SlideShare a Scribd company logo
5
Most read
Security Boulevard Presents:
Our Panel
Setu Kulkarni, VP, Product &
Corporate Strategy, WhiteHat Security
Jared Carlson, Principal
Researcher for Strategy,
CA Veracode
Alan Shimel, Editor-in- Chief, DevOps.com, Security
Boulevard, Container Journal
The Next Great Leap
Machine Learning (ML) and Artificial
Intelligence (AI) have been proclaimed as
perhaps the next great leap in human
quality of life, as well as a potential reason
for our extinction. Somewhere in between
lies how ML & AI can potentially improve
our Cyber Security efforts.
But are ML & AI a true panacea or merely
the next shiny trinket for the cyber industry
to fixate on?
Let’s Explore
• How ML & AI is currently being utilized in cyber security
efforts
• What is working and what has not worked
• What is on the both the short term and near-term
horizon for ML &AI
• Practical steps you can take now to begin leveraging
these technologies to tangibly improve your cyber
security posture
Practical Steps to Success
Practical steps you can take now to begin leveraging these
technologies to tangibly improve your cyber security posture:
• Understand what your data collecting capabilities are
• Ensure you have the ability to analyze the amount of
data you collect
• AI and ML can be force multipliers, but aren’t a total
solutions
• No matter which solution you choose, understand why
actions and decisions are made
• Even if you are already using AI & ML stay on top of
new developments, new technologies and new
products/services
© 2017 WhiteHat Security, Inc.
WhiteHat Security Secures Digital Business
WhiteHat Combines Technology
and Human Intelligence to perform
Application Security Testing via:
➢ Dynamic Web App Scans
➢ Source Code Scans
➢ Mobile App Scans
➢ Computer-Based Training for
security and developers
Verified Vulnerabilities via
WhiteHat’s Threat Research Center
offer near 0% False Positive Rates.
© 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7
About Veracode
Company
Growth
• 6 Trillion + lines of Code
Scanned*
• A 4X Leader in Gartner
Magic Quadrant for
application Security
Testing (Feb 2017)*
• 1400+ Customers
• 30+ Patents
Customer
Outcomes
•36.5M Flaws Fixed
All Time
•3,100 Consultation
Calls
•400,000 Program
Management
Hours
Enabling
Developers
•3 Second Scan
times (with Greenlight)
•24 Languages
Supported
•77 Frameworks
Supported
•29 Integrations
Note: * indicates year-to-date
*Veracode Acquired April 2017
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner
research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Questions
Recording of this webinar will be
available at SecurityBoulevard.com.

More Related Content

What's hot (20)

PPTX
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
PDF
Generative-AI-in-enterprise-20230615.pdf
Liming Zhu
 
PDF
Responsible Generative AI
CMassociates
 
PDF
Responsible AI
Data Con LA
 
PDF
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
PDF
Security Automation and Machine Learning
Siemplify
 
PDF
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
PPTX
AI and the Impact on Cybersecurity
Graham Mann
 
PDF
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
PPTX
The Future of AI is Generative not Discriminative 5/26/2021
Steve Omohundro
 
PPTX
Responsible AI in Industry: Practical Challenges and Lessons Learned
Krishnaram Kenthapadi
 
PPTX
Generative AI, WiDS 2023.pptx
Colleen Farrelly
 
PDF
AI in security
Subrat Panda, PhD
 
PPTX
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Sqrrl
 
PDF
Using the power of Generative AI at scale
Maxim Salnikov
 
PPTX
Cyber security and AI
DexterJanPineda
 
PDF
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
PDF
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
 
PDF
Nasscom AI top 50 use cases
ADDI AI 2050
 
PDF
Exploring Opportunities in the Generative AI Value Chain.pdf
Dung Hoang
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
Generative-AI-in-enterprise-20230615.pdf
Liming Zhu
 
Responsible Generative AI
CMassociates
 
Responsible AI
Data Con LA
 
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Security Automation and Machine Learning
Siemplify
 
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
AI and the Impact on Cybersecurity
Graham Mann
 
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
The Future of AI is Generative not Discriminative 5/26/2021
Steve Omohundro
 
Responsible AI in Industry: Practical Challenges and Lessons Learned
Krishnaram Kenthapadi
 
Generative AI, WiDS 2023.pptx
Colleen Farrelly
 
AI in security
Subrat Panda, PhD
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Sqrrl
 
Using the power of Generative AI at scale
Maxim Salnikov
 
Cyber security and AI
DexterJanPineda
 
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
 
Nasscom AI top 50 use cases
ADDI AI 2050
 
Exploring Opportunities in the Generative AI Value Chain.pdf
Dung Hoang
 

Similar to How Machine Learning & AI Will Improve Cyber Security (20)

PPTX
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
DataScienceConferenc1
 
PPTX
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
CalvinLim55
 
PPTX
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
 
PDF
influence of AI in IS
ISACA Riyadh
 
DOCX
Hot Cyber Security Technologies
RuchikaSachdeva4
 
PPTX
First line of defense for cybersecurity : AI
Ahmed Banafa
 
PPTX
Group 8 Advanced Cybersecurity Applications using AI.pptx
apsapssingh9
 
PDF
What are top 7 cyber security trends for 2020
TestingXperts
 
PDF
AI and Machine Learning in Cybersecurity.pdf
Ciente
 
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PixelCrayons
 
PDF
AI in Hacking
venkatvajradhar1
 
PDF
presentazione informatica per sito web scuola
natalimecaj613
 
PDF
Top 15 AI-enabled cybersecurity companies in 2022.pdf
SonaliG6
 
PPTX
AI & Cyber Security presentation it is a
ateebeqbal8
 
PDF
Jump Start Your Application Security Knowledge
Denim Group
 
PDF
Digital marketing revolution in 2025 for business people
vcubedigitalmarketin1
 
PPTX
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
Bahaa Farouk
 
PDF
The Security Challenge: What's Next?
Cognizant
 
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
DataScienceConferenc1
 
stanger__state_of_cybersecurity_ai_driven_world_july_9_2024.pptx
CalvinLim55
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
 
influence of AI in IS
ISACA Riyadh
 
Hot Cyber Security Technologies
RuchikaSachdeva4
 
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Group 8 Advanced Cybersecurity Applications using AI.pptx
apsapssingh9
 
What are top 7 cyber security trends for 2020
TestingXperts
 
AI and Machine Learning in Cybersecurity.pdf
Ciente
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PixelCrayons
 
AI in Hacking
venkatvajradhar1
 
presentazione informatica per sito web scuola
natalimecaj613
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
SonaliG6
 
AI & Cyber Security presentation it is a
ateebeqbal8
 
Jump Start Your Application Security Knowledge
Denim Group
 
Digital marketing revolution in 2025 for business people
vcubedigitalmarketin1
 
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
Bahaa Farouk
 
The Security Challenge: What's Next?
Cognizant
 
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
PPTX
Vulnerability Discovery in the Cloud
DevOps.com
 
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
PDF
A New Year’s Ransomware Resolution
DevOps.com
 
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
PDF
Don't Panic! Effective Incident Response
DevOps.com
 
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
PDF
Monitoring Serverless Applications with Datadog
DevOps.com
 
PDF
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
PPTX
Securing medical apps in the age of covid final
DevOps.com
 
PDF
How to Build a Healthy On-Call Culture
DevOps.com
 
PPTX
The Evolving Role of the Developer in 2021
DevOps.com
 
PDF
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
PPTX
Secure Data Sharing in OpenShift Environments
DevOps.com
 
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Ad

Recently uploaded (20)

PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 

How Machine Learning & AI Will Improve Cyber Security

  • 2. Our Panel Setu Kulkarni, VP, Product & Corporate Strategy, WhiteHat Security Jared Carlson, Principal Researcher for Strategy, CA Veracode Alan Shimel, Editor-in- Chief, DevOps.com, Security Boulevard, Container Journal
  • 3. The Next Great Leap Machine Learning (ML) and Artificial Intelligence (AI) have been proclaimed as perhaps the next great leap in human quality of life, as well as a potential reason for our extinction. Somewhere in between lies how ML & AI can potentially improve our Cyber Security efforts. But are ML & AI a true panacea or merely the next shiny trinket for the cyber industry to fixate on?
  • 4. Let’s Explore • How ML & AI is currently being utilized in cyber security efforts • What is working and what has not worked • What is on the both the short term and near-term horizon for ML &AI • Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture
  • 5. Practical Steps to Success Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture: • Understand what your data collecting capabilities are • Ensure you have the ability to analyze the amount of data you collect • AI and ML can be force multipliers, but aren’t a total solutions • No matter which solution you choose, understand why actions and decisions are made • Even if you are already using AI & ML stay on top of new developments, new technologies and new products/services
  • 6. © 2017 WhiteHat Security, Inc. WhiteHat Security Secures Digital Business WhiteHat Combines Technology and Human Intelligence to perform Application Security Testing via: ➢ Dynamic Web App Scans ➢ Source Code Scans ➢ Mobile App Scans ➢ Computer-Based Training for security and developers Verified Vulnerabilities via WhiteHat’s Threat Research Center offer near 0% False Positive Rates.
  • 7. © 2017 VERACODE INC. ACQUIRED BY CA TECHNOLOGIES7 About Veracode Company Growth • 6 Trillion + lines of Code Scanned* • A 4X Leader in Gartner Magic Quadrant for application Security Testing (Feb 2017)* • 1400+ Customers • 30+ Patents Customer Outcomes •36.5M Flaws Fixed All Time •3,100 Consultation Calls •400,000 Program Management Hours Enabling Developers •3 Second Scan times (with Greenlight) •24 Languages Supported •77 Frameworks Supported •29 Integrations Note: * indicates year-to-date *Veracode Acquired April 2017 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 8. Questions Recording of this webinar will be available at SecurityBoulevard.com.