Feb. 23, 2024, 5:45 p.m. | Black Hat

Black Hat www.youtube.com

...In this presentation, we will address a future cyber adversary whose actions and decisions are entirely controlled by an autonomous system (AI). This autonomous system uses automated planning algorithms and search techniques to drive its cyber-attack operations and achieve the desired objective(s). Given such a scenario, we ask: (1) can novel cyber deceptions be constructed and deployed in such a manner as to directly target weaknesses in the automated planning and search techniques; and (2) can an effective emulation system …

actions address adversary algorithms ask attack attacks automated autonomous can cyber cyber-attack cyber attacks cyber deception deception drive future novel operations planning presentation scenario search system techniques

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Compliance Advisor

@ SAP | Budapest, HU, 1031

DevSecOps Engineer

@ Qube Research & Technologies | London

Software Engineer, Security

@ Render | San Francisco, CA or Remote (USA & Canada)

Associate Consultant

@ Control Risks | Frankfurt, Hessen, Germany

Senior Security Engineer

@ Activision Blizzard | Work from Home - CA