01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Human-in-the-Middle<br />

In creating AI tools to make us more productive and creative, we also opened a Pandora’s Box, as these<br />

same tools can be used to deceive us. I presented a while back at the SANS Data Science Lightning<br />

Summit “Cyborgs vs. Androids” on this topic, where I discussed the successful use of AI technology<br />

should be thought of less as an autonomous entity that will replace the security analyst/engineer and<br />

more like a cyborg, where we leverage these technologies to enhance the security analyst/engineer.<br />

Organizations also need to consider the potential liability of using some of these tools, given the<br />

technology is new, questions about data provenance, and potential legislation regarding their use.<br />

By keeping the human in the center, we are better able to harness the power of AI while at the same time<br />

ensuring it has the proper inputs and monitoring of its outputs. Trained humans are still better than<br />

machines at identifying patterns and detecting human deception; the challenge is that they are<br />

overwhelmed with data, tooling, and threats. <strong>The</strong> more we can leverage AI to enhance the analysts'<br />

capabilities to make their jobs easier, the better we will defend against a whole new generation of threats<br />

— or maybe this post was written by an AI to convince you that’s the case ;-).<br />

About the Author<br />

Ken Westin is Field CISO of Panther Labs. He has been in the<br />

cybersecurity field <strong>for</strong> over 15 years working with companies to improve<br />

their security posture, through detection engineering, threat hunting,<br />

insider threat programs, and vulnerability research. In the past, he has<br />

worked closely with law en<strong>for</strong>cement helping to unveil organized crime<br />

groups. His work has been featured in Wired, Forbes, New York Times,<br />

Good Morning America, and others, and is regularly reached out to as<br />

an expert in cybersecurity, cybercrime, and surveillance.<br />

Ken can be reached online at LinkedIn<br />

(https://www.linkedin.com/in/kwestin/) and at our company website<br />

https://panther.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!