newpush
newpush
  • 113
  • 18 160
BAISS - TECH AUDITORIUM _ Budapest AI Security Symposium 2024
Understanding the Impacts and Transformations of AI in Cybersecurity and Business
Join Laszlo Vele as he introduces a comprehensive tech session aimed at unraveling the scientific principles behind AI. Featuring expert insights from Johannes Bernhard, CEO of Bonn Consulting, this session navigates through the intricacies of AI technologies and their extensive applications in various sectors, from agriculture to energy management. This video further delves into regulatory frameworks such as the EU AI Act and NIS2 directive, emphasizing cybersecurity compliance. With practical demonstrations, hands-on labs, and real-world case studies, this episode also highlights the strategic integration of AI in both defense and offense, offering invaluable knowledge on leveraging AI for cybersecurity, source code analysis, and incident response. Perfect for tech enthusiasts, industry professionals, and students eager to stay ahead in the rapidly evolving landscape of AI and cybersecurity.
00:00 Introduction and Welcome
00:34 Understanding AI: Basics and Misconceptions
01:57 Diving into AI Technologies
03:09 Applications and Use Cases of AI
06:27 Challenges and Philosophical Insights
07:15 Supervised and Unsupervised Learning
14:55 Bias and Ethical Considerations in AI
17:19 Q&A and Summary
27:03 Introduction to AI-Driven Cybersecurity Lab
28:20 Panel Discussion: Building the Cybersecurity Lab
29:12 NewPush Labs: Concept and Implementation
52:20 Challenges and Solutions in Lab Deployment
58:44 Complementary Tools and Future Directions
01:10:21 Introduction to Open Source Project
01:11:23 Live Demo by Laszlo
01:11:44 Features and Documentation
01:12:48 User Experience and Applications
01:15:36 Security and Compliance
01:21:31 AI Act and NIS2 Directive
01:25:27 Digital Transformation and AI
01:36:20 Cybersecurity and Risk Management
01:53:40 AI in Defense Strategies
02:21:39 Q&A and Closing Remarks
00:00 BAISS - TECH AUDITORIUM _ Budapest AI Security Symposium 2024
มุมมอง: 8

วีดีโอ

Cyber Statecraft in the Age of AI: Old and New Priorities
มุมมอง 12714 วันที่ผ่านมา
In this insightful video, we delve into the intersection of artificial intelligence, national security, and cyber security from a U.S. perspective. Drawing from personal experiences, including a discussion on the Strategic Defense Initiative, the speaker explores the evolution of AI and its growing importance in various sectors like telecommunications, computer systems, and data handling. From ...
Getting Data in Right Can Make or Break Cybersecurity and AI
มุมมอง 8714 วันที่ผ่านมา
In this episode, Balazs Scheidler, a founder of security startups Balabit and Axoflow, delves into the growing prevalence of AI and the crucial role of data in cybersecurity. The discussion covers the significance of data quality in AI models and cybersecurity decisions, highlighting the operations within a Security Operations Center (SOC). The speaker warns against the common pitfall of data s...
What Does the Next AI Innovation Look Like?
มุมมอง 14314 วันที่ผ่านมา
In this insightful panel discussion, experts and industry leaders address the complex and often vague concept of Artificial Intelligence (AI). They explore different definitions of AI from industrial, legal, and practical perspectives. Key topics include the significance of large language models (LLMs), the role of AI in making better decisions, regulatory challenges in the EU and US, and the e...
Panel Three: Proper Care and Feeding of AI
มุมมอง 23614 วันที่ผ่านมา
Join our panel as they discuss the various forms and evolving applications of artificial intelligence (AI), including LLM implementations, security, and copyright concerns. We explore enterprise solutions for data swamps, the impact of large generative models, and the significant societal risks posed by AI. Additionally, the conversation delves into the ethical frameworks needed for responsible...
Learning: The Next Frontier
มุมมอง 2321 วันที่ผ่านมา
Join Joshua Vogelstein, a faculty member at Johns Hopkins University, as he delves into the frontier of learning and its application in artificial intelligence. In this talk, Joshua introduces his recent work set to be published at NeurIPS, the leading AI conference. He explores different scales of learning from single-cell organisms to humans and highlights the limitations of current AI models...
AI in Higher Education Gyorgy Eigner
มุมมอง 1621 วันที่ผ่านมา
In this insightful talk, Gyorgy Eigner addresses the challenges and opportunities emerging in higher education, particularly focusing on the role of AI and technology. Highlighting the disparities between countries like Hungary and the US in accessing technological tools, the discussion explores the potential of AI, including AI scientists and digital tutors, in transforming education. The spea...
A New Era of Cybersecurity
มุมมอง 16421 วันที่ผ่านมา
A New Era of Cybersecurity
Exploring the Intersection of AI and Cybersecurity
มุมมอง 1028 วันที่ผ่านมา
Exploring the Intersection of AI and Cybersecurity
The New Horizon: AI Driven Banking
มุมมอง 7728 วันที่ผ่านมา
The New Horizon: AI Driven Banking
Cyber Statecraft in Hungary: New Challenges, New Structures
มุมมอง 43หลายเดือนก่อน
Cyber Statecraft in Hungary: New Challenges, New Structures
The Impact of AI and Cybersecurity: Insights from E-Commerce Expert Kinga Daradics
มุมมอง 25หลายเดือนก่อน
The Impact of AI and Cybersecurity: Insights from E-Commerce Expert Kinga Daradics
AI and Security: Navigating a Double-Edged Sword
มุมมอง 38หลายเดือนก่อน
AI and Security: Navigating a Double-Edged Sword
Panel One: Leading Through Exponential Change
มุมมอง 24หลายเดือนก่อน
Panel One: Leading Through Exponential Change
AI Act and NIS2 Directive Gaining Competitive Advantage Through Compliance
มุมมอง 22หลายเดือนก่อน
AI Act and NIS2 Directive Gaining Competitive Advantage Through Compliance
NewPush Labs Balazs Nagy
มุมมอง 23หลายเดือนก่อน
NewPush Labs Balazs Nagy
Hands on AI Tools and Strategies for AI Based Defense Andras Varfi
มุมมอง 34หลายเดือนก่อน
Hands on AI Tools and Strategies for AI Based Defense Andras Varfi
The Science Behind AI with Johannes Bernhardt
มุมมอง 62หลายเดือนก่อน
The Science Behind AI with Johannes Bernhardt
25th Anniversary AI Symposium Highlights
มุมมอง 8หลายเดือนก่อน
25th Anniversary AI Symposium Highlights
Drone Hacks Oil Truck: The Alarming Reality of Cyber Threats
มุมมอง 332 หลายเดือนก่อน
Drone Hacks Oil Truck: The Alarming Reality of Cyber Threats
2023 AI Symposium -Preserving Culture with AI: Insights from MetaDialog's CEO Eli Braginskiy
มุมมอง 282 หลายเดือนก่อน
2023 AI Symposium -Preserving Culture with AI: Insights from MetaDialog's CEO Eli Braginskiy
2023 AI Symposium Deep Dive into AI: Understanding Learning, Risks, and Future Impacts
มุมมอง 162 หลายเดือนก่อน
2023 AI Symposium Deep Dive into AI: Understanding Learning, Risks, and Future Impacts
2023 AI Symposium - Unveiling AI: Learning, Limitations, and Ethical Implications
มุมมอง 142 หลายเดือนก่อน
2023 AI Symposium - Unveiling AI: Learning, Limitations, and Ethical Implications
2024 AI Symposium Speaker Announcement Sreedhar Kajeepeta
มุมมอง 242 หลายเดือนก่อน
2024 AI Symposium Speaker Announcement Sreedhar Kajeepeta
2024 AI Symposium Ferenc Krausz Speaker Announcement
มุมมอง 1052 หลายเดือนก่อน
2024 AI Symposium Ferenc Krausz Speaker Announcement
2024 AI Symposium Keynote Speaker Réka Szemerkényi
มุมมอง 382 หลายเดือนก่อน
2024 AI Symposium Keynote Speaker Réka Szemerkényi
25th Anniversary Symposium for Artificial Intelligence and Security: Thriving in the Exponential Age
มุมมอง 753 หลายเดือนก่อน
25th Anniversary Symposium for Artificial Intelligence and Security: Thriving in the Exponential Age
Mastering Cybersecurity: Safeguarding Your Online Presence with Passkeys & Multi-Layer Approvals/Pt2
มุมมอง 94ปีที่แล้ว
Mastering Cybersecurity: Safeguarding Your Online Presence with Passkeys & Multi-Layer Approvals/Pt2
Cybersecurity Basics Everyone Should Know 🌐💻 | Part 1
มุมมอง 230ปีที่แล้ว
Cybersecurity Basics Everyone Should Know 🌐💻 | Part 1
Navigating the Evolving Landscape of Cybersecurity: IAM, IGA, & Converged IGA Technology /Full video
มุมมอง 63ปีที่แล้ว
Navigating the Evolving Landscape of Cybersecurity: IAM, IGA, & Converged IGA Technology /Full video

ความคิดเห็น

  • @box4soumendu4ever
    @box4soumendu4ever 16 วันที่ผ่านมา

    ...AI was is and will be one of the biggest threat in our civilization. But there are many other barbaric threats we are dealing with in present time created by the NO.ONE what about them? So positive, constructive and human centric & focused discussions, collaborations and feedback loops must/should be in place 4 sure. AI will be used dangerously and we have to be prepared to face it.

  • @TeamDman
    @TeamDman 17 วันที่ผ่านมา

    Neat, thanm you for sharing

  • @ActuallyCool
    @ActuallyCool 24 วันที่ผ่านมา

    Ive been thinking the same thing. There has paradoxically never been as important of a time to gain concrete knowledge and expertise as now

  • @RashedulPro1122
    @RashedulPro1122 28 วันที่ผ่านมา

    Your video content is amazing, and the quality is admirable! I like your video ,God will bless you.

  • @newperve
    @newperve 29 วันที่ผ่านมา

    Newspapers can't and do provide just as much fake information. The idea that it's social media that's the problem is just an old media cope.

  • @freaghill94
    @freaghill94 หลายเดือนก่อน

    szép munka Kristóf, csak így tovább :)

  • @YammoYammamoto
    @YammoYammamoto หลายเดือนก่อน

    in the end - GPT proved that Muhammad was fallible.

  • @TheSmokinPotato
    @TheSmokinPotato 2 หลายเดือนก่อน

    so ironic this shit sounds like ai utter trash

  • @PtolemyPetrie
    @PtolemyPetrie 2 หลายเดือนก่อน

    If you are following the best practices ransomware should never be an issue. You hold a copy of the user's profiles on the server, so if there is an infection you just Re image the drive and reload the users profile. But number 1 is probably educating your end user base to get in the habit of patching their workstation and apps. Also the users eyes should be trained to differentiate between content rendered in the browser and content that is locally rendered through an application window. That and many other best practices.

  • @ktkyt4727
    @ktkyt4727 ปีที่แล้ว

    Thanks

  • @freaghill94
    @freaghill94 ปีที่แล้ว

    Great video! Might be helpful to add chapters in the videos so people can jump to a part which might interest them more, or just re-watch them easier.

    • @newpush
      @newpush ปีที่แล้ว

      Thank you for your comments. We sincerely appreciate your valuable feedback!

  • @dinominuti6886
    @dinominuti6886 ปีที่แล้ว

    agree, in the end it is about the data.

  • @laszloracz6843
    @laszloracz6843 ปีที่แล้ว

    Shifting to behavior-based threat prevention is a must! Your focus on analytics and universal logging in the Apple ecosystem is innovative. Balancing zero trust with practicality is tough, but your approach is smart. Protecting data takes time, but it's worth the effort. Love your commitment to top-notch security. Thanks Steve!

  • @dana6593
    @dana6593 ปีที่แล้ว

    💞 Promo'SM

  • @dinominuti6886
    @dinominuti6886 ปีที่แล้ว

    Highlights how Federation & SSO being part of an identity solution allows for flexibility and adaptability options to provide a solution that meets your clients needs

  • @alonzo3668
    @alonzo3668 ปีที่แล้ว

    😓 "Promosm"

  • @bigbglobal
    @bigbglobal ปีที่แล้ว

    Great excerpt about the Banner security model built on the Oracle security model from our long conversation with Guillermo, founder of the educational software service firm Ether.

  • @strongereveryday8
    @strongereveryday8 2 ปีที่แล้ว

    Amazing! Finally, we’re seeing that nearly everyone understands security is a business risk issue at the end of the day and that the goals are simple: safety and security.

  • @AnthonyTristramMoore
    @AnthonyTristramMoore 2 ปีที่แล้ว

    a ton of information comes in, a good chunk gets lost somewhere in the system, while every tool is working as intended----coming up with a solution to a problem that everyone just worked around, that's what's cool about this

  • @AnthonyTristramMoore
    @AnthonyTristramMoore 2 ปีที่แล้ว

    This idea, that compliance can be the natural outcome of taking the right steps in security, makes so much sense. Focusing on ticking boxes only helps ppl cover their assets, but focusing on security works so much better in the long run.

  • @alfredomoritello8364
    @alfredomoritello8364 2 ปีที่แล้ว

    Great contribution. The revolution of cyber security and network protection is a necessary strategy.

  • @AnthonyTristramMoore
    @AnthonyTristramMoore 2 ปีที่แล้ว

    This is really cool, could be a great source of insight into how these tools measure up to their specs

    • @bigbglobal
      @bigbglobal 2 ปีที่แล้ว

      Yes, you're right on, the question isn't as much which tool is better, rather which tool will work best in a given situation, in a given environment. With Log4J for example we have seen the same tools perform very differently depending on the environment they are used in.

  • @the_young_crews
    @the_young_crews 2 ปีที่แล้ว

    we like the orange coin

  • @dinominuti6886
    @dinominuti6886 2 ปีที่แล้ว

    Great conversation, so much more than just bitcoin

    • @bigbglobal
      @bigbglobal 2 ปีที่แล้ว

      That's right, the public blockchain powered by bitcoin is the backbone for many services requiring trust.

  • @dinominuti6886
    @dinominuti6886 2 ปีที่แล้ว

    The importance of having a holistic view across your IT enterprise landscape

  • @dinominuti6886
    @dinominuti6886 2 ปีที่แล้ว

    Great insight into the value of CAASM

  • @AnthonyTristramMoore
    @AnthonyTristramMoore 2 ปีที่แล้ว

    A real eye-opener. The immense possibilities of blockchain

    • @bigbglobal
      @bigbglobal 2 ปีที่แล้ว

      Definitely! Thank you for watching!

  • @lencsidani
    @lencsidani 2 ปีที่แล้ว

    Looks very exciting!

    • @newpush
      @newpush 2 ปีที่แล้ว

      Thank you!

  • @Austin-zn5bq
    @Austin-zn5bq 2 ปีที่แล้ว

    I hope you the best success!!! You really need P-R-O-M-O-S-M!

  • @michaelgast6842
    @michaelgast6842 3 ปีที่แล้ว

    Great information. Thanks for sharing!

    • @newpush
      @newpush 2 ปีที่แล้ว

      Glad it was helpful!

  • @michaelgast6842
    @michaelgast6842 3 ปีที่แล้ว

    Excited to try this out! Thanks for sharing.

    • @newpush
      @newpush 2 ปีที่แล้ว

      You are so welcome!

  • @michaelgast6842
    @michaelgast6842 3 ปีที่แล้ว

    Love the idea of the 'test drive' when looking for a partnership like a MSSP. Thanks for sharing!

    • @newpush
      @newpush 2 ปีที่แล้ว

      Glad it was helpful!

  • @michaelgast6842
    @michaelgast6842 3 ปีที่แล้ว

    Very helpful. Thanks for sharing!

    • @newpush
      @newpush 2 ปีที่แล้ว

      Glad it was helpful!

  • @martaquintos1058
    @martaquintos1058 3 ปีที่แล้ว

    An all-inclusive security service platform. Awesome!

    • @newpush
      @newpush 3 ปีที่แล้ว

      Thank you for your feedback, great to have you on the channel!

  • @alfredomoritello7676
    @alfredomoritello7676 3 ปีที่แล้ว

    Great point!

    • @newpush
      @newpush 3 ปีที่แล้ว

      Thank you Alfredo, happy to help!

  • @garyclift6552
    @garyclift6552 3 ปีที่แล้ว

    I appreciate this simple and straightforward approach to explaining MSSP vendors' sales tactics. Using your own data to explain a product before getting locked into a vendor is key. Nice work New Push team! Keep these videos coming.

    • @newpush
      @newpush 3 ปีที่แล้ว

      Thank you for your feedback, Gary, stay tuned for more!

  • @laszloracz6843
    @laszloracz6843 3 ปีที่แล้ว

    It’s surprising that using your own data in a demo how significantly change the experience understanding a product. I saw countless cyber security product demo where it’s clear that the presenter knows their artificially generated data inside out. But in real world scenarios they are full of false positives, and useless / spammy data which takes erroneous human work hours cleaning up on a daily basis.

    • @newpush
      @newpush 3 ปีที่แล้ว

      You're spot on, Laszlo: a service provider's ability to handle *your* data is arguably more important than the breadth of their theoretical capabilities.

  • @AmandaHorvath
    @AmandaHorvath 3 ปีที่แล้ว

    Great points - always good to know what to ask and the realistic response it should elicit.

    • @newpush
      @newpush 3 ปีที่แล้ว

      Exactly! Thanks for watching!