© 2024 Balbix. All rights reserved.
The Role of AI in
Cyber Risk
Management
8/28/2024
Aravind Iyengar
2
© 2024 Balbix. All rights reserved.
Cyber Risk Management at a crossroads
Exploding Attack Surface
Rampant Threats
Accelerated AI Capabilities
© 2024 Balbix. All rights reserved.
Exploding Attack Surface
4
© 2024 Balbix. All rights reserved.
The Diverse and Shape-shifting Attack Surface
• Large and diverse inventory
▪ Influenced by waves of technologies
▪ Novel capabilities or productivity boosts
Networking
Systems
End-user
Compute
Web
Applications
OT / ICS
Mobile
devices
Cloud Assets IoT AI
5
© 2024 Balbix. All rights reserved.
Ingredients for a robust Security Practice
• Portfolio of tools for management & monitoring
▪ Requires diverse skill sets & practices
▪ Creates silos of visibility & islands of knowledge
CSPM ASPM DevSecOps IT CMDB VM CNAPP
XDR EDR SOAR SIEM IPS/IDS IAM PAM
6
© 2024 Balbix. All rights reserved.
The impossibility of Cyber Risk “Management”
• Diverse KPIs
• Disparate languages
Risk
Assets
Softwares
Vulnerabilities
Controls
Policies
7
© 2024 Balbix. All rights reserved.
The impossibility of Cyber Risk Management with
traditional approaches
Diverse
Attack
Surface
Portfolio of
Tools
Disparate
Languages
© 2024 Balbix. All rights reserved.
Rampant Threats
9
© 2024 Balbix. All rights reserved.
The Vulnerability in identifying Vulnerabilities
• Manual analysis unable to keep up
• No consensus on communication standards
▪ CPEs – not enforced as unique identifiers
▪ CPEs vs. PURLs
• Increasing reliance on FOSS
▪ Significantly compounds this problem
Image credit: https://www.conquer-your-risk.com/
10
© 2024 Balbix. All rights reserved.
The Avalanche of Exploits
• Remediation
practices are
falling behind
significantly!
Image credits: Verizon DBIR 2024
• Meanwhile…
▪ Exploit volume is increasing
▪ ~3x more Y-o-Y
▪ Time-to-exploit is shrinking
▪ ~14x shorter for critical vulnerabilities
11
© 2024 Balbix. All rights reserved.
The Failure of Prioritization
• CVSS inefficient
▪ >50% of CVEs have 7+ scores
• EPSS / Threat indicators good for threat hunting
▪ Not for VM
• At ~150 new CVEs / day
▪ No option but to prioritize
▪ But no way to prioritize!
• And what about all the non-CVE
vulnerabilities?!
12
© 2024 Balbix. All rights reserved.
The impossibility of Cyber Risk Management with
traditional approaches
Diverse
Attack
Surface
Portfolio of
Tools
Disparate
Languages
Vulnerability
Identification
Vulnerability
Avalanche
of Exploits
Failure of
Prioritization
© 2024 Balbix. All rights reserved.
Accelerated AI Capabilities
14
© 2024 Balbix. All rights reserved.
The Journey of AI
• Turing test – 1950
▪ Intelligence as equivalent to indistinguishability with humans
• Shannon’s theory of Communication – 1948
▪ Information (in language) as a measure of unpredictability (of the
next word)
• Revival of the neural networks – 1980s
▪ Universal Approximation Theorem
▪ “Probably Approximately Correct”
15
© 2024 Balbix. All rights reserved.
The AI Renaissance
• Supervised learning
• Stepping stones
▪ Parallel & distributed compute
▪ Larger labeled datasets
• Powerful neural network architectures
▪ Deeper than wider – deep learning
▪ Long Short-term Memory, Convolutional Neural Networks
▪ Transformer & attention
• Limited by availability of labeled data
Image credit: Wikipedia
16
© 2024 Balbix. All rights reserved.
LLMs: Circling back to where it started
• Language model
▪ Predict the next “word”
▪ “Self”-supervised!
▪ Bigger is better – “large” models
Image credit: www.nextbigfuture.com
• Arguably passing the Turing
test!
• Open-source LLMs closing the
gap with closed-source!
17
© 2024 Balbix. All rights reserved.
What can we do with this?
• Make sense of textual data – irrespective of the “language”!
▪ Comprehend information from different tools
• Cleanse data – map it to known & well-understood entities
▪ Sanitize and normalize information
• Deduplicate and consolidate
▪ Corroborate across sources and resolve conflicting information
• Draw inferences to link concepts
▪ Deduce with logic and interrelate pieces of information
• Categorize and catalogue
▪ Organize and operationalize
• Reason and quantify
▪ Prioritize based on subject-matter expertise
• Justify, explain and interact in simple, human language!
18
© 2024 Balbix. All rights reserved.
The AI Blueprint for Cyber Risk Management
• Cast a wide net with automated AI inferences
▪ Immediately operationalize to remediate high-confidence top-risks
• Remove blind spots
▪ Plug gaps in visibility and low-confidence data points by adding appropriate
tools, particularly where expected to be material
• Spot-check
▪ Reserve expert resources for scrutiny in high-impact scenarios
• Maintain & govern
▪ Book-keep and drive compliance of policies and SLAs
▪ Introspect to ensure requirements are in line with risk tolerance
19
© 2024 Balbix. All rights reserved.
The possibility of Cyber Risk Management with AI
Bring all data
together
Comprehend,
sanitize, correlate
& deduplicate
inventory
Deduce & infer
vulnerabilities
Evaluate controls
& mitigations
Quantify risk
exposure
Prioritize &
operationalize
20
© 2024 Balbix. All rights reserved.
At a crossroads…
• Stick to manual approaches
• Show the busy work of tackling a small sliver of issues that are not
particularly correlated with risk
Ignorance is bliss
• Assess all issues with AI automatically
• Show the smart work of tackling all high-risk issues identified, with
robust and data-driven justification of assessments
Knowledge is power
© 2024 Balbix. All rights reserved.
Sign up for a Demo
of Balbix today!
Thank you
© 2024 Balbix. All rights reserved.

More Related Content

PDF
Data Science for Cyber Risk
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
PPTX
Solnet dev secops meetup
PDF
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
PPTX
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
PPTX
RVAsec Bill Weinberg Open Source Hygiene Presentation
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Data Science for Cyber Risk
Security in the age of open source - Myths and misperceptions
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Solnet dev secops meetup
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
RVAsec Bill Weinberg Open Source Hygiene Presentation
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats

Similar to GDG Cloud Southlake #35: Aravind Iyengar: The Role of AI in Cyber Risk Management (20)

PPTX
Malware and the risks of weaponizing code
PDF
Rugged Dev: Building Reliability and Security Into Software
PDF
The Rugged Way in the Cloud--Building Reliability and Security into Software
PDF
110307 cloud security requirements gourley
PPTX
RMS Security Breakfast
PDF
Re-Thinking BYOD Policy.pptx
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Game Changing Cyber Defensive Strategies for 2019
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PDF
Shift Toward Dynamic Cyber Resilience
PPTX
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
PDF
Building Your Application Security Data Hub - OWASP AppSecUSA
PDF
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
PDF
Information Security Intelligence
PPTX
Top Application Security Trends of 2012
PDF
A gentle introduction to MLSecOps - 2024-10-11
PDF
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
PDF
Streamlining AppSec Policy Definition.pptx
PPTX
The How and Why of Container Vulnerability Management
PPTX
The How and Why of Container Vulnerability Management
Malware and the risks of weaponizing code
Rugged Dev: Building Reliability and Security Into Software
The Rugged Way in the Cloud--Building Reliability and Security into Software
110307 cloud security requirements gourley
RMS Security Breakfast
Re-Thinking BYOD Policy.pptx
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Game Changing Cyber Defensive Strategies for 2019
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Shift Toward Dynamic Cyber Resilience
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
Building Your Application Security Data Hub - OWASP AppSecUSA
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Information Security Intelligence
Top Application Security Trends of 2012
A gentle introduction to MLSecOps - 2024-10-11
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
Streamlining AppSec Policy Definition.pptx
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Ad

More from James Anderson (20)

PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
PDF
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
PDF
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
PDF
GDG Cloud Southlake #41: Shay Levi: Beyond the Hype:How Enterprises Are Using AI
PDF
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
PDF
GDG Cloud Southlake #39 Jacek Ostrowski: Platform Engineering Useful Models
PDF
GDG Cloud Southlake #38: Alex Snihovyi: The LastDevOps Way for Code Reviews
PDF
GDG Cloud Southlake #36: Kyle Forster: AI and Modern Workflow Automation: Aut...
PDF
Alt. GDG Cloud Southlake #35_ Aravind Iyengar_ The Role of AI in Cyber Risk M...
PDF
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
PDF
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
PDF
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
PDF
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
PDF
GDG Cloud Southlake 31: Santosh Chennuri and Festus Yeboah: Empowering Develo...
PDF
GDG Cloud Southlake 30 Brian Demers Breeding 10x Developers with Developer Pr...
PDF
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
PDF
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
PDF
GDG SLK - Why should devs care about container security.pdf
PDF
GraphQL Insights Deck ( Sabre_GDG - Sept 2023).pdf
PDF
GDG Cloud Southlake #25: Jacek Ostrowski & David Browne: Sabre's Journey to ...
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #41: Shay Levi: Beyond the Hype:How Enterprises Are Using AI
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #39 Jacek Ostrowski: Platform Engineering Useful Models
GDG Cloud Southlake #38: Alex Snihovyi: The LastDevOps Way for Code Reviews
GDG Cloud Southlake #36: Kyle Forster: AI and Modern Workflow Automation: Aut...
Alt. GDG Cloud Southlake #35_ Aravind Iyengar_ The Role of AI in Cyber Risk M...
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 31: Santosh Chennuri and Festus Yeboah: Empowering Develo...
GDG Cloud Southlake 30 Brian Demers Breeding 10x Developers with Developer Pr...
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG SLK - Why should devs care about container security.pdf
GraphQL Insights Deck ( Sabre_GDG - Sept 2023).pdf
GDG Cloud Southlake #25: Jacek Ostrowski & David Browne: Sabre's Journey to ...
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
NewMind AI Weekly Chronicles – August ’25 Week IV
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Basics of Cloud Computing - Cloud Ecosystem
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
MuleSoft-Compete-Deck for midddleware integrations
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
SGT Report The Beast Plan and Cyberphysical Systems of Control
Build Real-Time ML Apps with Python, Feast & NoSQL
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Co-training pseudo-labeling for text classification with support vector machi...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Ensemble model-based arrhythmia classification with local interpretable model...
4 layer Arch & Reference Arch of IoT.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication

GDG Cloud Southlake #35: Aravind Iyengar: The Role of AI in Cyber Risk Management

  • 1. © 2024 Balbix. All rights reserved. The Role of AI in Cyber Risk Management 8/28/2024 Aravind Iyengar
  • 2. 2 © 2024 Balbix. All rights reserved. Cyber Risk Management at a crossroads Exploding Attack Surface Rampant Threats Accelerated AI Capabilities
  • 3. © 2024 Balbix. All rights reserved. Exploding Attack Surface
  • 4. 4 © 2024 Balbix. All rights reserved. The Diverse and Shape-shifting Attack Surface • Large and diverse inventory ▪ Influenced by waves of technologies ▪ Novel capabilities or productivity boosts Networking Systems End-user Compute Web Applications OT / ICS Mobile devices Cloud Assets IoT AI
  • 5. 5 © 2024 Balbix. All rights reserved. Ingredients for a robust Security Practice • Portfolio of tools for management & monitoring ▪ Requires diverse skill sets & practices ▪ Creates silos of visibility & islands of knowledge CSPM ASPM DevSecOps IT CMDB VM CNAPP XDR EDR SOAR SIEM IPS/IDS IAM PAM
  • 6. 6 © 2024 Balbix. All rights reserved. The impossibility of Cyber Risk “Management” • Diverse KPIs • Disparate languages Risk Assets Softwares Vulnerabilities Controls Policies
  • 7. 7 © 2024 Balbix. All rights reserved. The impossibility of Cyber Risk Management with traditional approaches Diverse Attack Surface Portfolio of Tools Disparate Languages
  • 8. © 2024 Balbix. All rights reserved. Rampant Threats
  • 9. 9 © 2024 Balbix. All rights reserved. The Vulnerability in identifying Vulnerabilities • Manual analysis unable to keep up • No consensus on communication standards ▪ CPEs – not enforced as unique identifiers ▪ CPEs vs. PURLs • Increasing reliance on FOSS ▪ Significantly compounds this problem Image credit: https://www.conquer-your-risk.com/
  • 10. 10 © 2024 Balbix. All rights reserved. The Avalanche of Exploits • Remediation practices are falling behind significantly! Image credits: Verizon DBIR 2024 • Meanwhile… ▪ Exploit volume is increasing ▪ ~3x more Y-o-Y ▪ Time-to-exploit is shrinking ▪ ~14x shorter for critical vulnerabilities
  • 11. 11 © 2024 Balbix. All rights reserved. The Failure of Prioritization • CVSS inefficient ▪ >50% of CVEs have 7+ scores • EPSS / Threat indicators good for threat hunting ▪ Not for VM • At ~150 new CVEs / day ▪ No option but to prioritize ▪ But no way to prioritize! • And what about all the non-CVE vulnerabilities?!
  • 12. 12 © 2024 Balbix. All rights reserved. The impossibility of Cyber Risk Management with traditional approaches Diverse Attack Surface Portfolio of Tools Disparate Languages Vulnerability Identification Vulnerability Avalanche of Exploits Failure of Prioritization
  • 13. © 2024 Balbix. All rights reserved. Accelerated AI Capabilities
  • 14. 14 © 2024 Balbix. All rights reserved. The Journey of AI • Turing test – 1950 ▪ Intelligence as equivalent to indistinguishability with humans • Shannon’s theory of Communication – 1948 ▪ Information (in language) as a measure of unpredictability (of the next word) • Revival of the neural networks – 1980s ▪ Universal Approximation Theorem ▪ “Probably Approximately Correct”
  • 15. 15 © 2024 Balbix. All rights reserved. The AI Renaissance • Supervised learning • Stepping stones ▪ Parallel & distributed compute ▪ Larger labeled datasets • Powerful neural network architectures ▪ Deeper than wider – deep learning ▪ Long Short-term Memory, Convolutional Neural Networks ▪ Transformer & attention • Limited by availability of labeled data Image credit: Wikipedia
  • 16. 16 © 2024 Balbix. All rights reserved. LLMs: Circling back to where it started • Language model ▪ Predict the next “word” ▪ “Self”-supervised! ▪ Bigger is better – “large” models Image credit: www.nextbigfuture.com • Arguably passing the Turing test! • Open-source LLMs closing the gap with closed-source!
  • 17. 17 © 2024 Balbix. All rights reserved. What can we do with this? • Make sense of textual data – irrespective of the “language”! ▪ Comprehend information from different tools • Cleanse data – map it to known & well-understood entities ▪ Sanitize and normalize information • Deduplicate and consolidate ▪ Corroborate across sources and resolve conflicting information • Draw inferences to link concepts ▪ Deduce with logic and interrelate pieces of information • Categorize and catalogue ▪ Organize and operationalize • Reason and quantify ▪ Prioritize based on subject-matter expertise • Justify, explain and interact in simple, human language!
  • 18. 18 © 2024 Balbix. All rights reserved. The AI Blueprint for Cyber Risk Management • Cast a wide net with automated AI inferences ▪ Immediately operationalize to remediate high-confidence top-risks • Remove blind spots ▪ Plug gaps in visibility and low-confidence data points by adding appropriate tools, particularly where expected to be material • Spot-check ▪ Reserve expert resources for scrutiny in high-impact scenarios • Maintain & govern ▪ Book-keep and drive compliance of policies and SLAs ▪ Introspect to ensure requirements are in line with risk tolerance
  • 19. 19 © 2024 Balbix. All rights reserved. The possibility of Cyber Risk Management with AI Bring all data together Comprehend, sanitize, correlate & deduplicate inventory Deduce & infer vulnerabilities Evaluate controls & mitigations Quantify risk exposure Prioritize & operationalize
  • 20. 20 © 2024 Balbix. All rights reserved. At a crossroads… • Stick to manual approaches • Show the busy work of tackling a small sliver of issues that are not particularly correlated with risk Ignorance is bliss • Assess all issues with AI automatically • Show the smart work of tackling all high-risk issues identified, with robust and data-driven justification of assessments Knowledge is power
  • 21. © 2024 Balbix. All rights reserved. Sign up for a Demo of Balbix today!
  • 22. Thank you © 2024 Balbix. All rights reserved.