SlideShare a Scribd company logo
5
Most read
Security Boulevard Presents:
Our Panel
Setu Kulkarni, VP, Product &
Corporate Strategy, WhiteHat Security
Jared Carlson, Principal
Researcher for Strategy,
CA Veracode
Alan Shimel, Editor-in- Chief, DevOps.com, Security
Boulevard, Container Journal
The Next Great Leap
Machine Learning (ML) and Artificial
Intelligence (AI) have been proclaimed as
perhaps the next great leap in human
quality of life, as well as a potential reason
for our extinction. Somewhere in between
lies how ML & AI can potentially improve
our Cyber Security efforts.
But are ML & AI a true panacea or merely
the next shiny trinket for the cyber industry
to fixate on?
Let’s Explore
• How ML & AI is currently being utilized in cyber security
efforts
• What is working and what has not worked
• What is on the both the short term and near-term
horizon for ML &AI
• Practical steps you can take now to begin leveraging
these technologies to tangibly improve your cyber
security posture
Practical Steps to Success
Practical steps you can take now to begin leveraging these
technologies to tangibly improve your cyber security posture:
• Understand what your data collecting capabilities are
• Ensure you have the ability to analyze the amount of
data you collect
• AI and ML can be force multipliers, but aren’t a total
solutions
• No matter which solution you choose, understand why
actions and decisions are made
• Even if you are already using AI & ML stay on top of
new developments, new technologies and new
products/services
© 2017 WhiteHat Security, Inc.
WhiteHat Security Secures Digital Business
WhiteHat Combines Technology
and Human Intelligence to perform
Application Security Testing via:
➢ Dynamic Web App Scans
➢ Source Code Scans
➢ Mobile App Scans
➢ Computer-Based Training for
security and developers
Verified Vulnerabilities via
WhiteHat’s Threat Research Center
offer near 0% False Positive Rates.
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7
About Veracode
Company
Growth
• 6 Trillion + lines of Code
Scanned*
• A 4X Leader in Gartner
Magic Quadrant for
application Security
Testing (Feb 2017)*
• 1400+ Customers
• 30+ Patents
Customer
Outcomes
•36.5M Flaws Fixed
All Time
•3,100 Consultation
Calls
•400,000 Program
Management
Hours
Enabling
Developers
•3 Second Scan
times (with Greenlight)
•24 Languages
Supported
•77 Frameworks
Supported
•29 Integrations
Note: * indicates year-to-date
*Veracode Acquired April 2017
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner
research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Questions
Recording of this webinar will be
available at SecurityBoulevard.com.

More Related Content

PPTX
AI and the Impact on Cybersecurity
PPTX
Machine learning in Cyber Security
PDF
HOW AI CAN HELP IN CYBERSECURITY
PDF
AI for security or security for AI - Sergey Gordeychik
PPTX
Machine Learning in Cyber Security
PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
PPTX
How is ai important to the future of cyber security
PPTX
AI and ML in Cybersecurity
AI and the Impact on Cybersecurity
Machine learning in Cyber Security
HOW AI CAN HELP IN CYBERSECURITY
AI for security or security for AI - Sergey Gordeychik
Machine Learning in Cyber Security
Use of Artificial Intelligence in Cyber Security - Avantika University
How is ai important to the future of cyber security
AI and ML in Cybersecurity

What's hot (20)

PDF
AI and Cybersecurity - Food for Thought
PDF
Application of Machine Learning in Cyber Security
PDF
Practical Applications of Machine Learning in Cybersecurity
PDF
Machine Learning in Cyber Security Domain
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
PDF
Generative AI at the edge.pdf
PPTX
Cyber security and AI
PPTX
Artificial Intelligence and Cybersecurity
PPTX
Generative AI Use-cases for Enterprise - First Session
PPTX
Journey of Generative AI
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PDF
Responsible AI
PDF
Artificial Intelligence for Cyber Security
PPTX
AI In Cybersecurity – Challenges and Solutions
PPTX
Building responsible AI models in Azure Machine Learning.pptx
PPTX
Zero Trust Model
PPTX
Generative AI and law.pptx
PDF
Train foundation model for domain-specific language model
PDF
Generative-AI-in-enterprise-20230615.pdf
PPTX
AI FOR BUSINESS LEADERS
AI and Cybersecurity - Food for Thought
Application of Machine Learning in Cyber Security
Practical Applications of Machine Learning in Cybersecurity
Machine Learning in Cyber Security Domain
Responsible AI & Cybersecurity: A tale of two technology risks
Generative AI at the edge.pdf
Cyber security and AI
Artificial Intelligence and Cybersecurity
Generative AI Use-cases for Enterprise - First Session
Journey of Generative AI
The role of big data, artificial intelligence and machine learning in cyber i...
Responsible AI
Artificial Intelligence for Cyber Security
AI In Cybersecurity – Challenges and Solutions
Building responsible AI models in Azure Machine Learning.pptx
Zero Trust Model
Generative AI and law.pptx
Train foundation model for domain-specific language model
Generative-AI-in-enterprise-20230615.pdf
AI FOR BUSINESS LEADERS
Ad

Similar to How Machine Learning & AI Will Improve Cyber Security (20)

PDF
2024-gartner-top-strategic-technology-trends-ebook.pdf
PDF
Bridging the Gap: Analyzing Data in and Below the Cloud
PDF
Test Automation Trends and Beyond
PDF
5 Must-Know Software Development Trends Shaping the Future.pdf
PPTX
Product security by Blockchain, AI and Security Certs
PDF
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
DOCX
Steven Greschner Biography
PPTX
Sample Customer Advisory Board Deck
DOCX
About Steven Greschner
PDF
Security is our duty and we shall deliver it - White Paper
PDF
CL2015 - Datacenter and Cloud Strategy and Planning
PDF
www.aqusag.comblogaqusag-technologies-blog-5the-future-of-global-software-dev...
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPT
Israel IT Market 2006 2008
PDF
Key Stages in AI Software Development Lifecycle
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PDF
8 Experts on Flawless App Delivery
PDF
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
2024-gartner-top-strategic-technology-trends-ebook.pdf
Bridging the Gap: Analyzing Data in and Below the Cloud
Test Automation Trends and Beyond
5 Must-Know Software Development Trends Shaping the Future.pdf
Product security by Blockchain, AI and Security Certs
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
Steven Greschner Biography
Sample Customer Advisory Board Deck
About Steven Greschner
Security is our duty and we shall deliver it - White Paper
CL2015 - Datacenter and Cloud Strategy and Planning
www.aqusag.comblogaqusag-technologies-blog-5the-future-of-global-software-dev...
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Israel IT Market 2006 2008
Key Stages in AI Software Development Lifecycle
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
8 Experts on Flawless App Delivery
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx

How Machine Learning & AI Will Improve Cyber Security

  • 2. Our Panel Setu Kulkarni, VP, Product & Corporate Strategy, WhiteHat Security Jared Carlson, Principal Researcher for Strategy, CA Veracode Alan Shimel, Editor-in- Chief, DevOps.com, Security Boulevard, Container Journal
  • 3. The Next Great Leap Machine Learning (ML) and Artificial Intelligence (AI) have been proclaimed as perhaps the next great leap in human quality of life, as well as a potential reason for our extinction. Somewhere in between lies how ML & AI can potentially improve our Cyber Security efforts. But are ML & AI a true panacea or merely the next shiny trinket for the cyber industry to fixate on?
  • 4. Let’s Explore • How ML & AI is currently being utilized in cyber security efforts • What is working and what has not worked • What is on the both the short term and near-term horizon for ML &AI • Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture
  • 5. Practical Steps to Success Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture: • Understand what your data collecting capabilities are • Ensure you have the ability to analyze the amount of data you collect • AI and ML can be force multipliers, but aren’t a total solutions • No matter which solution you choose, understand why actions and decisions are made • Even if you are already using AI & ML stay on top of new developments, new technologies and new products/services
  • 6. © 2017 WhiteHat Security, Inc. WhiteHat Security Secures Digital Business WhiteHat Combines Technology and Human Intelligence to perform Application Security Testing via: ➢ Dynamic Web App Scans ➢ Source Code Scans ➢ Mobile App Scans ➢ Computer-Based Training for security and developers Verified Vulnerabilities via WhiteHat’s Threat Research Center offer near 0% False Positive Rates.
  • 7. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7 About Veracode Company Growth • 6 Trillion + lines of Code Scanned* • A 4X Leader in Gartner Magic Quadrant for application Security Testing (Feb 2017)* • 1400+ Customers • 30+ Patents Customer Outcomes •36.5M Flaws Fixed All Time •3,100 Consultation Calls •400,000 Program Management Hours Enabling Developers •3 Second Scan times (with Greenlight) •24 Languages Supported •77 Frameworks Supported •29 Integrations Note: * indicates year-to-date *Veracode Acquired April 2017 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 8. Questions Recording of this webinar will be available at SecurityBoulevard.com.