Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

AI and Machine Learning: The Good, Bad and Ugly

Derek Manky of Fortinet on Extreme Shifts in the Landscape
Derek Manky, chief of security insights & global threat alliances, Fortinet

Automation is the first step toward full-blown machine learning and artificial intelligence. But unfortunately, automation already is being weaponized for malicious purposes, says Fortinet's Derek Manky.

See Also: Webinar | Passwords: Here Today, Gone Tomorrow? Be Careful What You Wish For.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Manky discusses:

  • Malicious use of artificial intelligence and machine learning;
  • Poisoning machine learning and "swarm-as-a-service";
  • The impact of these trends on the future of machine learning technology.

Manky is chief of security insights and global threat alliances at Fortinet. He has more than 15 years of experience in cybersecurity, including meeting with political figures and policy stakeholders globally, including law enforcement. He is involved with several global threat intelligence initiatives, including NATO NICP, INTERPOL Expert Working Group, the Cyber Threat Alliance and the Forum for Incident Response and Security Teams. Manky has been with the CTA since it was founded in May 2014 and serves on its steering committee.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.