RSA 2022人工智能安全洞察——在对抗中前进

  类别

  话题

  演讲者来源

  一句话总结

  AI对抗

  Fake or Real, Catch Me if You Can. A Real Life Event Using Deepfake Tech

  SAP

  利用收集的语音和图像样本,构建深度虚假社会形象

  Measuring the Difference: Metric Development at NCCoE’s Securing AI Testbed

  NIST

  利用NCCoE的安全AI测试平台Dioptra评估人工智能防御模型脆弱性

  Adversarial Machine Learning - Learn Why and How to Break AI!

  IBM

  对抗机器学习,通过IBM ART工具,以欺骗或破坏基于AI的应用程序

  Red Teaming AI Systems: The Path, the Prospect and the Perils

  Google、Microsoft和MITRE

  主打各厂商AI对抗工具Counterfit、Augly、ART以及Mitre的ATLAS

  Generative Email Attacks and How to Defend Against Them (Session Viewing Point)

  Armorblox

  文本生成技术如何用于钓鱼攻击、生成虚假角色和博客文章,安全防御如何应对

  隐私合规

  Privacy and Compliance for AI – Open Source Tools and Industry Perspective

  IBM

  通过IBM APT开源工具实现AI模型的隐私和合规性

  Can Innovation and Regulation Coexist?

  Microsoft

  在保护创新的同时,如何构建合规和隐私保护的AI系统

  It's Not Fair! Detecting Algorithmic Bias with Open Source Tools

  SailPoint

  AI道德问题,讨论通过一些开源工具来如aequitas检测AI算法偏见

  AI: Legal and Policy Considerations and Landmines to Avoid

  Paul Hastings LLP

  探讨欧盟和美国的法律和政策应对人工智能合规问题

  What Matters Most

  Harvard Kennedy School

  探讨涉及云计算、地缘政治、供应链、隐私、国家安全、物联网、人工智能和最新网络安全问题

  Better Bug Bounties? Lessons on Disclosure of Security Vulns v. AI Harms

  PayPal

  分享算法正义联盟(Algorithmic Justice League)最近进行的研究结果

  xGitGuard: ML-Based Secret Scanner for GitHub

  Comcast

  通过xGitGuard帮助开发人员检查发布到GitHub的代码中是否存在敏感信息

  零信任

  Why Zero Trust Network Access is Broken, and How to Fix It

  Jefferies

  随时随地的远程办公对传统安全体系结构带来的挑战

  PKI, Crypto, and Machine Identities: Keys to IAM Strategy

  Keyfactor

  PKI、加密、机器身份在IAM中的使中快速增长

  Can You Hear Me Now? Security Implications of Voice as the New Keyboard

  Venable LLP

  依赖语音的生物识别存在的风险和挑战

  Zero Trust's New Frontier: Application Workloads

  TRUEFORT

  如何通过workload segmentation降低攻击风险

  API安全

  BoF: IOCs in your APIs - How to Find the Attacks

  Cequence Security

  通过共享IOC查找API账户接管等自动化攻击行为

  威胁分析&狩猎

  CHRYSALIS: Age of the AI-Enhanced Threat Hunters & Forensicators

  One eSecurity

  通过DS4N6工具集增强威胁狩猎

  Conti Playbook: Infiltrate the Most Profitable Ransomware Gang

  Vectra AI

  通过Conti勒索团伙攻击案例演示如何防御APT

  The Challenges of Building Safe End-to-End Encrypted Services for Business

  Google

  使用端到端加密服务在E2EE中提供的价值和工作方式,利弊权衡

  Machine Learning to Ultimately Defeat Advanced Ransomware Threats

  Acronis

  通过机器学习和堆栈分析应对高级勒索软件威胁

  响应处置

  Don't Let Nostalgia Slow You Down. Investigate & Respond at Cloud Speed

  Cado Security

  如何使安全团队能够自动化调查和响应违规行为

  AI加速

  Adaptively Fingerprinting Users/Applications at Scale with GPU Acceleration

  Nvidia

  使用Morpheus开源框架实现自适应恶意行为检测

  AI评估

  Assessing Vendor AI Claims like a Data Scientist, Even if You Aren't One

  Sophos

  非AI的专家如何评估供应商的AI系统规格声明