Elevator Pitch
Artificial intelligence (AI) has evolved into a powerful, extremely accessible tool, and it’s increasingly being used for evil. We’ll demonstrate the ease of crafting text, audio, and video-based attacks we’re seeing against big biz in the wild, and discuss what can be done in defense!
Description
Artificial Intelligence, Real Threats
Artificial Intelligence (AI) has transcended buzzword status, emerging as a potent and accessible tool. However, this power cuts both ways. In this presentation, we delve into the darker side of AI and its role in sophisticated information security attacks. How can adversaries harness AI, and what defensive strategies can we employ to stay ahead? Join us as we explore the evolving landscape of AI-driven threats and arm ourselves with knowledge to defend against them.
Agenda
1. Layout
Setting the Stage for the Unseen Threats
Get ready to embark on a journey through the shadowy realm of AI-powered attacks. We’ll outline the structure of our talk, providing a roadmap for the deep dive into AI’s role in information security.
2. History
From Novelty to Nefarious: The Evolution of AI in Cybersecurity
Explore the historical trajectory that brought us to the current intersection of AI and security challenges. Understand the pivotal moments that transformed AI from a novelty to a potent weapon in the hands of malicious actors.
3. Backend/Text/Code
Social Engineering 2.0: AI in Text-Based Attacks, AI automation
4. Video
Seeing is Believing: AI in Visual Attack Strategies
Dive into the realm of video AI technology. Uncover real-world attack examples where visuals are exploited for nefarious purposes. Learn how to leverage this technology defensively, preparing for the evolving landscape of visual attacks.
5. Audio
The Power of Voice: AI in Audio Attacks
Explore the auditory dimension of AI with a focus on voice technology. Delve into real-world examples of how audio AI is exploited in attacks. Discover proactive measures to harness this technology defensively and protect against audio-driven threats. LIVE DEMO of an INTERACTIVE ATTACK AGENT included!
Examine the role of text AI in social engineering attacks and development efforts. Understand how adversaries manipulate language and code to infiltrate systems. Equip yourself with strategies to counteract the influence of text AI in cyber threats.
6. Recap
Key Takeaways: Navigating the AI Security Landscape
Summarize the critical insights gained throughout the presentation. Reinforce key takeaways to ensure that attendees leave with a comprehensive understanding of AI’s impact on information security and the tools to combat it.
7. Thanks + A Fun Q&A
Gratitude and Engagement
Express gratitude for the audience’s participation and curiosity. Conclude the presentation with an engaging and informative Q&A session, where participants can pose questions and contribute to the collective understanding of AI in information security.
Notes
This talk is updated monthly to keep up with current threats, so if you’ve seen an old version of it, then that old version is old.