pptx
PPTX
Vulnerability in ai
PPTX
Artificial Intelligence in Cybersecurity
PPTX
Cybersecurity_in_the_Age_of_AI_Enhanced_Presentation.pptx
PPTX
AI-PoweJHJKJGJUJUUYKUKUKYUKYUKYUred Cybersecurity.pptx
PPTX
Cyber security and AI
PDF
How AI can help with cybersecurity
PDF
Ciberseguridad en el mundo de la IA
PDF
AI in Hacking
PPTX
Cyber security with ai
PDF
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
PDF
How Can AI-Powered Solutions Enhance Cybersecurity in 2024 Across Threat Dete...
AI and cyber security presentationit is very good
Top Positive and Negative Impacts of AI & ML on Cybersecurity
AI in Cybersecurity: The New Frontier of Defense and Risk | CyberPro Magazine
Digital marketing revolution in 2025 for business people
presentazione informatica per sito web scuola
Untitled design_20241205_00009_0000.pptx
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
Artificial Intelligence and Machine Learning Algorithms Are Used to Detect an...
Green and Cyan Modern Animated Tech Presentation.pptx
Vulnerability in ai
Artificial Intelligence in Cybersecurity
Cybersecurity_in_the_Age_of_AI_Enhanced_Presentation.pptx
AI-PoweJHJKJGJUJUUYKUKUKYUKYUKYUred Cybersecurity.pptx
Cyber security and AI
How AI can help with cybersecurity
Ciberseguridad en el mundo de la IA
AI in Hacking
Cyber security with ai
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
How Can AI-Powered Solutions Enhance Cybersecurity in 2024 Across Threat Dete...
Ad

More from Ahmed Banafa (20)

PPTX
IoT and 5G convergence
PPTX
Quantum Computing and AI
PPTX
The convergence of IoT and Quantum Computing
PPTX
Quantum Internet Explained
PPTX
IoT and Covid 19
PPTX
Quantum Teleportation
PPTX
What is zero trust model (ztm)
PPTX
How blockchain is revolutionizing crowdfunding
PPTX
Blockchain technology and supply chain management
PPTX
8 key tech trends in a post covid-19 world edited
PPTX
Blockchain Technology and COVID19
PPTX
Ten trends of blockchain in 2020
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPTX
Ten Blockchain Applications
PPTX
Hot technologies of 2019
PPTX
Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond - SJSU
PPTX
9 IoT predictions for 2019
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond
IoT and 5G convergence
Quantum Computing and AI
The convergence of IoT and Quantum Computing
Quantum Internet Explained
IoT and Covid 19
Quantum Teleportation
What is zero trust model (ztm)
How blockchain is revolutionizing crowdfunding
Blockchain technology and supply chain management
8 key tech trends in a post covid-19 world edited
Blockchain Technology and COVID19
Ten trends of blockchain in 2020
Quantum Computing and Blockchain: Facts and Myths
Ten Blockchain Applications
Hot technologies of 2019
Blockchain and AI
The Blockchain Wave in 2019 and Beyond - SJSU
9 IoT predictions for 2019
Secure and Smart IoT using Blockchain and AI
The Blockchain Wave in 2019 and Beyond

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)

First line of defense for cybersecurity : AI

  • 1. First Line of Defense for Cybersecurity: AI Prof. Ahmed Banafa IoT Blockchain AI Expert | Faculty | Author | Keynote Speaker College of Engineering San Jose State University San Jose, CA USA
  • 2. Prof. Ahmed Banafa has extensive experience in research, operations and management, with focus on IoT, Blockchain and AI. He is a reviewer and a technical contributor for the publication of several technical books. He served as a faculty several at well-known universities and colleges, including the University of California, Berkeley; California State University-East Bay; San Jose State University; and University of Massachusetts. He is the recipient of several awards, including Distinguished Tenured Staff Award of 2013, Instructor of the year for 2013, 2014, and Certificate of Honor for Instructor from the City and County of San Francisco. He was named as number one tech voice to follow by LinkedIn in 2016, his researches featured in many reputable sites and magazines including Forbes, IEEE and MIT Technology Review, and Interviewed by ABC, CBS, NBC and Fox TV and Radio stations.
  • 3. • This article is the first of two parts dealing with cybersecurity : Prat 1: First Line of Defense for Cybersecurity : AI. Part 2 : Second Line of Defense for Cybersecurity: Blockchain.
  • 4. • The year 2017 wasn't a great year for cyber-security; we saw a large number of high-profile cyber attacks; including Uber, Deloitte, Equifax and the now infamous WannaCry ransomware attack, and 2018 started with a bang too with the hacking of Winter Olympics. • The frightening truth about increasingly cyber-attacks is that most businesses and the cybersecurity industry itself are not prepared. Despite the constant flow of security updates and patches, the number of attacks continues to rise.
  • 5. • Beyond the lack of preparedness on the business level, the cybersecurity workforce itself is also having an incredibly hard time keeping up with demand. • By 2021, there are estimated to be an astounding 3.5 million unfilled cybersecurity positions worldwide, the current staff is overworked with an average of 52 hours a week, not an ideal situation to keep up with non-stop threats.
  • 6. • Given the state of cybersecurity today, the implementation of AI systems into the mix can serve as a real turning point. • New AI algorithms use Machine Learning (ML) to adapt over time, and make it easier to respond to cybersecurity risks. • However, new generations of malware and cyber-attacks can be difficult to detect with conventional cybersecurity protocols. They evolve over time, so more dynamic approaches are necessary.
  • 7. • Another great benefit of AI systems in cybersecurity is that they will free up an enormous amount of time for tech employees. • Another way AI systems can help is by categorizing attacks based on threat level. • While there’s still a fair amount of work to be done here, but when machine learning principles are incorporated into your systems, they can actually adapt over time, giving you a dynamic edge over cyber criminals.
  • 8. • Unfortunately, there will always be limits of #AI, and human-machine teams will be the key to solving increasingly complex #cybersecurity challenges. But as our models become effective at detecting threats, bad actors will look for ways to confuse the models. • It’s a field called adversarial machine learning, or adversarial AI. Bad actors will study how the underlying models work and work to either confuse the models — what experts call poisoning the models, or machine learning poisoning (MLP) – or focus on a wide range of evasion techniques, essentially looking for ways they can circumvent the models.
  • 10. Four Fundamental Security Practices With all the hype surrounding AI we tend to overlook a very important fact. The best defense against a potential AI cyber-attack is rooted in maintaining a fundamental security posture that incorporates continuous monitoring, user education, diligent patch management and basic configuration controls to address vulnerabilities. All explained below:
  • 11. Identifying the Patterns • AI is all about patterns. Hackers, for example, look for patterns in server and firewall configurations, use of outdated operating systems, user actions and response tactics and more. These patterns give them information about network vulnerabilities they can exploit. • Network administrators also look for patterns. In addition to scanning for patterns in the way hackers attempt intrusions, they are trying to identify potential anomalies like spikes in network traffic, irregular types of network traffic, unauthorized user logins and other red flags.
  • 12. • By collecting data and monitoring the state of their network under normal operating conditions, administrators can set up their systems to automatically detect when something unusual takes place -- a suspicious network login, for example, or access through a known bad IP. • This fundamental security approach has worked extraordinarily well in preventing more traditional types of attacks, such as malware or phishing. It can also be used very effectively in deterring AI-enabled threats.
  • 13. Educating the Users • An organization could have the best monitoring systems in the world, but the work they do can all be undermined by a single employee clicking on the wrong email. • Social engineering continues to be a large security challenge for businesses because workers easily can be tricked into clicking on suspicious attachments, emails and links. • Employees are considered by many as the weakest links in the security chain, as evidenced by a recent survey that found that careless and untrained insiders represented the top source of security threats.
  • 14. • Educating users on what not to do is just as important as putting security safeguards in place. Experts agree that routine user testing reinforces training. • Agencies must also develop plans that require all employees to understand their individual roles in the battle for better security. And don't forget a response and recovery plan, so everyone knows what to do and expect when a breach occurs. • Test these plans for effectiveness. Don’t wait for an exploit to find a hole in the process.
  • 15. Patching the Holes • Hackers know when a patch is released, and in addition to trying to find a way around that patch, they will not hesitate to test if an agency has implemented the fix. Not applying patches opens the door to potential attacks -- and if the hacker is using AI, those attacks can come much faster and be even more insidious.
  • 16. Checking Off the Controls • The Center for Internet Security (CIS) has issued a set of controls designed to provide agencies with a checklist for better security implementations. • While there are 20 actions in total, implementing at least the top five -- device inventories, software tracking, security configurations, vulnerability assessments and control of administrative privileges -- can eliminate roughly 85 percent of an organization’s vulnerabilities. • All of these practices -- monitoring, user education, patch management and adherence to CIS controls -- can help agencies fortify themselves against even the most sophisticated AI attacks.
  • 18. Challenges Facing AI in Cybersecurity AI-Powered Attacks • AI/Machine Learning (ML) software has the ability to "learn" from the consequences of past events in order to help predict and identify cybersecurity threats. • According to a report by Webroot, AI is used by approximately 87% of US cybersecurity professionals. • However, AI may prove to be a double-edged sword as 91% of security professionals are concerned that hackers will use AI to launch even more sophisticated cyber-attacks.
  • 19. • For example, AI can be used to automate the collection of certain information — perhaps relating to a specific organization — which may be sourced from support forums, code repositories, social media platforms and more. • Additionally, AI may be able to assist hackers when it comes to cracking passwords by narrowing down the number of probable passwords based on geography, demographics and other such factors.
  • 20. More Sandbox-Evading Malware • In recent years, sandboxing technology has become an increasingly popular method for detecting and preventing malware infections. However, cyber-criminals are finding more ways to evade this technology. • For example, new strains of malware are able to recognize when they are inside a sandbox, and wait until they are outside the sandbox before executing the malicious code.
  • 21. Ransomware and IoT • We should be very careful not to underestimate the potential damage IoT ransomware could cause. For example, hackers may choose to target critical systems such as power grids. • Should the victim fail to the pay the ransom within a short period of time, the attackers may choose to shut down the grid. Alternatively, they may choose to target factory lines, smart cars and home appliances such as smart fridges, smart ovens and more.
  • 22. • This fear was realized with a massive distributed denial of service attack that crippled the servers of services like Twitter, NetFlix , NYTimes, and PayPal across the U.S. on October 21st , 2016. • It’s the result of an immense assault that involved millions of Internet addresses and malicious software, according to Dyn, the prime victim of that attack. "One source of the traffic for the attacks was devices infected by the Mirai botnet".
  • 23. • The attack comes amid heightened cybersecurity fears and a rising number of Internet security breaches. Preliminary indications suggest that countless Internet of Things (IoT) devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers.
  • 24. A Rise of State-Sponsored Attacks • The rise of nation state cyber-attacks is perhaps one of the most concerning areas of cyber-security. Such attacks are usually politically motivated, and go beyond financial gain. • Instead, they are typically designed to acquire intelligence that can be used to obstruct the objectives of a given political entity. They may also be used to target electronic voting systems in order to manipulate public opinion in some way.
  • 25. • As you would expect, state-sponsored attacks are targeted, sophisticated, well-funded and have the potential to be incredibly disruptive. Of course, given the level of expertise and finance that is behind these attacks, they may prove very difficult to protect against. • Governments must ensure that their internal networks are isolated from the internet, and ensure that extensive security checks are carried out on all staff members. Likewise, staff will need to be sufficiently trained to spot potential attacks.
  • 26. Shortage of Skilled Staff • By practically every measure, cybersecurity threats are growing more numerous and sophisticated each passing day, a state of affairs that doesn't bode well for an IT industry struggling with a security skills shortage. • With less security talent to go around, there's a growing concern that businesses will lack the expertise to thwart network attacks and prevent data breaches in the years ahead.
  • 27. IT infrastructure • A modern enterprise has just too many IT systems, spread across geographies. Manual tracking of the health of these systems, even when they operate in a highly integrated manner, poses massive challenges. For most businesses, the only practical method of embracing advanced (and expensive) cybersecurity technologies is to prioritize their IT systems and cover those that they deem critical for business continuity. Currently, cybersecurity is reactive.
  • 28. • That is to say that in most cases, it helps alert IT staff about data breaches, identity theft, suspicious applications, and suspicious activities. So, cybersecurity is currently more of an enabler of disaster management and mitigation. This leaves a crucial question unanswered — what about not letting cybercrime happen at all?
  • 29. The Future of Cybersecurity and AI • In the security world AI has a very clear-cut potential for good. The industry is notoriously unbalanced, with the bad actors getting to pick from thousands of vulnerabilities to launch their attacks, along with deploying an ever-increasing arsenal of tools to evade detection once they have breached a system. • While they only have to be successful once, the security experts tasked with defending a system have to stop every attack, every time.
  • 30. • With the advanced resources, intelligence and motivation to complete an attack found in high level attacks, and the sheer number of attacks happening every day, victory eventually becomes impossible for the defenders.
  • 31. • The analytical speed and power of our dream security AI would be able to tip these scales at last, leveling the playing field for the security practitioners who currently have to constantly defend at scale against attackers who can pick a weak spot at their leisure. • Instead, even the well-planned and concealed attacks could be quickly found and defeated.
  • 32. • Of course, such a perfect security AI is some way off. Not only would this AI need to be a bona fide simulated mind that can pass the Turing Test, it would also need to be a fully trained cyber security professional, capable of replicating the decisions made by the most experienced security engineer, but on a vast scale.
  • 33. • Before we reach the brilliant AI seen in Sci-Fi, we need to go through some fairly testing stages – although these still have huge value in themselves. • Some truly astounding breakthroughs are happening all the time. When it matures as a technology it will be one of the most astounding developments in history, changing the human condition in ways similar to and bigger than, electricity, flight, and the Internet, because we are entering the AI-era.