Artwork

Content provided by David Bisson and Center for Internet Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Bisson and Center for Internet Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 89: How Threat Actors Are Using GenAI as an Enabler

31:17
 
Share
 

Manage episode 425710962 series 3382533
Content provided by David Bisson and Center for Internet Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Bisson and Center for Internet Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests:

  • Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®)
  • Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS

Together, they discuss how cyber threat actors (CTAs) are using generative artificial intelligence (GenAI) as an enabler of their attacks.

Here are some highlights from our episode:

  • 01:04. Why it's important to raise awareness of how CTAs are using GenAI
  • 01:59. How the CIS Cyber Threat Intelligence (CTI) team is seeing generative AI in CTAs' attack methodology
  • 03:50. The types of attacks that are using this technology and how the frequency of those attacks is changing
  • 05:46. Some notable attacks that have used GenAI in their methodology
  • 16:10. The ways in which CTAs are incorporating generative AI into social engineering
  • 24:17. What defenders can do in response to CTAs' use of GenAI

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

  continue reading

91 episodes

Artwork
iconShare
 
Manage episode 425710962 series 3382533
Content provided by David Bisson and Center for Internet Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Bisson and Center for Internet Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests:

  • Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®)
  • Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS

Together, they discuss how cyber threat actors (CTAs) are using generative artificial intelligence (GenAI) as an enabler of their attacks.

Here are some highlights from our episode:

  • 01:04. Why it's important to raise awareness of how CTAs are using GenAI
  • 01:59. How the CIS Cyber Threat Intelligence (CTI) team is seeing generative AI in CTAs' attack methodology
  • 03:50. The types of attacks that are using this technology and how the frequency of those attacks is changing
  • 05:46. Some notable attacks that have used GenAI in their methodology
  • 16:10. The ways in which CTAs are incorporating generative AI into social engineering
  • 24:17. What defenders can do in response to CTAs' use of GenAI

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

  continue reading

91 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide