善与恶AI攻击缓解策略.pdfVIP

  • 0
  • 0
  • 约2.2万字
  • 约 31页
  • 2026-01-04 发布于浙江
  • 举报

Goodvs.Evil:

AIAttackMitigationStrategies

SteveMcGeown,QACSecurityPracticeLeader

August6,2024

1Copyright©2024QAConsultants–AllRightsReserved

AbouttheSession

Goodvs.Evil:AIAttackMitigationStrategies

Badactorsaremorepowerfulnowthaneverbefore.ArmedwithAI-basedtechnologies,unlimitedcomputepower,

encryption,passwordguessingtools,andsubstantialhumanandfinancialresources,organizationsworldwideare

strugglingtocombattheirsophisticatedandrelentlesspursuits.Howdoyoufightan“invisible”enemythathides

behinduntraceableIPaddresses,basedincountriesontheothersideoftheworld,andareseeminglyunreachabledue

tothelackofinternationallyadoptedlegalprotections?Thissessiondivesintofiveprovenriskmitigationstrategiesto

fightbackagainstthecriminalsthatareinfiltratingourcompanies,stealingpersonalinformation,holdingsystems

hostage,siphoningmoney,andmore–allforpersonalgain,whileputtingpropertyandlivesatrisk.

Learningobjectives:

1)Identifyyoursystem’sweakestlinksmakingyoususceptibletomaliciousinfiltration

2)Understandthereal,crediblerisksyourorganizationfacesfrombadactors

3)DiscoverthebestriskmitigationstrategiestocombatbadactorsinanAI-drivenlandscape

2Copyright©2024QAConsultants–AllRightsReserved

AboutMe

SteveMcGeown,SecurityPracticeLeader

S

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档