AI As a Force Multiplier
Total Page:16
File Type:pdf, Size:1020Kb
AI as a Force Multiplier Mohamed Helmy Regional Sales Director Middle East , Turkey and Africa ”I ROB BANKS BECAUSE THAT’S WHERE THE MONEY IS” WILLIE SUTTON (1901 – 1980) €40.000 Cost for unmitigated attack, per hour. Source: Ponemon Institute, 2017 Cost of Data Breach Study: Global Analysis, 2017 THE EVOLUTION OF ATTACKS Create Weaponize Monetize Commoditize THE SYNDICATES Yamaguchi-gumi / Yakuza (1915 - Present) TeslaTeam (2010 – Present) RedHack (1997- Present) The Business Club (2011 – Present) Bureau 121 (1998 - Present) Syrian Electronic Army (2011-Present) Fancy Bear/APT28 (Mid-2000s - Present Dyre (2014 – Present) Slavik (2005 – unknown) Equation Group (2015 – Present) Lazarus Group (2007 – Present) 414s (1982 – 1983) Reconnaissance General Bureau (2009 – Present) NCPH Group (1994-2009) ESTIMATED ANNUAL REVENUES CRIME ANNUAL REVENUES* Illicit, illegal online markets 860 billion Trade secret, IP theft 500 billion Data trading** 160 billion Crimeware, CaaS 1.6 billion (Cybercrime-as-a-Service) Ransomware 1 billion *totals are approximate **Revenues derived from trading in stolen data, such as: credit and debit card information banking log-in details, loyalty schemes and so on ***Revenues derived from extortions based on encrypting data and demanding payments Source: The Web of Profit, 2018, Dr Michael McGuire 1.500.000.000.000 Estimated annual income from cybercrime Source: The Web of Profit, 2018, Dr Michael McGuire CYLANCE AI AUGMENTS HUMAN WISDOM Learns from Billions Data Volume of Data Samples Crisis Security Real-time Continuous Management Complexity Prevention Self-Learning Budget Talent Force Multiplier Ever Present Limitations Shortage HUMAN MACHINE LEARNING CHALLENGES AUGMENTATION BUILDING A MACHINE LEARNING MODEL SPLIT DATA FOR IDENTIFY THE COLLECT DATA LABEL DATA TRAINING AND PROBLEM TESTING FEATURE MODEL MODEL PROBLEM EXTRACTION TRAINING TESTING SOLUTION ‘Eye roundness’? ‘pupil roundness’? ‘Ears hanging?’ ‘Tongue visible’? ‘Tongue width’? ‘Tongue length’? ‘Nostrils open’? ‘Nostrils size’? ‘Ears hanging’ = 0.0 ‘Ears hanging’ = 0.1 ‘Eye roundness’ = 0.5 ‘pupil roundness’ = 0.1 ‘Eye roundness’ = 0.9 ‘pupil roundness’ = 0.9 ‘Nostrils open’ = 0.2 ‘Nostrils size’ = 0.1 ‘Nostrils open’ = 1.0 ‘Nostrils size’ = 0.9 ‘Tongue visible’ = 0.8 ‘Tongue visible’ = 0.0 ‘Tongue width’ = 0.7 ‘Tongue width’ = 0.0 ‘Tongue length’ = 0.4 ‘Tongue length’ = 0.0 (0.1, 0.9, 0.9, 1.0, 0.9, 0.8, 0.7, 0.4) (0.0, 0.5, 0.1, 0.2, 0.1, 0.0, 0.0, 0.0) this dog’s feature vector this cat’s feature vector Ears hanging Eye roundness Pupil roundness Nostrils open Nostrils size Tongue visible Tongue width Dachshunds Tongue length Cats Persian Cats Dogs Visualization: Mark Borg Code sequences Strings Wavelet analysis Control structures Disassembly graphs Header structures Compilers Timezones MS Office Toolkits ... >2.7M features Malware Wannacry Good software Visualization: Mark Borg Predictive Prevention is Possible CylancePROTECT® has been able to detect and block new threats before they were first seen “in the wild” – without any updates or special configuration. Examples include: Time in Months Artificial Intelligence is learning from the past to predict and shape the future. Without Artificial Intelligence, Cyber ‘Is a Losing Strategy’ NSA Director Adm. Michael Rogers "Just as electricity transformed almost everything 100 years ago, today I actually have a hard time thinking of an industry that I don’t think AI will transform in the next several years." Prof. Andrew Ng, Stanford University Former Chief Scientist, Baidu Co-Founder of Coursera AI IN YOUR HANDS “We are a Data Science Company that does Security” *Source: Paysa Forbes AI Tech Investment Report WHY CYLANCE ? Effectiveness Simplicity Performance . 99.7% effectiveness * Replaces traditional AV . Lightweight agent . .0003% false positive rate * Increases ROI up to 250%* . 1-2% impact to CPU . Stops Malware executables Remove unnecessary layers . User systems run faster . Stops Fileless & Memory Malware Reduce help desk calls and . Extends hardware lifespan system re-imaging reducing costs . Stops Advanced Persistent Threats . Network bandwidth reduction by 98%* (APT) . Stop emergency patching . Stops Zero Day Attacks * Effectiveness Source: NSS Labs End Point Protection Report * ROI Source: Forrester Consulting Total Economic Impact Report THE €1.500.000.000 QUESTION… Can We Afford To Just Be Reactive? THANK YOU ©2019 Cylance Inc. All Rights Reserved..