Abstract: With AI showing promising outcomes for a wide range of digital processes, threat actors find it lucrative to adopt AI technologies to enhance their cyber attack operations. AI-generated attack vectors are a concern, as they leverage AI’s capabilities to craft sophisticated and adaptive threats that can bypass traditional security measures. AI-generated attack vectors include a range of techniques, from machine learning-powered phishing attacks to automated malware creation and evasion strategies. One concerning aspect is the ability of AI to analyze vast datasets and identify vulnerabilities in systems or networks, allowing attackers to exploit weaknesses more efficiently. In this rapidly evolving landscape, staying ahead of the curve is essential to safeguarding digital assets and privacy in an AI-driven world. The current webinar explores AI-generated attack vectors, as understanding these evolving threats is the first step in developing effective countermeasures. This webinar also discusses approaches to advancing AI-driven security solutions that are capable of detecting and mitigating AI-generated attacks while also fostering responsible AI development to mitigate potential misuse.
- Understanding the role of AI in the security and threat landscape
- AI-driven attack vector development
- Understanding AI-driven human and system hacking
- Identifying and mitigating AI-driven attacks
- Developing counterintelligence: AI-driven security
Dennis Houchin, President, Ad Hoc Information Systems
Bio: Dennis Houchin is the President of Ad Hoc Information Systems, a consultancy he founded in 1994. He has spent 41 years in information systems and security, and he has helped small businesses navigate the complexities of cybersecurity for 25 years. Today, Dennis actively explores AI’s role in cybersecurity, staying on the bleeding edge of technology.
Dennis is also an instructor and mentor specializing in ethical hacking and digital forensics/incident response (DFIR). He coaches his boot camp students toward successful cybersecurity careers. He’s authored three impactful books: The Passion Principles, The Achievement Protocol, and Cybersecurity for Executives, Managers, and Leaders. The first two are focused on personal development and living a fulfilling life. The third introduces the underbelly of cybersecurity to decision-makers.
*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)