Monthly Threat Webinar Series - December, 2020

Malicious Uses of AI
by Cybercriminals

Recorded December 17th | On Demand


Although artificial intelligence (AI) and machine learning are used extensively to fight cybercrime, they’re starting to be utilized by malicious actors.

This month, I am joined by Senior Threat Researcher, David Sancho. We’ll review an exclusive research project, created as a joint effort between Trend Micro Research, The United Nations Interregional Crime and Justice Research Institute (UNICRI), and Europol, to give you up-to-date findings on this pressing issue.

Join the monthly threat webinar and live Q&A session as we also discuss:

  • The malicious uses of this technology by cybercriminals and other threat actors
  • What we’re seeing today and what we’ll be seeing in the future, courtesy of our guest, Trend Micro researcher, David Sancho
  • How malicious actors plan to use AI and ML against us

#

About the Presenters



Jon Clay
Director: Global Threat Communications
Trend Micro

Jon Clay has worked in the cybersecurity space for over 24 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies.  As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.  

Read Jon's weekly blog, This Week in Security News, to stay up to date on the latest cybersecurity news and events.



David Sancho
Senior Threat Researcher,
Trend Micro

David Sancho joined Trend Micro in 2002, having fulfilled a variety of technical security-related roles. Currently, his title is Senior Anti-Malware Researcher and he specializes in web threats and other emerging technologies. In his more than 18 years of experience in the security field, Sancho has written and published a number of research papers on malware tendencies, has been featured in the media and has participated in customer events where he has presented on business issues and malware-related topics. His interests include web infection methods, vulnerability exploitation and white-hat hacking in general.

Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.