SlideShare a Scribd company logo
1 of 13
Download to read offline
HOWAICANHELPIN
CYBERSECURITY
My name is Priyanshu Ratnakar. I'm an
Indian teen entrepreneur. Founder, Director
and Chief Executive Officer of Protocol X.
I'm a cyber security practitioner. I was also
named in Your-story’s and Time of India's
Top 5 Youngest Entrepreneurs of India 2020
WHOAMI?
for more www.priyanshuratnakar.com
WHYAI?
Understanding the Concept
THEAIUMBRELLA
Ttypes Of AI
The next stage in the development of AI is to use machine learning (ML).
ML relies on neural networks—computer systems modeled on the
human brain and nervous system—which can classify information into
categories based on elements that those categories contain (for
example, photos of dogs or heavy metal songs). ML uses probability to
make decisions or predictions about data with a reasonable degree of
certainty. In addition, it is capable of refining itself when given feedback
on whether it is right or wrong. ML can modify how it analyzes data (or
what data is relevant) in order to improve its chances of making a
correct decision in the future. ML works relatively well for shape
detection, like identifying types of objects or letters for
transliteration.The neural networks used for ML were developed in the
1980s but, because they are computationally intensive, they have only
been viable on a large scale since the advent of graphics processing
units (GPUs) and high-performing CPUs.
MACHINELEARNING
Deep learning (DL) is essentially a subset of ML that
extends ML capabilities across multilayered neural
networks to go beyond just categorizing data. DL can
actually learn—self-train, essentially—from massive
amounts of data. With DL, it’s possible to combine the
unique ability of computers to process massive
amounts of information quickly, with the human-like
ability to take in, categorize, learn, and adapt.
Together, these skills allow modern DL programs to
perform advanced tasks, such as identifying
cancerous tissue in MRI scans. DL also makes it
possible to develop driverless cars and designer
medications that are tailored to an individual’s
genome.
DEEPLEARNING
to make useful decisions, they need us to provide
them with two things:
Lots and lots of relevant data
Specific rules on how to examine that data
AIHELPINGINDAILYLIFE
fingerprint
face recognition
Security and Surveillance
Antivrus
AIGONEWRONG
AIINCYBER
SECURITY
THE ROLE OF
HOWWILLAIAFFECT
CYBERSECURITY?
AI IN CYBER SECURITY
AIINCYBERSECURITY
IT Asset Inventory
Threat Exposure
Controls Effectiveness
Breach Risk Prediction
Incident response
Explainability
01
02
03
04
05
06
HOWDOHACKERSUSE
ARTIFICIALINTELLIGENCE?
AI Weaponization by Hackers
instagram.com/priyanshu_ratnakar
hello@priyanshuratnakar.com
THANKYOU!
facebook.com/ratnakarpriyanshu
www.priyanshuratnakar.com

More Related Content

What's hot

When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
Lior Rokach
 

What's hot (20)

“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
AI in security
AI in securityAI in security
AI in security
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 

Similar to HOW AI CAN HELP IN CYBERSECURITY

Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
eswaralaldevadoss
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!
Kavika Roy
 

Similar to HOW AI CAN HELP IN CYBERSECURITY (20)

AI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptxAI vs ML-converted-converted.pptx
AI vs ML-converted-converted.pptx
 
The Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine LearningThe Ultimate Guide On Difference Between AI And Machine Learning
The Ultimate Guide On Difference Between AI And Machine Learning
 
The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)The Ultimate Guide to Machine Learning (ML)
The Ultimate Guide to Machine Learning (ML)
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
Tech Today.pptx
Tech Today.pptxTech Today.pptx
Tech Today.pptx
 
Machine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guideMachine Learning vs. Generative AI: A guide
Machine Learning vs. Generative AI: A guide
 
Unveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docxUnveiling the Power of Machine Learning.docx
Unveiling the Power of Machine Learning.docx
 
AI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptxAI Ml Introduction with images and examples.pptx
AI Ml Introduction with images and examples.pptx
 
Automated machine learning: the new data science challenge
Automated machine learning: the new data science challengeAutomated machine learning: the new data science challenge
Automated machine learning: the new data science challenge
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docx
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec ppt
 
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...REVOLUTIONIZING BANKING OPERATIONS: THE  ROLE OF ARTIFICIAL INTELLIGENCE IN  ...
REVOLUTIONIZING BANKING OPERATIONS: THE ROLE OF ARTIFICIAL INTELLIGENCE IN ...
 
Machine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdfMachine Learning The Powerhouse of AI Explained.pdf
Machine Learning The Powerhouse of AI Explained.pdf
 
Artificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptxArtificial Intelligence vs Machine Learning.pptx
Artificial Intelligence vs Machine Learning.pptx
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network converted
 
AI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdfAI Revolution_ How AI is Revolutionizing Technology.pdf
AI Revolution_ How AI is Revolutionizing Technology.pdf
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docx
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!11 Insane Machine Learning Myths Debunked for You!
11 Insane Machine Learning Myths Debunked for You!
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

HOW AI CAN HELP IN CYBERSECURITY

  • 2. My name is Priyanshu Ratnakar. I'm an Indian teen entrepreneur. Founder, Director and Chief Executive Officer of Protocol X. I'm a cyber security practitioner. I was also named in Your-story’s and Time of India's Top 5 Youngest Entrepreneurs of India 2020 WHOAMI? for more www.priyanshuratnakar.com
  • 6. The next stage in the development of AI is to use machine learning (ML). ML relies on neural networks—computer systems modeled on the human brain and nervous system—which can classify information into categories based on elements that those categories contain (for example, photos of dogs or heavy metal songs). ML uses probability to make decisions or predictions about data with a reasonable degree of certainty. In addition, it is capable of refining itself when given feedback on whether it is right or wrong. ML can modify how it analyzes data (or what data is relevant) in order to improve its chances of making a correct decision in the future. ML works relatively well for shape detection, like identifying types of objects or letters for transliteration.The neural networks used for ML were developed in the 1980s but, because they are computationally intensive, they have only been viable on a large scale since the advent of graphics processing units (GPUs) and high-performing CPUs. MACHINELEARNING Deep learning (DL) is essentially a subset of ML that extends ML capabilities across multilayered neural networks to go beyond just categorizing data. DL can actually learn—self-train, essentially—from massive amounts of data. With DL, it’s possible to combine the unique ability of computers to process massive amounts of information quickly, with the human-like ability to take in, categorize, learn, and adapt. Together, these skills allow modern DL programs to perform advanced tasks, such as identifying cancerous tissue in MRI scans. DL also makes it possible to develop driverless cars and designer medications that are tailored to an individual’s genome. DEEPLEARNING to make useful decisions, they need us to provide them with two things: Lots and lots of relevant data Specific rules on how to examine that data
  • 11. AIINCYBERSECURITY IT Asset Inventory Threat Exposure Controls Effectiveness Breach Risk Prediction Incident response Explainability 01 02 03 04 05 06