Knowing Your Enemy: Anticipating Attackers’ Next Moves
Security Unlocked
English - April 28, 2021 07:05 - 40 minutes - ★★★★ - 56 ratingsTechnology security security ai artificial intelligence machine learning microsoft microsoft security microsoft ai microsoft ml microsoft security ai nic fillingham Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Anyone who’s ever watched boxing knows that great reflexes can be the difference between a championship belt and a black eye. The flexing of an opponent’s shoulder, the pivot of their hip - a good boxer will know enough not only to predict and avoid the incoming upper-cut, but will know how to turn the attack back on their opponent. Microsoft’s newest capabilities in Defender puts cyber attackers in the ring and predicts their next attacks as the fight is happening.
On today’s episode, hosts Nic Fillingham and Natalia Godyla speak with Cole Sodja, Melissa Turcotte, and Justin Carroll (and maybe even a secret, fourth guest!) about their blog post on Microsoft’s Security blog about the new capabilities of using an A.I. to see the attacker’s next move.
In This Episode, You Will Learn:
What kind of data is needed for this level of threat detection and prevention?
The crucial nature of probabilistic graphical modeling in this process
The synergistic relationship between the automated capabilities and the human analyst
Some Questions We Ask:
What kind of modeling is used and why?
What does the feedback loop between program and analyst look like?
What are the steps taken to identify these attacks?
Resources:
Justin, Melissa’s, and Cole’s blog post
Justin Carroll’s LinkedIn
Melissa Turcotte’s LinkedIn
Cole Sodja’s LinkedIn
Joshua Neil’s LinkedIn
Microsoft Security Blog
Nic’s LinkedIn
Natalia’s LinkedIn
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
Anyone who’s ever watched boxing knows that great reflexes can be the difference between a championship belt and a black eye. The flexing of an opponent’s shoulder, the pivot of their hip - a good boxer will know enough not only to predict and avoid the incoming upper-cut, but will know how to turn the attack back on their opponent. Microsoft’s newest capabilities in Defender puts cyber attackers in the ring and predicts their next attacks as the fight is happening.
On today’s episode, hosts Nic Fillingham and Natalia Godyla speak with Cole Sodja, Melissa Turcotte, and Justin Carroll (and maybe even a secret, fourth guest!) about their blog post on Microsoft’s Security blog about the new capabilities of using an A.I. to see the attacker’s next move.
In This Episode, You Will Learn:
What kind of data is needed for this level of threat detection and prevention?
The crucial nature of probabilistic graphical modeling in this process
The synergistic relationship between the automated capabilities and the human analyst
Some Questions We Ask:
What kind of modeling is used and why?
What does the feedback loop between program and analyst look like?
What are the steps taken to identify these attacks?
Resources:
Justin, Melissa’s, and Cole’s blog post
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.