Artificial Intelligence, Real Threats

By Johnny Xmas

Elevator Pitch

Artificial intelligence (AI) has evolved into a powerful, extremely accessible tool, and it’s increasingly being used for evil. We’ll demonstrate the ease of crafting text, audio, and video-based attacks we’re seeing against big biz in the wild, and discuss what can be done in defense!

Description

Artificial Intelligence, Real Threats

Artificial Intelligence (AI) has transcended buzzword status, emerging as a potent and accessible tool. However, this power cuts both ways. In this presentation, we delve into the darker side of AI and its role in sophisticated information security attacks. How can adversaries harness AI, and what defensive strategies can we employ to stay ahead? Join us as we explore the evolving landscape of AI-driven threats and arm ourselves with knowledge to defend against them.

Agenda

1. Layout

Setting the Stage for the Unseen Threats

Get ready to embark on a journey through the shadowy realm of AI-powered attacks. We’ll outline the structure of our talk, providing a roadmap for the deep dive into AI’s role in information security.

2. History

From Novelty to Nefarious: The Evolution of AI in Cybersecurity

Explore the historical trajectory that brought us to the current intersection of AI and security challenges. Understand the pivotal moments that transformed AI from a novelty to a potent weapon in the hands of malicious actors.

3. Video

Seeing is Believing: AI in Visual Attack Strategies

Dive into the realm of video AI technology. Uncover real-world attack examples where visuals are exploited for nefarious purposes. Learn how to leverage this technology defensively, preparing for the evolving landscape of visual attacks.

4. Audio

The Power of Voice: AI in Audio Attacks

Explore the auditory dimension of AI with a focus on voice technology. Delve into real-world examples of how audio AI is exploited in attacks. Discover proactive measures to harness this technology defensively and protect against audio-driven threats.

5. Text/Code

Social Engineering 2.0: AI in Text-Based Attacks

Examine the role of text AI in social engineering attacks and development efforts. Understand how adversaries manipulate language and code to infiltrate systems. Equip yourself with strategies to counteract the influence of text AI in cyber threats.

6. Recap

Key Takeaways: Navigating the AI Security Landscape

Summarize the critical insights gained throughout the presentation. Reinforce key takeaways to ensure that attendees leave with a comprehensive understanding of AI’s impact on information security and the tools to combat it.

7. Thanks + A Fun Q&A

Gratitude and Engagement

Express gratitude for the audience’s participation and curiosity. Conclude the presentation with an engaging and informative Q&A session, where participants can pose questions and contribute to the collective understanding of AI in information security.

Notes

This talk is updated monthly to keep up with current threats, so if you’ve seen an old version of it, then that old version is old.