Artwork

Innhold levert av David Bisson and Center for Internet Security. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av David Bisson and Center for Internet Security eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

Episode 89: How Threat Actors Are Using GenAI as an Enabler

31:17
 
Del
 

Manage episode 425710962 series 3382533
Innhold levert av David Bisson and Center for Internet Security. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av David Bisson and Center for Internet Security eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests:

  • Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®)
  • Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS

Together, they discuss how cyber threat actors (CTAs) are using generative artificial intelligence (GenAI) as an enabler of their attacks.

Here are some highlights from our episode:

  • 01:04. Why it's important to raise awareness of how CTAs are using GenAI
  • 01:59. How the CIS Cyber Threat Intelligence (CTI) team is seeing generative AI in CTAs' attack methodology
  • 03:50. The types of attacks that are using this technology and how the frequency of those attacks is changing
  • 05:46. Some notable attacks that have used GenAI in their methodology
  • 16:10. The ways in which CTAs are incorporating generative AI into social engineering
  • 24:17. What defenders can do in response to CTAs' use of GenAI

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

  continue reading

101 episoder

Artwork
iconDel
 
Manage episode 425710962 series 3382533
Innhold levert av David Bisson and Center for Internet Security. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av David Bisson and Center for Internet Security eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests:

  • Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®)
  • Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS

Together, they discuss how cyber threat actors (CTAs) are using generative artificial intelligence (GenAI) as an enabler of their attacks.

Here are some highlights from our episode:

  • 01:04. Why it's important to raise awareness of how CTAs are using GenAI
  • 01:59. How the CIS Cyber Threat Intelligence (CTI) team is seeing generative AI in CTAs' attack methodology
  • 03:50. The types of attacks that are using this technology and how the frequency of those attacks is changing
  • 05:46. Some notable attacks that have used GenAI in their methodology
  • 16:10. The ways in which CTAs are incorporating generative AI into social engineering
  • 24:17. What defenders can do in response to CTAs' use of GenAI

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

  continue reading

101 episoder

Tous les épisodes

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett