0:02
hello everyone welcome to yet another
0:04
hello everyone welcome to yet another
0:04
hello everyone welcome to yet another episode of the cloud show coming to you
0:07
episode of the cloud show coming to you
0:07
episode of the cloud show coming to you from the espc conference in Stockholm
0:09
from the espc conference in Stockholm
0:09
from the espc conference in Stockholm this is a huge conference and I really
0:12
this is a huge conference and I really
0:12
this is a huge conference and I really love being here because you get to meet
0:13
love being here because you get to meet
0:13
love being here because you get to meet up with all kinds of experts from around
0:16
up with all kinds of experts from around
0:16
up with all kinds of experts from around the world and we are going to talk about
0:18
the world and we are going to talk about
0:18
the world and we are going to talk about security and AI in combination with the
0:22
security and AI in combination with the
0:22
security and AI in combination with the guest star of the cloud show Paula
0:33
hi Paula hi how's it going oh it's going
0:36
hi Paula hi how's it going oh it's going
0:36
hi Paula hi how's it going oh it's going very well I'm so glad that I had the
0:37
very well I'm so glad that I had the
0:37
very well I'm so glad that I had the opportunity to catch up with you you
0:39
opportunity to catch up with you you
0:39
opportunity to catch up with you you seem like you're always on the move a
0:41
seem like you're always on the move a
0:41
seem like you're always on the move a little bit especially especially in Q4
0:43
little bit especially especially in Q4
0:43
little bit especially especially in Q4 when you know things are a little crazy
0:45
when you know things are a little crazy
0:45
when you know things are a little crazy I guess I guess I would name a Q4 as a
0:48
I guess I guess I would name a Q4 as a
0:48
I guess I guess I would name a Q4 as a new definition of hell oh true well at
0:51
new definition of hell oh true well at
0:51
new definition of hell oh true well at least now we get to sit down for a
0:53
least now we get to sit down for a
0:53
least now we get to sit down for a little while and chill out so I I guess
0:56
little while and chill out so I I guess
0:56
little while and chill out so I I guess a lot of people know who Paula is but
0:58
a lot of people know who Paula is but
0:58
a lot of people know who Paula is but you maybe can give give a little you
1:00
you maybe can give give a little you
1:00
you maybe can give give a little you know who are you oh definitely you give
1:02
know who are you oh definitely you give
1:02
know who are you oh definitely you give a little so so basically I'm paulich I'm
1:04
a little so so basically I'm paulich I'm
1:04
a little so so basically I'm paulich I'm the C of secure and secure Academy this
1:07
the C of secure and secure Academy this
1:07
the C of secure and secure Academy this is also the company that I have
1:08
is also the company that I have
1:08
is also the company that I have established 16 years ago so quite a long
1:10
established 16 years ago so quite a long
1:10
established 16 years ago so quite a long time it I mean time runs time totally
1:13
time it I mean time runs time totally
1:13
time it I mean time runs time totally runs and I've been in the cyber security
1:15
runs and I've been in the cyber security
1:15
runs and I've been in the cyber security industry for the past 20 years and also
1:18
industry for the past 20 years and also
1:18
industry for the past 20 years and also an MVP and RD that's right right and all
1:20
an MVP and RD that's right right and all
1:20
an MVP and RD that's right right and all these things so being engaged in cyber
1:22
these things so being engaged in cyber
1:22
these things so being engaged in cyber simply saying cyber and all that stuff
1:24
simply saying cyber and all that stuff
1:24
simply saying cyber and all that stuff right exactly perfect and so whom better
1:27
right exactly perfect and so whom better
1:27
right exactly perfect and so whom better to catch up with and talk because
1:29
to catch up with and talk because
1:29
to catch up with and talk because everybody has to talk about AI any St
1:31
everybody has to talk about AI any St
1:31
everybody has to talk about AI any St like it's mandatory there's there's no
1:34
like it's mandatory there's there's no
1:34
like it's mandatory there's there's no other conversation has to be AI so I
1:37
other conversation has to be AI so I
1:37
other conversation has to be AI so I mean question begs right how does AI
1:40
mean question begs right how does AI
1:40
mean question begs right how does AI make me a better cyber villain um and
1:43
make me a better cyber villain um and
1:44
make me a better cyber villain um and it's always honestly a good question
1:45
it's always honestly a good question
1:45
it's always honestly a good question because there's so many angles where we
1:48
because there's so many angles where we
1:48
because there's so many angles where we think about cyber and use cyber in the
1:50
think about cyber and use cyber in the
1:50
think about cyber and use cyber in the infrastructure that we should definitely
1:52
infrastructure that we should definitely
1:52
infrastructure that we should definitely look at and I think the major one is
1:55
look at and I think the major one is
1:55
look at and I think the major one is actually the threat hunting so the way
1:57
actually the threat hunting so the way
1:57
actually the threat hunting so the way how we look for the threat um and how we
2:00
how we look for the threat um and how we
2:00
how we look for the threat um and how we when there is an incident do the whole
2:02
when there is an incident do the whole
2:02
when there is an incident do the whole research about what happened so
2:04
research about what happened so
2:04
research about what happened so including forensic activities and so on
2:06
including forensic activities and so on
2:06
including forensic activities and so on so like as long as of course we capture
2:10
so like as long as of course we capture
2:10
so like as long as of course we capture and maintain a certain level of data
2:12
and maintain a certain level of data
2:12
and maintain a certain level of data then we are able to uh use it and
2:14
then we are able to uh use it and
2:14
then we are able to uh use it and connect adults correlate and then come
2:17
connect adults correlate and then come
2:17
connect adults correlate and then come with like some conclusions that this
2:19
with like some conclusions that this
2:19
with like some conclusions that this user around that these processes
2:21
user around that these processes
2:21
user around that these processes connected through the network within
2:22
connected through the network within
2:22
connected through the network within this process there were some injections
2:24
this process there were some injections
2:24
this process there were some injections different uh different loads and so on
2:27
different uh different loads and so on
2:27
different uh different loads and so on like these files were used this is how
2:28
like these files were used this is how
2:28
like these files were used this is how it started so that is basically
2:30
it started so that is basically
2:30
it started so that is basically something that we are able with AI to do
2:33
something that we are able with AI to do
2:33
something that we are able with AI to do faster and time in incidents it's so
2:36
faster and time in incidents it's so
2:36
faster and time in incidents it's so important and the way is very important
2:38
important and the way is very important
2:38
important and the way is very important that's the criticality yeah absolutely
2:40
that's the criticality yeah absolutely
2:40
that's the criticality yeah absolutely yes and when there's something going on
2:41
yes and when there's something going on
2:41
yes and when there's something going on especially like right now in the
2:43
especially like right now in the
2:43
especially like right now in the infrastructure then this is where it
2:44
infrastructure then this is where it
2:45
infrastructure then this is where it becomes important yeah like you want to
2:46
becomes important yeah like you want to
2:46
becomes important yeah like you want to find things faster so I've been to many
2:48
find things faster so I've been to many
2:48
find things faster so I've been to many incidents when things were happening and
2:50
incidents when things were happening and
2:50
incidents when things were happening and you couldn't really find things faster
2:53
you couldn't really find things faster
2:53
you couldn't really find things faster and that brought a bit of a trouble
2:55
and that brought a bit of a trouble
2:55
and that brought a bit of a trouble especially from the business side
2:57
especially from the business side
2:57
especially from the business side because yet again if there's an incident
2:59
because yet again if there's an incident
2:59
because yet again if there's an incident which I'm thinking about across like our
3:02
which I'm thinking about across like our
3:02
which I'm thinking about across like our big retail customer then basically they
3:05
big retail customer then basically they
3:05
big retail customer then basically they couldn't open the stores well they
3:07
couldn't open the stores well they
3:07
couldn't open the stores well they eventually they opened but that was a
3:09
eventually they opened but that was a
3:09
eventually they opened but that was a big question like do we open the source
3:11
big question like do we open the source
3:11
big question like do we open the source and they couldn't open them with the
3:12
and they couldn't open them with the
3:12
and they couldn't open them with the full it support because there was an
3:15
full it support because there was an
3:15
full it support because there was an ongoing incident for them and then uh it
3:19
ongoing incident for them and then uh it
3:19
ongoing incident for them and then uh it was very difficult to connect the do
3:20
was very difficult to connect the do
3:20
was very difficult to connect the do because they did not have a central
3:22
because they did not have a central
3:22
because they did not have a central monitoring so I was there directly on
3:24
monitoring so I was there directly on
3:24
monitoring so I was there directly on the other side uh working with a team to
3:27
the other side uh working with a team to
3:27
the other side uh working with a team to pretty much like set up all the
3:28
pretty much like set up all the
3:28
pretty much like set up all the indicators of the com
3:30
indicators of the com
3:30
indicators of the com then write a script on the top of that
3:33
then write a script on the top of that
3:33
then write a script on the top of that spread it clean the infrastructure out
3:35
spread it clean the infrastructure out
3:35
spread it clean the infrastructure out and then say like okay check we are good
3:37
and then say like okay check we are good
3:37
and then say like okay check we are good to go so that took some time I can only
3:40
to go so that took some time I can only
3:40
to go so that took some time I can only imagine
3:41
imagine so in terms of use cases there are some
3:44
so in terms of use cases there are some
3:44
so in terms of use cases there are some good and some bad you know use cases for
3:47
good and some bad you know use cases for
3:47
good and some bad you know use cases for AI where I go like eh you know what but
3:50
AI where I go like eh you know what but
3:50
AI where I go like eh you know what but with having a lot a lot of data to um to
3:54
with having a lot a lot of data to um to
3:54
with having a lot a lot of data to um to dig through and to find the correlation
3:57
dig through and to find the correlation
3:57
dig through and to find the correlation side inside and that sort of stuff I
3:59
side inside and that sort of stuff I
3:59
side inside and that sort of stuff I would say that AI is a strong use case
4:02
would say that AI is a strong use case
4:02
would say that AI is a strong use case in security uh specifically right
4:05
in security uh specifically right
4:05
in security uh specifically right definitely definitely yes and it's all
4:07
definitely definitely yes and it's all
4:07
definitely definitely yes and it's all about information gathering it's all
4:09
about information gathering it's all
4:09
about information gathering it's all about reacting fast cyber security it's
4:12
about reacting fast cyber security it's
4:12
about reacting fast cyber security it's one of these things that when it goes
4:14
one of these things that when it goes
4:14
one of these things that when it goes wrong it directly and immediately
4:17
wrong it directly and immediately
4:17
wrong it directly and immediately impacts the business that's right so
4:19
impacts the business that's right so
4:19
impacts the business that's right so that's why as well in terms of like
4:21
that's why as well in terms of like
4:21
that's why as well in terms of like investment into new technologies
4:22
investment into new technologies
4:22
investment into new technologies management needs to realize that that's
4:24
management needs to realize that that's
4:24
management needs to realize that that's part of their business continuity and
4:26
part of their business continuity and
4:26
part of their business continuity and and some some of them obviously did but
4:29
and some some of them obviously did but
4:29
and some some of them obviously did but that's the only ongoing process yeah and
4:31
that's the only ongoing process yeah and
4:31
that's the only ongoing process yeah and uh that is so important to to be able to
4:34
uh that is so important to to be able to
4:34
uh that is so important to to be able to correlate the data react fast save the
4:37
correlate the data react fast save the
4:37
correlate the data react fast save the business it's a direct conversion over
4:39
business it's a direct conversion over
4:39
business it's a direct conversion over here because you you get a lot of data
4:42
here because you you get a lot of data
4:42
here because you you get a lot of data um at any moment right and so you need
4:45
um at any moment right and so you need
4:45
um at any moment right and so you need you need something powerful to work that
4:48
you need something powerful to work that
4:48
you need something powerful to work that data as it comes in right as it comes in
4:51
data as it comes in right as it comes in
4:51
data as it comes in right as it comes in it's a very like good thing that you
4:52
it's a very like good thing that you
4:52
it's a very like good thing that you said because usually in the past we were
4:54
said because usually in the past we were
4:54
said because usually in the past we were dealing with incidents and we named them
4:56
dealing with incidents and we named them
4:56
dealing with incidents and we named them incidents because they happened yeah so
4:59
incidents because they happened yeah so
4:59
incidents because they happened yeah so then Happ exactly so they happen now
5:02
then Happ exactly so they happen now
5:02
then Happ exactly so they happen now it's your job to correlate it and then
5:04
it's your job to correlate it and then
5:04
it's your job to correlate it and then of course you can sit down and then have
5:05
of course you can sit down and then have
5:05
of course you can sit down and then have some time to to connect all the dos and
5:08
some time to to connect all the dos and
5:08
some time to to connect all the dos and see that's reactive that's after the
5:10
see that's reactive that's after the
5:10
see that's reactive that's after the fact right exactly but but like what
5:12
fact right exactly but but like what
5:12
fact right exactly but but like what about their reaction over there like and
5:14
about their reaction over there like and
5:14
about their reaction over there like and to stop it by correlating before it
5:17
to stop it by correlating before it
5:17
to stop it by correlating before it happens so that's what we are talking
5:18
happens so that's what we are talking
5:18
happens so that's what we are talking about and that's a huge difference yes
5:21
about and that's a huge difference yes
5:21
about and that's a huge difference yes it is in in terms of a business
5:23
it is in in terms of a business
5:23
it is in in terms of a business continuity it is and and with that I'm
5:26
continuity it is and and with that I'm
5:26
continuity it is and and with that I'm assuming that bad guys are used AI to
5:30
assuming that bad guys are used AI to
5:30
assuming that bad guys are used AI to attack and so we better we we better
5:33
attack and so we better we we better
5:34
attack and so we better we we better learn how to use AI to defend right
5:37
learn how to use AI to defend right
5:37
learn how to use AI to defend right mandatory things the only the only thing
5:38
mandatory things the only the only thing
5:38
mandatory things the only the only thing that's going to fight AI is is a is bad
5:41
that's going to fight AI is is a is bad
5:41
that's going to fight AI is is a is bad guys with AI is good guys with AI
5:44
guys with AI is good guys with AI
5:44
guys with AI is good guys with AI definitely definitely yes and also from
5:45
definitely definitely yes and also from
5:45
definitely definitely yes and also from the threat perspective you have so many
5:47
the threat perspective you have so many
5:47
the threat perspective you have so many ways how you can work on a threat Factor
5:50
ways how you can work on a threat Factor
5:50
ways how you can work on a threat Factor like starting with the easiest fishing
5:52
like starting with the easiest fishing
5:52
like starting with the easiest fishing Emos perfectly written by using CH GPT
5:56
Emos perfectly written by using CH GPT
5:56
Emos perfectly written by using CH GPT check yeah writing malware even though
5:58
check yeah writing malware even though
5:58
check yeah writing malware even though you are not a developer but you can do
6:00
you are not a developer but you can do
6:01
you are not a developer but you can do some coding through the CH GPT and it's
6:03
some coding through the CH GPT and it's
6:03
some coding through the CH GPT and it's very easy actually to generate the code
6:06
very easy actually to generate the code
6:06
very easy actually to generate the code that is going to be working yeah because
6:07
that is going to be working yeah because
6:07
that is going to be working yeah because we also do it within the projects yeah
6:09
we also do it within the projects yeah
6:10
we also do it within the projects yeah we use Char GPT if you want to have like
6:11
we use Char GPT if you want to have like
6:11
we use Char GPT if you want to have like a quick something then like why would
6:14
a quick something then like why would
6:14
a quick something then like why would you sit down and code it if like for
6:17
you sit down and code it if like for
6:17
you sit down and code it if like for especially from the infrastructure
6:18
especially from the infrastructure
6:18
especially from the infrastructure perspective if not just like going to
6:20
perspective if not just like going to
6:20
perspective if not just like going to Jud GPT and then and then you got it and
6:22
Jud GPT and then and then you got it and
6:22
Jud GPT and then and then you got it and then it's a functioning piece of
6:24
then it's a functioning piece of
6:24
then it's a functioning piece of software that you might want to use
6:25
software that you might want to use
6:25
software that you might want to use later yeah so that's kind of the thing
6:27
later yeah so that's kind of the thing
6:27
later yeah so that's kind of the thing that um I'm talking about and and at the
6:30
that um I'm talking about and and at the
6:30
that um I'm talking about and and at the end uh you you've got a guys that are
6:32
end uh you you've got a guys that are
6:32
end uh you you've got a guys that are using different platform to find
6:34
using different platform to find
6:34
using different platform to find vulnerabilities yeah and earn money on
6:36
vulnerabilities yeah and earn money on
6:36
vulnerabilities yeah and earn money on it and and it's a fair point I mean
6:38
it and and it's a fair point I mean
6:38
it and and it's a fair point I mean that's how they work yeah and it doesn't
6:39
that's how they work yeah and it doesn't
6:39
that's how they work yeah and it doesn't have to be for the bad reason it might
6:41
have to be for the bad reason it might
6:41
have to be for the bad reason it might be also for different companies doing
6:43
be also for different companies doing
6:43
be also for different companies doing the bug bounties yeah so yeah yeah yeah
6:45
the bug bounties yeah so yeah yeah yeah
6:45
the bug bounties yeah so yeah yeah yeah I can see that and so is there is there
6:47
I can see that and so is there is there
6:47
I can see that and so is there is there like a a you always say that that you
6:50
like a a you always say that that you
6:50
like a a you always say that that you know you're always showing this like
6:52
know you're always showing this like
6:52
know you're always showing this like simple tools like okay this this tool is
6:54
simple tools like okay this this tool is
6:54
simple tools like okay this this tool is so easy everybody has this tool and it
6:55
so easy everybody has this tool and it
6:55
so easy everybody has this tool and it works like this and you can just break
6:57
works like this and you can just break
6:57
works like this and you can just break in and it's not hard even does does it
7:00
in and it's not hard even does does it
7:00
in and it's not hard even does does it make it even easier now that you can
7:02
make it even easier now that you can
7:02
make it even easier now that you can just ask chat GTP to like okay get me my
7:05
just ask chat GTP to like okay get me my
7:05
just ask chat GTP to like okay get me my script for log hacking into this thing
7:07
script for log hacking into this thing
7:07
script for log hacking into this thing and I don't even know how to do it but
7:08
and I don't even know how to do it but
7:08
and I don't even know how to do it but I'm just I'm just going to copy paste
7:10
I'm just I'm just going to copy paste
7:10
I'm just I'm just going to copy paste this thing that is exactly the point so
7:12
this thing that is exactly the point so
7:12
this thing that is exactly the point so for example in the past where CH GPT was
7:15
for example in the past where CH GPT was
7:15
for example in the past where CH GPT was like starting yeah you could already for
7:18
like starting yeah you could already for
7:18
like starting yeah you could already for example generate queries to to put in
7:21
example generate queries to to put in
7:21
example generate queries to to put in Sentinel to put in Defender for within
7:24
Sentinel to put in Defender for within
7:24
Sentinel to put in Defender for within the advanced hunting so that you know
7:26
the advanced hunting so that you know
7:26
the advanced hunting so that you know what you want to do you ask the query
7:28
what you want to do you ask the query
7:28
what you want to do you ask the query you ask the jpd and then you get query
7:30
you ask the jpd and then you get query
7:30
you ask the jpd and then you get query and then but when you were pting it when
7:31
and then but when you were pting it when
7:32
and then but when you were pting it when you were analyzing it it wasn't perfect
7:34
you were analyzing it it wasn't perfect
7:34
you were analyzing it it wasn't perfect so you as a human you had to adjust it
7:36
so you as a human you had to adjust it
7:36
so you as a human you had to adjust it but right now yeah when within the
7:38
but right now yeah when within the
7:38
but right now yeah when within the current version of the CH GPT you can
7:40
current version of the CH GPT you can
7:40
current version of the CH GPT you can basically uh type like uh show me all
7:42
basically uh type like uh show me all
7:42
basically uh type like uh show me all the processes that like that that put it
7:44
the processes that like that that put it
7:44
the processes that like that that put it on a timeline and I wanted that angle I
7:46
on a timeline and I wanted that angle I
7:46
on a timeline and I wanted that angle I wanted this angle okay and then
7:48
wanted this angle okay and then
7:48
wanted this angle okay and then generates your immediately and you
7:50
generates your immediately and you
7:50
generates your immediately and you literally contrl c contrl v to Sentinel
7:54
literally contrl c contrl v to Sentinel
7:54
literally contrl c contrl v to Sentinel of course first you need to read and
7:56
of course first you need to read and
7:56
of course first you need to read and understand it that's clear but still
7:57
understand it that's clear but still
7:57
understand it that's clear but still like you don't have to make an effort
7:59
like you don't have to make an effort
7:59
like you don't have to make an effort you don't have to know you don't have to
8:01
you don't have to know you don't have to
8:01
you don't have to know you don't have to know how to do it it's all out there as
8:03
know how to do it it's all out there as
8:03
know how to do it it's all out there as long as you know what you want yeah as
8:05
long as you know what you want yeah as
8:05
long as you know what you want yeah as long as you can ask for it if you you
8:07
long as you can ask for it if you you
8:07
long as you can ask for it if you you can get the exact answer without having
8:09
can get the exact answer without having
8:09
can get the exact answer without having to understand how I love this part
8:11
to understand how I love this part
8:11
to understand how I love this part because it makes me so much faster and
8:13
because it makes me so much faster and
8:13
because it makes me so much faster and you know I'm sure you had this feeling
8:15
you know I'm sure you had this feeling
8:15
you know I'm sure you had this feeling that when you when you like work and you
8:18
that when you when you like work and you
8:18
that when you when you like work and you have such a great idea or there's so
8:19
have such a great idea or there's so
8:19
have such a great idea or there's so much going on that's another part like
8:21
much going on that's another part like
8:21
much going on that's another part like your thoughts are totally okay but your
8:24
your thoughts are totally okay but your
8:24
your thoughts are totally okay but your hands like for the keyboard they're not
8:27
hands like for the keyboard they're not
8:27
hands like for the keyboard they're not they're too slow this tool is too slow
8:29
they're too slow this tool is too slow
8:29
they're too slow this tool is too slow yeah exactly it is so why don't we uh
8:33
yeah exactly it is so why don't we uh
8:33
yeah exactly it is so why don't we uh use like our brains and then use still
8:35
use like our brains and then use still
8:35
use like our brains and then use still this tool to ask the question that's
8:37
this tool to ask the question that's
8:37
this tool to ask the question that's going to be generating us an answer that
8:39
going to be generating us an answer that
8:39
going to be generating us an answer that is going to take us some time and then
8:41
is going to take us some time and then
8:41
is going to take us some time and then you just like work with that abely right
8:43
you just like work with that abely right
8:43
you just like work with that abely right I love it too because like you said I I
8:46
I love it too because like you said I I
8:46
I love it too because like you said I I can probably figure it out but I I me I
8:48
can probably figure it out but I I me I
8:48
can probably figure it out but I I me I might need to go like with the tool like
8:50
might need to go like with the tool like
8:50
might need to go like with the tool like slh and try to ask like oh which
8:52
slh and try to ask like oh which
8:52
slh and try to ask like oh which parameters can I use it and think about
8:55
parameters can I use it and think about
8:55
parameters can I use it and think about it and figure it out and oh right if I
8:57
it and figure it out and oh right if I
8:57
it and figure it out and oh right if I build it and basically build the thing
8:59
build it and basically build the thing
8:59
build it and basically build the thing in not pad and then I think I'm done now
9:02
in not pad and then I think I'm done now
9:02
in not pad and then I think I'm done now and then paste it in N just ask chat
9:05
and then paste it in N just ask chat
9:05
and then paste it in N just ask chat it'll give you the answer that's that's
9:07
it'll give you the answer that's that's
9:07
it'll give you the answer that's that's the point and especially a good thing
9:08
the point and especially a good thing
9:08
the point and especially a good thing that you mentioned especially in
9:10
that you mentioned especially in
9:10
that you mentioned especially in security there's so many tools that are
9:12
security there's so many tools that are
9:12
security there's so many tools that are as well on the GitHub and so on and they
9:15
as well on the GitHub and so on and they
9:15
as well on the GitHub and so on and they use their own paramet parameters like
9:18
use their own paramet parameters like
9:18
use their own paramet parameters like sorry I mean who's going to remember
9:20
sorry I mean who's going to remember
9:20
sorry I mean who's going to remember that eventually of course you end up
9:22
that eventually of course you end up
9:22
that eventually of course you end up remembering that in a kind of a way but
9:25
remembering that in a kind of a way but
9:25
remembering that in a kind of a way but it wouldn't be that easier you'd have to
9:27
it wouldn't be that easier you'd have to
9:27
it wouldn't be that easier you'd have to be an expert like you to remember these
9:29
be an expert like you to remember these
9:29
be an expert like you to remember these I don't remember these things yeah
9:31
I don't remember these things yeah
9:31
I don't remember these things yeah that's the point Thank you thank you but
9:32
that's the point Thank you thank you but
9:32
that's the point Thank you thank you but there are so many tools that you could
9:34
there are so many tools that you could
9:34
there are so many tools that you could use uh so then you need to remember the
9:36
use uh so then you need to remember the
9:36
use uh so then you need to remember the tool okay and then the name all right
9:39
tool okay and then the name all right
9:39
tool okay and then the name all right the parameter okay like the way how you
9:41
the parameter okay like the way how you
9:41
the parameter okay like the way how you use it all of the steps and so on I
9:44
use it all of the steps and so on I
9:44
use it all of the steps and so on I really want to live in time where we're
9:47
really want to live in time where we're
9:47
really want to live in time where we're going to be able to say like okay use
9:49
going to be able to say like okay use
9:49
going to be able to say like okay use use uh not even the tool but do me this
9:52
use uh not even the tool but do me this
9:52
use uh not even the tool but do me this this and that right and I know what I
9:54
this and that right and I know what I
9:54
this and that right and I know what I want but I forgotten the way so bring
9:56
want but I forgotten the way so bring
9:56
want but I forgotten the way so bring the way in by Automation in I yeah just
9:59
the way in by Automation in I yeah just
9:59
the way in by Automation in I yeah just do it for me so that's like it's like a
10:01
do it for me so that's like it's like a
10:02
do it for me so that's like it's like a little like a little hacking agent
10:03
little like a little hacking agent
10:03
little like a little hacking agent that's just going to do it for you think
10:05
that's just going to do it for you think
10:05
that's just going to do it for you think think how spoiling that is that it
10:07
think how spoiling that is that it
10:07
think how spoiling that is that it really is it really is so what have you
10:08
really is it really is so what have you
10:09
really is it really is so what have you seen out there just to um clarify with
10:12
seen out there just to um clarify with
10:12
seen out there just to um clarify with within the this like new the the
10:14
within the this like new the the
10:15
within the this like new the the Microsoft for example are talking about
10:16
Microsoft for example are talking about
10:16
Microsoft for example are talking about the era of AI in the era of AI what have
10:20
the era of AI in the era of AI what have
10:20
the era of AI in the era of AI what have you seen out there where uh people are
10:22
you seen out there where uh people are
10:22
you seen out there where uh people are using AI in in an attack fashion what
10:25
using AI in in an attack fashion what
10:25
using AI in in an attack fashion what are they doing with it to attack us oh
10:28
are they doing with it to attack us oh
10:28
are they doing with it to attack us oh Oh you mean from that unle well there
10:30
Oh you mean from that unle well there
10:30
Oh you mean from that unle well there are many many things really but like
10:32
are many many things really but like
10:32
are many many things really but like starting with maybe something that
10:34
starting with maybe something that
10:34
starting with maybe something that everybody is dealing with which is the
10:35
everybody is dealing with which is the
10:35
everybody is dealing with which is the Deep fake yeah so then um not only not
10:39
Deep fake yeah so then um not only not
10:39
Deep fake yeah so then um not only not only of course from the like a social
10:41
only of course from the like a social
10:41
only of course from the like a social influence perspective but to get access
10:43
influence perspective but to get access
10:43
influence perspective but to get access to the infrastructure perspective so if
10:46
to the infrastructure perspective so if
10:46
to the infrastructure perspective so if someone wants to get access to the
10:47
someone wants to get access to the
10:48
someone wants to get access to the infrastructure maybe through like
10:49
infrastructure maybe through like
10:49
infrastructure maybe through like someone's family member even then they
10:52
someone's family member even then they
10:52
someone's family member even then they could attack them so that they will do
10:54
could attack them so that they will do
10:54
could attack them so that they will do something to you and then you under
10:57
something to you and then you under
10:57
something to you and then you under their influence which was influenced by
11:00
their influence which was influenced by
11:00
their influence which was influenced by whatever then you will be able to do
11:02
whatever then you will be able to do
11:02
whatever then you will be able to do something Inu so this kind of like are
11:04
something Inu so this kind of like are
11:04
something Inu so this kind of like are not direct today they can but they not
11:07
not direct today they can but they not
11:07
not direct today they can but they not yeah so they are like well planed
11:09
yeah so they are like well planed
11:09
yeah so they are like well planed circumvent yeah so you often use this
11:12
circumvent yeah so you often use this
11:12
circumvent yeah so you often use this example silly example but it but that
11:15
example silly example but it but that
11:15
example silly example but it but that really just explains how silly this is
11:17
really just explains how silly this is
11:17
really just explains how silly this is uh the the um deep fake uh manager
11:21
uh the the um deep fake uh manager
11:21
uh the the um deep fake uh manager calling the uh you know the employee in
11:23
calling the uh you know the employee in
11:23
calling the uh you know the employee in the office saying oh it's your manager
11:26
the office saying oh it's your manager
11:26
the office saying oh it's your manager uh open the vault and take out all the
11:28
uh open the vault and take out all the
11:28
uh open the vault and take out all the money basically right
11:30
money basically right
11:30
money basically right it's of course Very contrived and silly
11:32
it's of course Very contrived and silly
11:32
it's of course Very contrived and silly when I say it that way but essentially
11:34
when I say it that way but essentially
11:34
when I say it that way but essentially this it's simple that's that is what
11:35
this it's simple that's that is what
11:35
this it's simple that's that is what happening right it's it's like okay you
11:37
happening right it's it's like okay you
11:37
happening right it's it's like okay you need to uh do whatever and and you're
11:40
need to uh do whatever and and you're
11:40
need to uh do whatever and and you're you think you're interacting with
11:43
you think you're interacting with
11:43
you think you're interacting with somebody with the right person but it is
11:45
somebody with the right person but it is
11:45
somebody with the right person but it is in fact the fake connecting to you and
11:48
in fact the fake connecting to you and
11:48
in fact the fake connecting to you and making you do stupid things and you're
11:50
making you do stupid things and you're
11:50
making you do stupid things and you're like oh shoot right so that's an
11:53
like oh shoot right so that's an
11:53
like oh shoot right so that's an interesting one so that's that's how
11:54
interesting one so that's that's how
11:54
interesting one so that's that's how they're using it to um to fake you out
11:57
they're using it to um to fake you out
11:57
they're using it to um to fake you out and and be be C Convent in the attack
12:00
and and be be C Convent in the attack
12:00
and and be be C Convent in the attack eventually wow wow okay that's really
12:03
eventually wow wow okay that's really
12:03
eventually wow wow okay that's really cool well anyway I think uh it's really
12:06
cool well anyway I think uh it's really
12:06
cool well anyway I think uh it's really nice to catch up with you but I'm going
12:08
nice to catch up with you but I'm going
12:08
nice to catch up with you but I'm going to I'm going to like let you go and I I
12:11
to I'm going to like let you go and I I
12:11
to I'm going to like let you go and I I think this has been a fascinating
12:12
think this has been a fascinating
12:12
think this has been a fascinating conversation on the cloud show so I want
12:14
conversation on the cloud show so I want
12:14
conversation on the cloud show so I want to thank you for being on the show today
12:16
to thank you for being on the show today
12:16
to thank you for being on the show today pleasure and you know let's go back to
12:18
pleasure and you know let's go back to
12:18
pleasure and you know let's go back to the conference and enjoy it let's enjoy
12:20
the conference and enjoy it let's enjoy
12:20
the conference and enjoy it let's enjoy it all right thanks guys see you next
12:21
it all right thanks guys see you next
12:21
it all right thanks guys see you next guys next time on the cloud show