logo
episode-header-image
Jul 2021
49m 58s

Analyzing the Impact of A.I. and Technol...

MISSION
About this episode

Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. 

Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's to figure out simple things such as what clothes best suit consumers or completing everyday work tasks, the endstate for these technologies appear endless... 

But as technology grows more sophisticated, why is the software that operates it not being secured?

“The human without the suit is weak and the suit without the human is dumb. A.I. and machine learning, these different computer learnings we've got to work with now in cybersecurity and across the board, they're levers. They're not a replacement in my mind for human intelligence. When that happens, we're going to be worried about Skynet, not these conversations. And I'm going to be thinking about how to hack that stuff, to make sure that humans stay safe.”

The future of A.I. and machine learning is mostly rooted in Hollywood sci-fi; Tony Stark’s Jarvis, or Skynet represent the full advancement of our imaginations of these technologies so far. But the reality of these tools isn’t there, but the power is. So why are we not protecting ourselves from it? On this roundtable episode of IT Visionaries, we explore the impact A.I. and technology are having on society and cybersecurity with Casey Ellis, the founder and CTO of BugCrowd, andMalcolm Harkins, a cybersecurity advisor, coach and board member. 

The two discuss why you’ll never be able to eliminate risk and why the lack of financial incentives is leaving most companies vulnerable to nefarious attacks. Enjoy this episode!

Main Takeaways

  • Just Throw Money at the Problem: One of the leading issues right now when it comes to cybersecurity is that app developers are not incentivized to protect products during the development lifecycle. When there is no monetary incentive for developers to protect their software, the needed layers of security are not built in. This leads to security teams doing patch work on problems that could have been architected during the development process.  
  • Two Repelling Magnets: Security and privacy are consistently bound together but the reality is that good security can encroach on a user’s privacy. When designing products, developers must be thinking first about the layer of security they are placing within the code, but also how those security measures will infringe on the user’s rights.
  • Working Hand-in-Hand: Your cybersecurity strategy should be a mix of technology and human creativity. While A.I and machine learning algorithms can help detect irregularities within a platform, most of those algorithms are not trained to learn from mistakes, leaving them open to vulnerabilities. Instead of relying just on technology, deploy a hybrid model using crowdsourced protection which allows for highly-trained and skilled hackers to test the vulnerabilities within a system that can then be fixed immediately. 

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

Up next
Jun 26
What IT Leaders Can Learn from How the Government Buys Tech
IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agenci ... Show More
44m 4s
Jun 5
AI in Content Management | Opportunities and Challenges
Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind ... Show More
52m 56s
Jun 4
The Future of IT and IT Visionaries
Meet Chris Brandt, the new host of IT Visionaries.In this special episode, outgoing host Albert Chou passes the mic to Chris—a seasoned Technology Strategist with a passion for connecting bold ideas to real business outcomes.Chris’s career spans startups to global enterprises, fr ... Show More
35m 8s
Recommended Episodes
Aug 2023
2481: Zenoss - From Cloud to AI: The Evolution of IT Infrastructure
In today's episode of Tech Talks Daily, I sit down with Trent Fitz, a seasoned veteran in the tech space with over two decades of leadership experience, especially in cloud computing, AI, and cybersecurity. As Chief Product Officer of Zenoss, Trent has been at the forefront of te ... Show More
27m 4s
May 2024
AI Is a Cybersecurity Tool and Threat
When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the concept and implications of “dark AI.” He also highlights pr ... Show More
26m 19s
Sep 2023
Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.
There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Hel ... Show More
31m 23s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
Aug 2023
Is Generative AI Dangerous?
Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take a look into the future of cybersecurity: at how generative AI like ChatGPT will chang ... Show More
37m 58s
Nov 2023
2581: Bridging the Gap With CompTIA : Cybersecurity Skills and Training
In this compelling episode of Tech Talks Daily, I am thrilled to host James Stanger, Chief Technology Evangelist at CompTIA, the world's leading non-profit provider of vendor-neutral IT certifications. Our conversation offers a panoramic view of the current landscape in cybersecu ... Show More
29m 44s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Oct 2023
AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ... Show More
36m 22s
Sep 2023
Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.
Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thought ... Show More
26m 46s