Eric Dull, Drew Walsh, Scott Riede (Deloitte and Touche)

Cyber has been the original big-data for decades. Since Denning and Neumann’s 1985 whitepaper on statistical analysis for intrusion detection systems1, cyber has seen the need for complex event processors to manage the scale of cyber data. Security Operations Centers (SOCs) have been successful in overcoming this challenge, as evidenced by the rise of behavioral analytics, supervised machine learning methods, training data sets, and the scaling of technology. This talk will describe the strategies used in successful automation, AI adoption, and implementation and offer a framework for engaging executives to help guide effective AI use in the broader organization outside of the SOC.

View More Papers

WIP: Threat Modeling Laser-Induced Acoustic Interference in Computer Vision-Assisted...

Nina Shamsi (Northeastern University), Kaeshav Chandrasekar, Yan Long, Christopher Limbach (University of Michigan), Keith Rebello (Boeing), Kevin Fu (Northeastern University)

Read More

UniID: Spoofing Face Authentication System by Universal Identity

Zhihao Wu (Zhejiang University), Yushi Cheng (Zhejiang University), Shibo Zhang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejing University)

Read More

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural...

Gorka Abad (Radboud University & Ikerlan Technology Research Centre), Oguzhan Ersoy (Radboud University), Stjepan Picek (Radboud University & Delft University of Technology), Aitor Urbieta (Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA))

Read More