The AI-Cybersecurity Nexus - Opportunities, Challenges, and Solutions Artificial Intelligence (AI) is revolutionizing cybersecurity, offering enhanced threat detection, proactive prevention, and streamlined response mechanisms. In this keynote, we will explore how AI is reshaping the cybersecurity landscape, especially IoT security, enabling faster incident resolution, more intuitive security tools, and greater overall efficiency. We will share key insights into what works, what doesn’t, and lessons learned from real-world implementations. However, while AI strengthens cybersecurity, it also introduces new vulnerabilities—adversarial AI, automated cyberattacks, and novel threat vectors that traditional defenses struggle to address. We will examine these emerging risks and the evolving tactics of malicious actors who leverage AI against security systems. Finally, this session will present actionable solutions to mitigate AI-driven threats, including fighting AI with AI, platformization, precision AI, adaptive defense strategies, responsible AI deployment, and the integration of AI with human intelligence to create more resilient security frameworks. Join us as we navigate the AI-cybersecurity nexus and chart a course toward a safer digital future.

Speaker's Biography: Dr. May Wang is the Chief Technology Officer for IoT Security at Palo Alto Networks, where she leads innovation in AI-driven cybersecurity solutions. She is the co-founder of Zingbox, the industry’s first AI-powered IoT security company, which was acquired by Palo Alto Networks in 2019. Before founding Zingbox, Dr. Wang served as a Principal Architect in the Cisco CTO Office. Dr. Wang holds a Ph.D. in Electrical Engineering from Stanford University and has received numerous accolades, including being recognized as the 2023 AI Entrepreneur of the Year by VentureBeat.

View More Papers

Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution...

Joonkyo Jung (Department of Computer Science, Yonsei University), Jisoo Jang (Department of Computer Science, Yonsei University), Yongwan Jo (Department of Computer Science, Yonsei University), Jonas Vinck (DistriNet, KU Leuven), Alexios Voulimeneas (CYS, TU Delft), Stijn Volckaert (DistriNet, KU Leuven), Dokyung Song (Department of Computer Science, Yonsei University)

Read More

MALintent: Coverage Guided Intent Fuzzing Framework for Android

Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), Taesoo Kim (Georgia Institute of Technology)

Read More

The Guardians of Name Street: Studying the Defensive Registration...

Boladji Vinny Adjibi (Georgia Tech), Athanasios Avgetidis (Georgia Tech), Manos Antonakakis (Georgia Tech), Michael Bailey (Georgia Tech), Fabian Monrose (Georgia Tech)

Read More

Make your IoT environments robust against adversarial machine learning...

Hamed Haddadpajouh (University of Guelph), Ali Dehghantanha (University of Guelph)

Read More