In this next block of sessions at #CyberSecure, we’re learning about the latest cybersecurity technologies, including how artificial intelligence is being used to unearth vulnerabilities.
There are benefits and drawbacks to using artificial intelligence for cybersecurity. There are also a whole host of other emerging technologies that can defend against disinformation and computational propaganda. Providing an overview at #CyberSecure is @LUMKatrusya.
We’ve written a bit about how AI is being used to detect hackers.
In 2018, for instance, we reported on how Darktrace’s unsupervised-learning models can spot hackers who have already broken in. #CyberSecure technologyreview.com/2018/11/16/139…
That same year, we also wrote about how AI was becoming a hot new thing for cybersecurity—and how hackers could foil these security algorithms by targeting the data they train on and the warning flags they look for. #CyberSecure technologyreview.com/2018/08/11/141…
How is AI being used in cybersecurity?

Machine learning can improve some aspects of spam detection, for instance, Sedova says. #CyberSecure
One concern with AI and cybersecurity is that AI and machine learning draws on open source data and that data can be poisoned. #CyberSecure
The big question is: whose responsibility is it to audit AI systems? The government, the private sector, some other body? #CyberSecure
Sedova says she's getting ready to publish new research. 👀 #CyberSecure
What advice do you have about navigating the AI landscape?

What do you need to protect on your network? Having priorities here can help clarify what you need to employ. #CyberSecure
In this #CyberSecure session, @Darktrace’s Marcus Fowler is providing actionable steps for detecting, investigating, and mitigating both known and unknown attacks at their earliest stages – before the damage is done.
Recent high-profile cyberattacks against the nation’s critical infrastructure have resulted in not only financial loss and stolen data, but also supply chain disruptions and threats to human safety.
How is Darktrace using AI?

There's a security practitioner approach. Learning normal for business is an important component. #CyberSecure
The AI conversation is so much richer than it was even two years ago, Fowler says. #CyberSecure
An IT/OT security portfolio needs to be collaborative, Fowler says. #CyberSecure
The Biden administration has put into place cybersecurity frameworks, guidelines and resources, which are steps in the right direction, Fowler says.

But the hard work is just beginning. #CyberSecure
1-2-3-4-5-6. Over 80% of data breaches leverage weak or stolen passwords, making them the single biggest security risk an organization faces. #CyberSecure
In this next session with Joy Chik of Microsoft Identity, she’s exploring a world without passwords that still maintain employee privacy and confidentiality. Think biometrics.
What is zero-trust architecture?

Chik says: at the core of it, you never trust. You always verify. #CyberSecure
Assume you'll get breached. It's not about whether you will or won't anymore. #CyberSecure
Microsoft has been on a password-less journey for several years, Chik says. #CyberSecure
Another pro of password-less logins is that it creates a better user experience. #CyberSecure
Challenges for implementing password-less logins:

-Culture and mindset change
-Phased rollout. Cloud applications first, legacy applications later on.
-Recovery of password-less method if needed.

#CyberSecure
That's it for this block of sessions! Thanks for following along. #CyberSecure

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with MIT Technology Review

MIT Technology Review Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @techreview

18 Nov
Introducing The #ExtortionEconomy, a 5-part podcast series with @propublica that looks at the money, people, and technology behind the explosion of ransomware that is delivering hundreds of millions of dollars to cybercriminals around the world.
@propublica This is a podcast about ransomware... but it's not really about ransomware. Image
@propublica It's not about securing your password, and it's not about enabling two-factor authentication. It's not your IT manager telling you how to avoid a phishing attack. Image
Read 9 tweets
17 Nov
Cyberattacks are becoming a “when, not if” reality. In the final block of sessions at #CyberSecure, we'll be providing you with strategies to help your organization fix security vulnerabilities and take the critical first steps after a breach happens.
First up is Alex Jones of @cobalt_io. He's discussing how your organization can reinforce its security strategy to better identify and address security vulnerabilities. #CyberSecure
He's discussing five themes:

-It's not a zero sum game
-It's not a technology problem (it's a people problem)
-The solution requires people and process innovation (the tech is there already)
-It's complicated, but not impossible
-We're all in this together

#CyberSecure
Read 15 tweets
17 Nov
Cybercriminals exploit the lack of international cybercrime mandates and the existence of unregulated financial systems that enable anonymous transfer of funds. In this special programming break at #CyberSecure, @MarietjeSchaake explores the changes necessary to stem the tide.
We're seeing an interrelationship between misinformation campaigns and traditional cyberattacks. #CyberSecure
"When it comes to ransomware, the accountability needs to be closed ... That makes it too easy for maligned attackers to gain ground" - @MarietjeSchaake
at #CyberSecure
Read 5 tweets
17 Nov
Holding cybercriminals accountable requires cooperation across country lines. That's because the current situation stretches internationally. In this next block of #CyberSecure sessions, we explore how.
As we dive into this topic, we have a special surprise for you. Stay tuned #CyberSecure.
🚨 Podcast Premiere 🚨: In this project with @propublica, we look at the money, people, and technology behind the explosion of ransomware that is delivering hundreds of millions of dollars to cybercriminals around the world. #CyberSecure
Read 36 tweets
17 Nov
Machine learning-based cybersecurity is only as good as the detection models it’s based on. This #CyberSecure session with Ignacio Arnaldo of @corelight_inc looks at requirements and best practices.
In the previous block of sessions, we touched on how, in 2018, @Darktrace showed that unsupervised-learning models can spot hackers who have already broken in. technologyreview.com/2018/11/16/139…
We also threw cold water on AI for cybersecurity, reporting on how hackers could foil these security algorithms by targeting the data they train on and the warning flags they look for. #CyberSecure technologyreview.com/2018/08/11/141…
Read 7 tweets
17 Nov
We’re back for the second and final day of #CyberSecure. If this is the first time you’re hearing of this cybersecurity conference, there’s still time to attend:
To follow and join the conversation, keep an eye on the #CyberSecure and #TechReviewEvents hashtags.
If you’re an attendee watching the conference from your computer, we want to hear from you. Share your thoughts and questions by also using the #CyberSecure and #TechReviewEvents hashtags.
Read 22 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Thank you for your support!

Follow Us on Twitter!

:(