← All talks

๐—•๐—ฆ๐—ถ๐—ฑ๐—ฒ๐˜€ ๐—•๐—ฎ๐—ป๐—ด๐—ฎ๐—น๐—ผ๐—ฟ๐—ฒ ๐—”๐—ป๐—ป๐˜‚๐—ฎ๐—น ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐Ÿฎ๐Ÿฌ๐Ÿฎ4 - Leader Speak -Series #viralvideo #conference

BSides Bangalore · 20255:527 viewsPublished 2025-05Watch on YouTube ↗
Tags
StyleTalk
About this talk
๐ŸŒ Ready to experience it yourself? ๐ŸŒŸ ๐—•๐—ฆ๐—ถ๐—ฑ๐—ฒ๐˜€ ๐—•๐—ฎ๐—ป๐—ด๐—ฎ๐—น๐—ผ๐—ฟ๐—ฒ ๐—”๐—ป๐—ป๐˜‚๐—ฎ๐—น ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ ๐Ÿ“ ๐—Ÿ๐—ผ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Hotel Sheraton Grand, Whitefield, Bangalore ๐Ÿ—“๏ธ ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ: 11th July 2025, Friday โฐ ๐—ง๐—ถ๐—บ๐—ฒ: 9:00 AM to 6:00 PM ๐Ÿ—“๏ธ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€: 8th, 9th, and 10th July 2025, 9:00 AM to 6:00 PM ๐ŸŽ‰ Registration for BSides Bengaluru 2025 is now OPEN! ๐ŸŽŸ๏ธ Register for 2025: https://events.bsidesbangalore.in/event/atp2025 ๐Ÿ‘‡ Drop a comment if you're registering or want to share your BSides experience! #Shorts #cybersecurity #viralshorts #fyp #ytshorts #CyberConfession #event #ACSC2025 #viralvideo #conference #leadership
Show transcript [en]

Uh Daval how are you doing? I'm doing good. How about you? I'm good. Thanks for uh joining us in uh this event uh besides uh Bangalore conference of 2024 edition. Happy to have you here. Uh let me ask you uh on your thoughts on uh um the the top three risks that you see in today's uh cyber security scenario. Well, that's a pretty pretty tough question. If I can say top three, picking top three is is is kind of you know I would say very subjective but still the top three that would come to my mind is definitely social engineering fishing I think is still one of the major causes of the breaches like the

starting point of the breaches. So yes and the the other evolving threat which is kind of not sparing anyone is the malware one and and I would say third would be malware as a service. So I think it could become a second one but I would like to quote it as third because uh the way we defensive people are you know reacting or adopting security the attackers are doing it in much faster way in a much more efficient way. So it's it's it's always it has always been you know catchup game like Tom and Jerry but we we feel like you know we are kind of going a little slow on catching up. So, so this is where I think speed is

would be the third one if I could categorize you know the threat would be you know not catching up in a timely manner to respond appropriately. Yeah, good. Uh any thoughts on uh ransomware and its evolution in today's uh threadscape? I know a lot of CEOs have nightmares situation on ransomware attacks uh any any thoughts? Yes. Um in my personal capacity I would like to share that uh you know one best way to approach ransomware as a topic is presume it is in your environment and it is just your good luck good days that it's not active. So with that approach I think people need to find ways to you know to build defenses and to build

detection mechanism and while talking about detection I think this is the most toughest part to identify before hacker telling you hey I'm in your system and I have this data or you're getting to know about it from dark web. So I think this this is one place where you know this this buzzing AI could be of great help where you know generative AI could be used to to to you know to speed up your detection to improve the detection capabilities from the threat detection perspective. Okay good. Now that you brought up the topic of genai I want you to a little more talk in elaborate way on the genai use cases how to improve cyber defense. Oh yeah. I think uh in my

little tenure so far, I think uh AI adoption is the craziest adoption that I've seen in the technology space like the the the the pace it got accepted by the users like common people who don't even understand technology. So uh from my understanding I I categorize AI in three typical ways which has been the stages and which we are still using. One is the acquired intelligence. So acquired intelligence is I I say I say any search engine is an acquired intelligence. It's collected collected all the information and then giving you when you need it. Then the third one is the assistance intelligence. So I I term it as your any say voice assistant like Alexa or Siri which is giving you you

know realtime response bases your request which could be any random thing. Right now the third part comes for the real artificial intelligence where gen AI is I think just one of the thing. So like I mentioned threat detection. And I think this is still a nightmare for the people CES like you rightly mentioned like so one one challenge that I see why threat detection has been a challenge is due to the massive logs that they have to parse and the scale that it needs right from the resources and the human perspective. So I think the most useful use case which any organization can do is understanding identifying behaviors which are not normal. So detection detection okay so that could be the one.

Second could be uh you know the way attackers are using AI to say use deep fakes uh videos that CFO CEO frauds are happening or WhatsApp uh you know random voice calls are getting generated. I think this could be used similar in defense way to to you know to analyze if the same emails or calls you're getting are typically uh AI generated or AI could be used okay this is not which is normal. Okay. So that could be the one and third is definitely to enhance defense you everybody can use in the tech space you know the gen AI to to help understand their code for example or optimize their code at least to understand the basic security criterias

of say security by a design principles are being met now those are not pretty much reliant on only having a dedicated security team in the organization people have access to AI nowadays so that could be met awesome it's a very good roundup of gen use cases very informative So um finally before I let you go what are your takeaways from today's uh conference or any learnings? Oh I'm glad you asked that. Uh this is kind of forum I really love. I have always been you know a community person uh right from the early years I've looked up to the people in the community and now when I'm in a stage where I can give back to the

community. So I think the you know forums like B sites provide an opportunity to all sorts of people like from students till senior leaders to have come on the same platform exchange knowledge share thoughts share perspectives at the same time I think I am really glad to see the involvement of women in security this time I think heads off to the bides team for that and the push that we are getting I think we do need more women leaders in our technology space especially cyber security absolutely not just women of course women play a very important Today we want we want put emphasis on diversity uh equality and inclusiveness. We want all the folks the more the

marrier. We want uh uh you know expertise from every one of these uh folks. Right. Absolutely agree. Good. So thanks D for sharing your thoughts and thanks for your time. Happy to host you opportunity. Yeah. My pleasure. Glad to be here. Thank you.