are you seeing a rise of AI used in attacks what's happening in the real world not like what's in the movies but you know what are you seeing and is AI actually being used for offensive for hacking etc? The data is out there I I've seen recently with slack like using customer data even if you're paying to you know train the AI uh they didn't even ask for permission they just used it so from a privacy point of view AI bit of wild west it feels like from a cyber security point of view it seems really worrying any hope? There's hope there's absolutely hope whenever it comes to security a lot of security-minded organizations are trying to figure out what is going to be the guidance for not only today but 3 months from now 6 months from now a year from now and so [Music] Hey everyone it's David Bombal coming to you from Cisco live with a very very special guest Omar welcome. Thank you so much for having me here. Great to have you here you're very very well known in the industry I believe 27 books at the last count right? Yes sir I used them to raise my monitors so they're perfect for that. I don't believe that for a moment you've written books on all kinds of topics perhaps you can give us like a quick overview of some of the books that you've really enjoyed writing or that are very popular that people have given you feedback on but I mean 27 and you're writing new books as well I believe. Yes sir it's it's it's not overnight I'm sure all right it's been been at Cisco for 25 years and I started to contribute to some books before that it's a wide spectrum from certification books to books that are now used in University and a few related to how emerging Technologies like AI is impacting pretty much everything cyber security, networking, programming and so on. So I know some of the books that you've written like
uh PenTest+ you've also done Cyber Ops for Cisco and you've done some CCIE security books as well right? Yes sir the uh CCIE the exam that you're required to pass in order to get your CCNP yeah and CCIE yeah. And more recently another AI cyber security book is that correct? Yes sir actually I just published two uh about the same time, one was with a very good colleague of mine from the Oxford University his Miss Pitar yeah and um that one is around securing AI implementations a little bit more from a high level as a m fact I'm working on one that is a little bit more in depth right and my joke in those books is that by the time that I press the first key they become obsolete that technology is changing but it gives you a blueprint yeah of how to look into uh how AI is impacting the Technologies, what are the tools that are necessary for you to make sure that you're securing AI correctly and also how to use AI for security right so you have the two dimensions of using AI for security but also securing AI. What I do for Cisco mostly is a little bit of both but also looking into the security of the AI implementations across the whole portfolio. I need to a because I think a lot of people will be interested in this are you seeing a rise of AI used in attacks because I mean the one that we always know is deep fakes or you know videos with uh Tom Cruz or you know things like that but perhaps you can show you know tell us what's happening in the real world not like what's in the movies but you know what are you seeing and is AI actually being used for offensive for hacking etc? The short answer is yes, yep the longer answer is is beyond the fakes is beyond the traditional social engineering attacks right that's what I call more of the attacks of the 2023, 2022 interesting um the new waves that people are seeing nowadays is different officiation techniques okay and where attackers and if if you think about AI is abstracting a lot for people, so the way that you program the way that you interact with the computer is changing. So nowadays you have non-technical
people that can use you know libraries like LangChain, Llama index and lot of obstruction into the things that you don't have to have a PhD in data science to then use AI for something that something can be to create a new phone, creating your exploit, create a new occlusion technique look for vulnerabilities the perfect example of that that is beyond research last year to to catch the eye of my organization I did a workshop and I cloned the 12,000 security advisories at the time in GitHub and then what is in the security advisory well a link potentially to a GitHub pull request yeah what is in a pull request? A commit. What is in a commit? A diff. What is in a diff the code that was vulnerable yeah and the code that of course you know it has the fix if I put that into a model and say hey tell me what are the best ways for me to create an exploit of course if you ask ChatGPT is going to block you yeah there's a whole bunch of on sensor models that you can send that out so of course for my demonstration I uh I was showing you know how in some cases you know will hallucinate it will give you some very generic cross-site scripting you know always just script text but in some other ones you know opens your eyes and then you can ask of course what are the CWEs the Common Weakness Enumerators the root cause of the vulnerability Y and explain it to a developer so they can do not commit the mistake or you can actually do that to another model so make it better which is a different conversation but you know I digitize my voice so you know it will be a little bit real so the de fake was there fast forward a couple of months now I'm seeing you know very early indicators of and I will not say early indicators we're definitely seeing some um evidence that attackers actually using these techniques of course to create exploits yeah and especially in third party software in open source yeah that's the reason of you know the big push for supply fly chain security and you know the whole Asom uh you know movement and and so on so so yeah you know it's it's a combination of many different areas and where attackers are leveraging the ease of use of the technology and also combining the different techniques for another example is reconnaissance I was going to ask you about that yeah open source intelligence right forget about active reconnaissance just open source intelligence getting information from certificate transparency or from H shown or from you know social media and so on if I vectorize that information so in other words you know create beddings on different things that I can gather from uh different places put into a vector database like like ChromaDB, Pinecone PGVector the whole bunch of them right and then create you know agents with you know prom templates and agents with line chain or Llama index and so on now I have an army of people doing reconnaissance for me and profiling in an individual or a company while I sleep yeah that's a significant difference of what we're seeing nowadays of not only the potential but you know of course the the capabilities of of these newer technologies to accelerate attacks. So that's is that escalating you seeing more and more of those kind of attacks. It will continue to escalate yeah it's unfortunately that that's the we also have to think about how we reinvent literally reinvent incd response yeah for some of these a lot of the the techniques will be the same right but a lot of them will be different and I'll give you a couple of examples that be great one is remediation yeah what is remediation of a model is it pull in the plug yeah right uh you don't put the plug in BGP right you bring down the internet but as you become um reliant and and you rely on this technology the remediation will be a little bit different yeah but then the other one is for Y in an AI model forensics will be a little bit different right and there's a lot of metrics for accuracy for bias and and and so on for security not a lot of them exist so if I'm an attacker and I manipulate weights and so on there may be things that we're missing from a forensic capability so that's an area of research the other one is a really big one is reproducibility yeah if I get a prompt and I give it to a model to your rag implementation and so on it may be that with the same prompt with the same context of the data you may get different results yeah right so whenever somebody comes to you and say hey investigate this new vulnerability cross ey request fery service ey request fery n or SQL injection you typically have a set of instructions of click here put this payload you know basically the recipe of an exploit for this new implementation even if you give that prescriptive thing and the same prompt you may get different results and if an attacker is manipulating things behind the scenes it can do a lot of ausc on the actual attacks against the AI system itself yeah are you finding that attackers are using their own open source AIS they're also using like ones that they can just pay for that are available H there's an assumption that it's going to be used in both right yep um I cannot sugarcoat it right I mean that just the Dual nature of Technology yeah if I use uh CLA or GPT y or Mistral an attacker is probably using it faster better than you know cheaper um it is it is reality yeah and then also the definition of an attacker right criminals to scam people versus nation state yeah against the critical infrastructure yeah the other thing is AI comparing the models inference and and so on and all these systems that we're putting now together they're becoming critical infrastructure yeah it's like um you know back in the day we we looked at the security of routing and networking and and we still do right I mean that that's you have to worry about that plus plus yeah so um you looked at you know bgb for example we just talking about it right so how to secure these implementations and make sure that there's no route manipulation attacks now you have to think about the critical infrastructures inference coming from a specific model whether it's chat GPT your you so the attacks against that infrastructure while they use you know the same technology to attack you y that's something that we also have to figure out you know as a industry right but going back to your question related to them using a specific models yes if you ask CH GPT to create an exploit they have really good guard rails right to prevent that you can bypass that with prompt injection you know and even indirect prompt injection attacks you know embedding some prompts in a PDF for example a lot of them White Rabbit Neo is a perfect example and I know there's a company now but it's an open source model is uncensor and there's plenty of them out there that people are fine-tuning and then taking you know those guard rails out or not putting any guard rails to then be able to create an exploit to them be able to actually do you know x y and z y if that is somebody like me right she or ethical hackers imagine the very res sourceful attackers you know the ones that actually a lot of money and infrastru so for sure you know that that's that's an area of concern yes so we've got AI being used to attack but obviously AI is being used to protect but I'm just thinking about opportunities for everyone who's watching we definitely don't want any of the people watching to become black hat we want to steer them on the right path so there are a lot of opportunities right to help companies secure AI absolutely so can perhaps you can talk about that there are tons of opportunities in there so one thing that I always recomend commend is go beyond the model okay it's not securing just the model and even regulation I'm not going to go into the regulation technical but in the in the technical aspect of it a lot of people are focusing in the models you know uh model theft attacks which we have to pay attention to but now as we try to build systems that then are using multiple models yeah we're introducing a lot of security you know deficiencies that's a good way to put it it is yes that are security 101 yeah for example if you're familiar with retrieval augmented generation everybody's talking about this right you use your data your sensitive documents you use an embedding model you know something like C here or open eyes you know embedding models and there's plenty of them out there you're converting your data your text your you know PDFs Etc into numbers basically put them into a vector database that embedding model in some cases they're licking information at of the corporation exactly and then people are putting guard rails just into the inference model right the other one is as every company every sector is asking their people how can we use AI y to accelerate the things that we have yeah whether it's security collaboration Etc and a lot of people are experimenting yeah and as I mentioned these things are getting abstracted in the way that even non-technical people are playing with that that they have never thought about access control yep list privilege yep and so on there are other areas of focus on where now that we're moving to an agent based era y right so using more agents instead of chatbots and co-pilots how can we determine what is the required privilege to an agent because pretty much everything is running as a roote nowadays yeah and um that is pair to a human or to an application yeah because these are now Emeral entities that are going to spun up you know based on specific criteria and it's not only about rag prod using a tool getting data from an API and so on and then they will disappear right and you have the your personas so that's another area that we should focus on how do we have the appropriate Access Control mechanisms how we have the the basic oneone L privilege applied to these systems plus the more sophisticated attacks you know how can we detect if a weights in a model has been manipulated and the bigger one is supply chain security right if you look at huging face if you're not familiar with huging face tell us biggest platform think about like the GitHub y of models yeah and hog face is the one that is is being mentioned the most yeah there are others right tensor flow has one and so on but definitely huging phas if you look at huging phas early this year I'm not talking about you know you know the way back machine that you can go back so if you go back and use the way back machine and look at huging face in the beginning of the year was probably something about 300,000 models I haven't checked today but definitely last week as I was giving a presentation about it it was 650,000 plus right wow so if you look at it you know amazing I love it technolog is moving so fast and and so on in some cases it's scary but uh always uh optimistic of Technology a lot of those models actually the majority of them have used very insecure framework like pickle right and you saw you know couple of months ago 100 models being taken down from hugging face because real life attackers manipulate them so now imagine if you're a software developer I found out about you know a specific model because of a research paper oh I want to try this it's in hogging pH yeah oh there's a new version because this person says that it's you know better examples Etc I grab it I put that into my infrastructure Y and what I can actually do so that supply chain security is really tough of mind right and even even if you look at inventory that's a bigger one most companies don't have a good way to do inventory of their implementations yeah and U even so I sit on the board of Oasis is a standards organization I'm the chair of this thing called the common security advisory framework U we use machine rual of security advisories and try to modernize the way that we do you know vulnerability management so on and um a lot of the conversations in there is how can we secure this supply chain right with ass bombs you know software build materials get a good inventory if you look at AI models luckily now there's a lot of progress in there but a few months ago I'm not talking about years months ago we didn't even have a good way to even capture the inventory of a model and people may think well it's the same as an sbom because it's software uh you have you know ESP bones for quite some time spdx is a um a standard for that another one is Cyclone DX from OAS so you have a good way to inventory uh the list of ingredients that make up software in an AI model it's a little bit different it's beyond that you have to worry about the sbom but you also have to worry about the training environment that the model was uh trained on yep also if that is manipulated or it's not approved by a company that's another thing that you want to worry about the one is what is the data AI is not AI without data that you use to train or fine tune or rag you know there's always the three elements you train from scratch super expensive you know only a few companies you know like Cisco and you know and the the rest you know are doing that fine-tuning a little bit more accessible still requires expertise and and infrastructure and raging yeah and um so looking not only the model but the whole system again what is the data what is the purpose of the implementation what is the training environment and then all the auxiliary libraries like L chain and so on that's part of the traditional esom so spdx in the Linux Foundation they just released they're about to release 3.0 that includes and profile for uh AI bombs right and um I work with a company called manifest yep that uh we we looked at you know they they they're pretty well known in the s bomb and we looked at you know what are the minimum requirements that you should have in inventory and then we also fed that back to spdx and Linux foundation and also OAS to Cyclone DX so now um within weeks you're actually going to see these uh standards now supporting at least a good way to have an inventory of U of AI implementations yeah sounds like a bit of a wild west right it is Wild West yeah it is it's it's worrying because I think it's you mean we you we've been in this game for a while the um it's this everyone wants to go to the cloud now everyone wants Ai and everyone's jumping on this and that's a that's a really good observation many many many people have asked me is this just Cloud again yeah right uh or even is the cloud dead because it's expensive you know I'm not going to go into that but but is this another Cloud do I have to worry about from security from another Cloud the your answer is no okay what one of the big differences of this technology is that everybody is now becoming accessible to everybody yeah like you said non-technical people non-technical people I I'll give you an example this is kind of behind the scenes Cisco and so I sit in an organization called security and Trust we are pretty large organization so you have the product security inent response team I Bel I used to belong to that team CER the traditional inent response team within the company yeah then we have The Insider threat team a very big offensive security team that we're tasking to find zero day vulnerabilities in Cisco products and yeah and services and other uh entities and this is not Talos this is be Beyond Talos yeah and then um and a whole bunch of other you know forens six teams Etc it's a pretty big organization about close to a th000 people Y and um within there kind of like my carrot was I want to do an ation challenge this is last year and everybody has to play with AI y whether you're at pm at intern you know and so on I made a little competition right and even though we have a function that is dedicated you know for AI security and everything but I want it for everybody to truly understand and think about how this technology can impact everything that we do yeah from doing forensics analysis into a machine to do an evaluation evaluation we call it evaluation but like a pen test or red team you know and how we augment that to programming how we can create better tools and so on a lot of people they open my eyes I was joking that if I have three teams it would be amazing and we had 27 teams you know 70 people participating Etc and what I was seeing is that non-technical people they were not afraid y to using these Technologies watching a video follow through putting l chain you know in a way and ask asking the questions that we all should have been asking 10 years ago what embeding model should I use it's like oh wow we don't have a strategy for that let me actually you know assign people to that most Vector databases don't even support encryption right crazy so it's my fact I was even talking here about how to secure Vector databases I just published a paper about it but again Vector databases is a newer type of databas is not new uh basically whenever you convert texts or images into numbers you put them a store that you can do similarity searches yeah many methods on that and then you have retrieval you know that's does the word retrieval augmented Generation Y retrial method reranking techniques Etc that you get the data provide some context and you reduce the likelihood of hallucinations yeah very attractive for many people yeah if I vectorize again from certificate transparency information in ENT to my security policies examples of vulnerabilities and so on I can then accelerate provide better support to an engineer that is either programming or fixing a vulnerability yeah these are other examples you know or potentially even do a pull request automatically plenty of use cases and a lot of these non technical people were putting into the asking the questions and the main value at and the benefit was for the security people you know for us yeah to and again these are also security folks but you know non technical roles asking these questions that again should have been asked 10 years ago in the industry y not at Cisco y right the whole industry um so it's very fascinating on how this of course is impacting you know many different areas around technology and um you know Healthcare and so on and how we should look at securing those implementations as well I mean to me it looks really Bleak like wild waste the data is out there I I've seen recently with slack like using customer data even if you're paying to you know train the AI uh they they didn't even ask for permission they just used it so from a privacy point of view AI bit of wild west it feels like from a cybercity point of view it seems really woring any hope there's hope there's absolutely hope um there are a lot of organizations across the industry that are asking the same questions good whenever I've been blessed in my career that if I'm fixing a vulnerability again using the bgp example because top of my head for some reason sometimes I have been on the phone more with juniper yeah than even Cisco trying to figure out the the how to solve it yeah and then give the information to Cisco and then do a coordination of vulnerability you know disclosure and so on you know for many years now I'm seeing the same whenever it comes to security a lot of security-minded organizations are trying to figure out what is going to be the guidance for not only today but three months from now six months from now a year from now and so on a lot of that guidance unfortunately has been more around regulations and so on but we're moving outside of that right that we're trying to see how these new best practices or the assisting best practices apply to these Technologies and creating Frameworks about it so um I'm blessed to be part of the board of Oasis and uh with anthropic Microsoft Nvidia Intel IBM of course Cisco uh mic oft we're all creating a Consortium for securing AI right and of course we're collaborating with nist with uh other agencies like cisa the NSA and so on and we're we're putting a lot of guidance in the industry but how to operationalize that guidance and create sample reference architectures and so on one of the original contributions is Google's the open siif it's a open secure AI framework change the name for the coalition because it got uh donated to Oasis or the IPR got transitioned and that's the foundation we kind of rebooting that right modernizing even though it was created a few months ago right and you may think that oh my god modernizing of something that yeah but is is creating a framework on how fast we can create this guidance as technology evolves yeah right and then examples of that give you the the the perfect example right now what is an AI vulnerability yeah all right what is an AI security vulnerability yeah in many cases you're saying okay so if a prompt injection is one for sure you know easy yeah H but prompt injection if you think about me chatting with a chat bot and saying that Omar is ugly does this blah blah blah who's the victim of that the person that is doing yeah the so is that a true vulnerability or not yeah but what if I have a far World co-pilot yep or you know an HR system that I can give a resume you know that's a typical example you give a rume with an indirect prompt injection so a prompt within the PDF with white funds that the human cannot read but the machine can read and then do some action or a firewall co-pilot that then I can inject some type of configuration or ofus skate a configuration and then manipulate the system right that absolutely is a an AI vulnerability but there's a lot of talks about an AI vulnerability or security vulnerability versus bias ethics and and we're also trying to get those taxonomies out of the way uh so everybody will be somewhat in the same page Y and then truly understand how we should address all of them right we definitely should address them but what security teams should be prioritizing what your AI governance and legal teams should be prioritizing and working together really more closely than ever and it's not because of regulations and everything else but it's because of the whole AI governance within the organization I'm talking about inventory right really knowing what your people are using where it goes you know what technology goes into products into the applications that you have whether again you're a Cisco of the world or um anthropics of the world or Health Care System right so so that's the the scope of the charter of that organization that's great from an industry point of view right I'm really glad to hear that but let's bring it back to the individual yeah if I want to ride this wave I always recommend everyone rides the new wave and AI is that Wave It's the hype it feels like in many cases at the moment what's your advice if I'm a young person or I want to get into this field what would you advise people to do yeah so one thing even outside of AI whenever people ask me hey kind how can I get started in ethical hacking always my guidance was to space yourself technolog is moving fast yeah fast forward until now technolog is moving a lot faster y don't get overwhelmed right uh think about what are again the non technical people asking questions that the really hardcore technical people should have asked 10 years ago y right so look how this is affecting the work that you do what are the things yes the way that we can communicate with computers and the we use computers will change the way that we program computers now it's been augmented it will also will change but how that technology you know you you have to always have some fundamental knowledge of how this works yeah the human in the loop is crucial nowadays yeah and yes there's some technical works that will evolve right I'll give you a good example many people whenever they start in cyber security they start in a security Operation Center in a sock yeah right the immediate or the the question that I get all the time immediately whenever I talk to the young folks and so on should I even go to that yeah am I going to get replaced if I go into that and the short answer is no right hey it is evolving so tier one analyst and again I'm going to give you a real life example not by the book tier one analyst right now in my organization is working with a Jupiter no and of course this plong of the world and everything else but you know you're going to get augmented and we have been doing this before the CHP era and so on with traditional machine learning and and uh what you're seeing is that the level of a tier one is becoming a tier two yeah because uh also the way that you learn is accelerating faster yeah the way that I learn now is is significantly different than before yeah and also has to adopt augment you know having your tutors Etc but looking into how can you de develop a program in place that you don't get burned out right again Technologies you know will continue to change but it's somewhat actionable to look at the preium right on how AI is solving some of those problems a lot of people actually trying to get AI and find the problem to in of looking at the we do need a lot of people technical people that really can spot the fod versus reality yeah that can also be augmented you know with AI start uh go beyond the model go beyond chpt try to understand you know how this technology can interact with other systems what are vector databases where how dimensionality of data uh works you know so for an AI model to actually do something right um and then of course you know um if you're going to ethical hacking how somebody can manipulate this yeah if you're going more into instant response how can I use the technology or an attacker can use that to ofus skate you know these Technologies and then how how do I do forensics better faster and and so on and unfortunately it's going to be using AI right yeah this augmenting using AI especially in this concept I don't know if you have heard of constitutional AI right tesc so constitutional AI was a concept anthropic you know had probably two and a half years ago and he basically using AI to monitor AI right uh after they introduced that um a lot of people thought about okay this is good of looking at a model observing a model can I use AI to observe the rest of the system right and uh the answer is yes and of course you know Cisco has technology and that like modific and and so on but looking like if you're getting started looking on how the techniques of doing instant response monitoring how um things that AI potentially have gaps that will never ever ever you will always have to have some type of human in the loop yeah you know as people are developing programs I will I will definitely you know encourage you your newcomers because it's very very overwhelming to look at those areas right and then of course you still have to have the foundations networking was not going to go away you know as a matter of fact it's going to evolve but the technology will continue to to start with the fundamentals in there even programming is a very hot topic of is it going to get replaced and so on if you are not familiar with the underlying technology on how even AI may be constructing something who's going to defend who's going to be able to do forensics who's going to be able to actually do truly instant responds after something is manipulated right so I don't think that you know security and programmers and everything is that is definitely change and look into the way that how technology changes and how those roles but the fundamentals always are going to be there right so do you is it still the same as in the past go and do uh CCNA or network plus can you perhaps give us like just a sort of like a a road map if you've got like just I'm starting at zero like what would I do if I started today cuz I want to jump in this wave right I don't want to like everyone I don't want to like spend 10 years getting to a certain level I want to try and do the quick way like the I would say the hack hack hack the way so have you got like sort of a a road map that I can follow yeah yeah absolutely so typically it all depends on the role right is so broad let's but let's focus on red teaming perhaps or like hacking I like that I like that so if you are thinking about ethical hacking definitely you have to have a foundation of networking yep do you have to pass a CCNA to actually go in there probably not yeah but CCNA will definitely give a blueprint yeah and for me what certifications do uh in many cases is is create a blueprint and push me that I have some achievement that I can say okay you know this is something that I'm now can I apply yeah most companies you are evolving into like requiring a specific certification and so on but at least that gives you a a really good blueprint yeah so of course you know in the case of networking CCNA you know is is the de facto uh other ones you know related to ethical hacking uh a lot of people try to jump from like C8 to OSP yeah you know pays yourself probably something like pentest plus yeah to get you the the whole methodology of hacking yeah and in some cases even the non-technical aspects of the ethical hacking in real world you have to deal with scope and uh you know the things that will keep you out of jail and in business right so those certifications will actually provide you that and then you know from there you pace yourself to the ocps of the world and there so many of them as a matter of fact um I have a repository we can make it available that we have tons and tons of certifications and and what I um always say is that look at the blueprints of the certification they're free you don't have to actually pay you know if a blueprint is asking the same concept two or three times that's something that you have to prioritize yeah for sure yeah right so that's a fundamental outside of networking even though programing is going to change you have to have some of a foundation on how applications actually are created yeah even if it's augmented by a python the typical you know even for data science python how I got started and this is all a little bit of a personal story great I didn't get started with the AI thing because of the CH GP er um a few years ago a good friend of mine is no longer a Cisco we wanted to uh do automated trading like literally we wanted you know but here we are I'm still here so I was not that successful in doing right which I'm glad about myself so but I I I went to a program you know two-year program with Harvard but it was a mini competition we looked at the blueprints of things you know of course there was no certification just of machine learning at the time but we're looking at what are the fundamentals that I need yeah at the time was R everybody was programming in R and looking at to how we can do back preparation and and how we can do a little bit more again all predictive you know models and um and then apis with like interactive brokers Etc right so that pushed me to then look at the fundamentals not of how you know machine learning was actually revolutionizing things what are the things that I need to know from a programming perspective right that is applied to that use case right in that case it was automated trading again that was many years ago a lot of that still applies here right whether is generative Ai and and so on and now of course python libraries make it so much easier but I would say go and try to figure out what are those libraries doing behind the scenes yeah and especially if you want to go into security especially if you want to go into ethical hacker and especially if you want to mimic what a real attacker is actually doing y right looking at the limitations of the technology and also the power of the technology yeah right uh but I I think that that will be my guidance to people that are getting started is there a AI cyber security type SE or is it do I read your book that that you've published what cuz that's the piece that seems to be missing right CU we talk about the basics but how do I do the AI cyber piece you will see a flow of you know uh training and uh certifications being as matter of fact Cisco just announced an AI uh certification uh for security currently as of today again may change tomorrow they're not that many right but what you're seeing is that assisting certifications and assisting programs whether it's for inant response for non-technical things like Risk um management and governance and so on they're starting to incorporate AI into it so how to use um even a GPT a very basic me GPT for accelerating uh the threat hunting and then getting information from the M attack framework for example and what you're seeing the certifications evolving the some of the assistant certifications evolving to include those topics so it is inevitable that they will become domains yeah within a certification and task for somebody to then probably be augmented by Ai and then knowing what you know lanen can do or or the library of the 2025 right yeah because it's going to continue to evolve so you're going to see yes new certifications current certifications evolving and even the way that we do training right even though we're talking about books and everything else in the way that I learn I use books for blueprints yeah and then since information is changing so fast I create my own scripts to actually get papers get of course AI to summarize the papers if it's related to cyber security I get a you know very basic alert you should read this on the Saturday because it's very overwhelm and this changes so fast and then you know you create that type of framework on okay yes this is new research but the areas of security are the same exactly what we were just talking about earlier a lot of security oneone things that are being omitted because people are experimenting so um yeah cyber security I I will not say that it's going to get obsolete it's going to get more complicated it's probably going to be more demand for cyber security than than the opposite Omar unfortunately they're chasing us we got to end I could keep you here for hours thanks so much absolutely really appreciate it so for everyone who's watching please connect I'll put Omar's links below if you've got any questions put them in the comments below hopefully we'll get you back for more more interviews absolutely thanks so much thank you [Music]
2024-07-23 15:16