Alt. GDG Cloud Southlake #35_ Aravind Iyengar_ The Role of AI in Cyber Risk Management Slides ScreenCapture
JamesAnderson135
127 views
26 slides
Aug 30, 2024
Slide 1 of 26
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
About This Presentation
The role of AI in cyber risk management
AI has started to permeate all walks of life. Cyber security also has plenty to gain from the advancements in AI, and in this talk we will touch upon the multitude of ways in which AI is empowering security teams in proactive secops and risk management.
Ara...
The role of AI in cyber risk management
AI has started to permeate all walks of life. Cyber security also has plenty to gain from the advancements in AI, and in this talk we will touch upon the multitude of ways in which AI is empowering security teams in proactive secops and risk management.
Aravind Iyengar is VP of Engineering at Balbix, where he works on bringing the latest in AI and big data analytics to cyber risk management. He has more than 15 years of experience working on algorithms to solve challenging real-world problems in the domains of data communications and storage, high-performance computing and genomics, and now in cyber security at Balbix. Dr. Iyengar has a B.Tech. from IIT Madras and a Masters and PhD from UC San Diego.
Size: 1.17 MB
Language: en
Added: Aug 30, 2024
Slides: 26 pages
Slide Content
The Role of Al in
Cyber Risk
Management
8/28/2024
Aravind lyengar
(=! Balbix
Cyber Risk Management at a crossroads
Attack Surface
Rampant Threats
"Accelerated Al Capabilities
Exploding Attack Surface
The Diverse and Shape-shifting Attack Surface
* Large and diverse inventory
= Influenced by waves of technologies
= Novel capabilities or productivity boosts
Ingredients for a robust Security Practice
* Portfolio of tools for management & monitoring
= Requires diverse skill sets & practices
= Creates silos of visibility 8 islands of knowledge
oa iia ED
E Balbhe sidi
The impossibility of Cyber Risk “Management”
* Diverse KPIs
- Disparate languages
ist ma
The impossibility of Cyber Risk Management with
traditional approaches
Diverse
ite Portfolio of
Tools
Disparate
Sees Languages
Rampant Threats
The Vulnerability in identifying Vulnerabilities
+ Manual analysis unable to keep up
NVD Program Announcement veoa1to-apa, 2 2004
DARKREADING
e
NVD Backlog Continues to Grow
+ No consensus on communication standards
= CPEs - not enforced as unique identifiers
= CPEs vs. PURLs
+ Increasing reliance on FOSS
= Significantly compounds this problem
Image crest: ups tune conqueryoursish com
Qe Activity Summary (user: ASS)
EBalbix.
Pe ts sor. .
The Avalanche of Exploits
+ Remediation
+ Meanwhile...
= Exploit volume is increasing ‘ta CLS
= ~3x more Y-o-Y es ne
= Time-to-exploit is shrinking .
= ~14x shorter for critical vulnerabilities 1