“There is no doubt that Cyber Security is one of the greatest man-made challenges of our time. The growing number of threats, the advanced capabilities of the attackers and complexity of the systems we use every day will no doubt make this issue more challenging in the next decade. In this talk I will look at the dynamic future cyber environment and the threats that will be associated with it in the next 10 years, together with a range of potential measures that can be taken to mitigate those threats. There are a lot of misconceptions about AI but there are two key aspects to consider. The threat of AI which can be used as a weapon against us and the positive impact to help develop our defensive capability, so we can detect and respond faster.
Our research is looking at how AI is being weaponised by the bad guys to create false identities, and deep fakes. The opportunity there is, how do you actually help our customers tell the difference between what’s real and what’s fake? AI technologies and machine learning technologies are susceptible to certain types of attacks, adversarial attacks and poisoning attacks and so on. So, there is an opportunity for us to have technologies to test AI systems, to see what kind of vulnerabilities they have, and then remedy those vulnerabilities before they’re actually deployed in our system.
In BT we recently launched a platform called Eagle-i. Eagle-i is a fundamentally different way of observing what’s going on. We call it the ringside view of the internet. We have a ringside view of what is going on in the world, in terms of network data that we have. We want to bring that data all into one place and be able to analyse it, to understand and predict cyber-attacks before they happen.
We’re generating virtual environments in which we could create a virtual security operations center or a virtual network operation center to bring experts from across the world to investigate and determine what we need to do in a particular incident and then determine what the best response is.
We can use AI to build a model of our network and use that model to simulate tens of thousands of different responses to a particular incident that we’re dealing with. We can determine what the best action is in that scenario in order for us to enact that in our network. We are also developing continuous authentication technologies to replace passwords and multifactor authentication processes and reduce the risk of attackers accessing our systems.
In summary, I will cover technological challenges and opportunities that the developing cyber environment will present, covering technologies such as Artificial Intelligence (AI), the Internet of Things (IoT) and quantum computing. AI is currently good at being trained but not as creative as human beings. I will showcase how we can detect and respond to attacks and how we’re using the latest AI technologies to create new capabilities for our networks in the future cyber environment.”