Session
Artificial Intelligence, Real Threats
Artificial Intelligence, Real Threats
Artificial Intelligence (AI) has transcended buzzword status, emerging as a potent and accessible tool. However, this power cuts both ways. In this presentation, we delve into the darker side of AI and its role in sophisticated information security attacks. How can adversaries harness AI, and what defensive strategies can we employ to stay ahead? Join us as we explore the evolving landscape of AI-driven threats and arm ourselves with knowledge to defend against them.
Agenda
1. Layout
Setting the Stage for the Unseen Threats
Get ready to embark on a journey through the shadowy realm of AI-powered attacks. We’ll outline the structure of our talk, providing a roadmap for the deep dive into AI’s role in information security.
2. History
From Novelty to Nefarious: The Evolution of AI in Cybersecurity
Explore the historical trajectory that brought us to the current intersection of AI and security challenges. Understand the pivotal moments that transformed AI from a novelty to a potent weapon in the hands of malicious actors.
3. Backend/Text/Code
Social Engineering 2.0: AI in Text-Based Attacks, AI automation
4. Video
Seeing is Believing: AI in Visual Attack Strategies
Dive into the realm of video AI technology. Uncover real-world attack examples where visuals are exploited for nefarious purposes. Learn how to leverage this technology defensively, preparing for the evolving landscape of visual attacks.
5. Audio
The Power of Voice: AI in Audio Attacks
Explore the auditory dimension of AI with a focus on voice technology. Delve into real-world examples of how audio AI is exploited in attacks. Discover proactive measures to harness this technology defensively and protect against audio-driven threats. LIVE DEMO of an INTERACTIVE ATTACK AGENT included!
Examine the role of text AI in social engineering attacks and development efforts. Understand how adversaries manipulate language and code to infiltrate systems. Equip yourself with strategies to counteract the influence of text AI in cyber threats.
6. Recap
Key Takeaways: Navigating the AI Security Landscape
Summarize the critical insights gained throughout the presentation. Reinforce key takeaways to ensure that attendees leave with a comprehensive understanding of AI’s impact on information security and the tools to combat it.
7. Thanks + A Fun Q&A
Gratitude and Engagement
Express gratitude for the audience’s participation and curiosity. Conclude the presentation with an engaging and informative Q&A session, where participants can pose questions and contribute to the collective understanding of AI in information security.

Johnny Xmas
"I don't seek to be well-known, I seek to be worth knowing"
Chicago, Illinois, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top