RSA 2022人工智能安全洞察——在对抗中前进
类别
话题
演讲者来源
一句话总结
AI对抗
Fake or Real, Catch Me if You Can. A Real Life Event Using Deepfake Tech
SAP
利用收集的语音和图像样本,构建深度虚假社会形象
Measuring the Difference: Metric Development at NCCoE’s Securing AI Testbed
NIST
利用NCCoE的安全AI测试平台Dioptra评估人工智能防御模型脆弱性
Adversarial Machine Learning - Learn Why and How to Break AI!
IBM
对抗机器学习,通过IBM ART工具,以欺骗或破坏基于AI的应用程序
Red Teaming AI Systems: The Path, the Prospect and the Perils
Google、Microsoft和MITRE
主打各厂商AI对抗工具Counterfit、Augly、ART以及Mitre的ATLAS
Generative Email Attacks and How to Defend Against Them (Session Viewing Point)
Armorblox
文本生成技术如何用于钓鱼攻击、生成虚假角色和博客文章,安全防御如何应对
隐私合规
Privacy and Compliance for AI – Open Source Tools and Industry Perspective
IBM
通过IBM APT开源工具实现AI模型的隐私和合规性
Can Innovation and Regulation Coexist?
Microsoft
在保护创新的同时,如何构建合规和隐私保护的AI系统
It's Not Fair! Detecting Algorithmic Bias with Open Source Tools
SailPoint
AI道德问题,讨论通过一些开源工具来如aequitas检测AI算法偏见
AI: Legal and Policy Considerations and Landmines to Avoid
Paul Hastings LLP
探讨欧盟和美国的法律和政策应对人工智能合规问题
What Matters Most
Harvard Kennedy School
探讨涉及云计算、地缘政治、供应链、隐私、国家安全、物联网、人工智能和最新网络安全问题
Better Bug Bounties? Lessons on Disclosure of Security Vulns v. AI Harms
PayPal
分享算法正义联盟(Algorithmic Justice League)最近进行的研究结果
xGitGuard: ML-Based Secret Scanner for GitHub
Comcast
通过xGitGuard帮助开发人员检查发布到GitHub的代码中是否存在敏感信息
零信任
Why Zero Trust Network Access is Broken, and How to Fix It
Jefferies
随时随地的远程办公对传统安全体系结构带来的挑战
PKI, Crypto, and Machine Identities: Keys to IAM Strategy
Keyfactor
PKI、加密、机器身份在IAM中的使中快速增长
Can You Hear Me Now? Security Implications of Voice as the New Keyboard
Venable LLP
依赖语音的生物识别存在的风险和挑战
Zero Trust's New Frontier: Application Workloads
TRUEFORT
如何通过workload segmentation降低攻击风险
API安全
BoF: IOCs in your APIs - How to Find the Attacks
Cequence Security
通过共享IOC查找API账户接管等自动化攻击行为
威胁分析&狩猎
CHRYSALIS: Age of the AI-Enhanced Threat Hunters & Forensicators
One eSecurity
通过DS4N6工具集增强威胁狩猎
Conti Playbook: Infiltrate the Most Profitable Ransomware Gang
Vectra AI
通过Conti勒索团伙攻击案例演示如何防御APT
The Challenges of Building Safe End-to-End Encrypted Services for Business
使用端到端加密服务在E2EE中提供的价值和工作方式,利弊权衡
Machine Learning to Ultimately Defeat Advanced Ransomware Threats
Acronis
通过机器学习和堆栈分析应对高级勒索软件威胁
响应处置
Don't Let Nostalgia Slow You Down. Investigate & Respond at Cloud Speed
Cado Security
如何使安全团队能够自动化调查和响应违规行为
AI加速
Adaptively Fingerprinting Users/Applications at Scale with GPU Acceleration
Nvidia
使用Morpheus开源框架实现自适应恶意行为检测
AI评估
Assessing Vendor AI Claims like a Data Scientist, Even if You Aren't One
Sophos
非AI的专家如何评估供应商的AI系统规格声明