{"id":55677,"date":"2020-08-18T14:55:34","date_gmt":"2020-08-18T14:55:34","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55677"},"modified":"2024-08-30T16:42:06","modified_gmt":"2024-08-30T16:42:06","slug":"how-ai-will-change-hacking-the-good-and-the-bad","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/","title":{"rendered":"How AI Will Change Hacking: The Good and the Bad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55677\" class=\"elementor elementor-55677\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68db3804 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68db3804\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-267b52ba\" data-id=\"267b52ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e5c1813 elementor-widget elementor-widget-text-editor\" data-id=\"5e5c1813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Webinar Type:<\/strong> Panel Discussion<br><strong>Date:<\/strong> 27<sup>th<\/sup>&nbsp;July, 2021<br><strong>Time:<\/strong> 12.00 PM EST\/ 09.30 PM IST<br><strong>Topic: <\/strong> How AI Will Change Hacking: The Good and the Bad<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> Recent machine learning algorithms have produced positive results for cybersecurity, giving network security officers the chance to utilize these innovations to predict cyberattacks before an event occurs. Although AI is advancing the cybersecurity field, it also poses challenges. There is a lingering fear that AI could get into the hands of cybercriminals.<\/p>\n<p>Join us for the webinar on \u2018How AI Will Change Hacking: The Good and the Bad\u2019 and find out what advantages and disadvantages AI will bring to the cybersecurity industry.<\/p>\n<p>This session will also offer all the information you need about the current state of <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/exploring-ai-and-cybersecurity\/\">AI in cybersecurity<\/a> and how it is being used to prevent attacks.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ol>\n<li>How AI can help improve cybersecurity practices.<\/li>\n<li>How hackers can take advantage of AI vulnerabilities.<\/li>\n<li>Intrusion detection with AI.<\/li>\n<li>Threat intelligence with AI.<\/li>\n<\/ol>\n<h4>Moderator:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ron-Schmelzer-headshot-scaled.jpg.webp\" alt=\"Ronald Schmelzer\" width=\"200\"><\/p>\n<p><strong>Ronald Schmelzer,<\/strong> Principal Analyst, Managing Partner, and Founder of the Artificial Intelligence-focused analyst and advisory firm Cognilytica.&nbsp;<\/p>\n<p>Ronald is the host of the AI Today podcast, SXSW Innovation Awards Judge, and founder and operator of TechBreakfast demo format events. He is an expert in AI, Machine Learning, Enterprise Architecture, venture capital, start-up, and entrepreneurial ecosystems. Before founding Cognilytica, Ron founded and ran ZapThink; an industry analyst firm focused on Service-Oriented Architecture (SOA), Cloud Computing, Web Services, XML,and Enterprise Architecture which Dovel Technologies acquired in August 2011.<\/p>\n<p>Ron has started and run several companies that have collectively employed hundreds of people, raised over $60M in Venture funding, and exits in the millions. Ron was the founder and chief organizer of TechBreakfast \u2013 the largest monthly morning tech meetup in the nation with over 50,000 members and 3,000+ attendees at the monthly events across the U.S., including Baltimore, DC, NY, Boston, Austin, Silicon Valley, Philadelphia, and Raleigh.<\/p>\n<p>He was founder and CEO at Bizelo, a SaaS company focused on small business apps. Additionally, he was the founder and CTO of ChannelWave, an enterprise software company that raised $60M+ in VC funding and subsequently acquired by Click Commerce, a publicly-traded company. Ron founded and was CEO of VirtuMall and VirtuFlex from 1994-1998 and hired the CEO before it merged with ChannelWave.<\/p>\n<p>Ron is a well-known expert in IT, Software-as-a-Service (SaaS), XML, Web Services, and Service-Oriented Architecture (SOA). He is well regarded as a start-up marketing &amp; sales adviser, and is currently the mentor and investor in the TechStars seed stage investment program, where he has been involved since 2009. In addition, he is a judge of SXSW Interactive Awards and served on standards bodies such as RosettaNet, UDDI, and ebXML.<\/p>\n<p>Ron is the lead author of XML And Web Services Unleashed (SAMS 2002) and co-author of Service-Orient or Be Doomed (Wiley 2006) with Jason Bloomberg. Ron received a B.S. degree in Computer Science and Engineering from the Massachusetts Institute of Technology (MIT) and an MBA from Johns Hopkins University.<\/p>\n<hr>\n<h4>Panelists:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Raffael-Murty.png.webp\" alt=\"Raffael Marty\" width=\"200\"><\/p>\n<p><strong>Raffael Marty,<\/strong> Technology Executive, Entrepreneur, and Investor.<\/p>\n<p><strong>Bio:<\/strong> Raffael is the SVP of Security Products at ConnectWise, the market-leading software platform for technology solution providers. He holds more than 20 years of experience in big data, cybersecurity, and product development.<\/p>\n<p>Prior to ConnectWise Raffael was the Chief Research and Intelligence Officer at Forcepoint, a leading user and data protection company. He ran security analytics for Sophos, launched PixlCloud, a visual analytics platform, and Loggly the world\u2019s first cloud-based log management solution. Additionally, Raffael held key roles at IBM Research, ArcSight, and Splunk.Raffael is one of the most respected authorities on security data analytics, artificial intelligence, and visualization. He is the author of Applied Security Visualization and is a frequent speaker at global academic and industry events.<\/p>\n<p>Raffael holds a master&#8217;s degree in computer science from ETH Zurich, Switzerland, and is a student of the Japanese tradition of Zen.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Muller-Berndt.jpeg.webp\" alt=\"Dr. Bertie M\u00fcller\" width=\"200\"><\/p>\n<p><strong>Dr. Bertie M\u00fcller, <\/strong> Senior Lecturer &amp; PGT Programme Director for Computer Science in the Computational Foundry at Swansea University.<\/p>\n<p><strong>Bio:<\/strong> Dr. M\u00fcller is Chairman of the Society for the Study of Artificial Intelligence and Simulation of Behaviour (AISB). Bertie holds a Ph.D. in Computer Science from the University of Hamburg, Germany. Throughout his academic career, he has collaborated with industry partners.<\/p>\n<p>His main research interests are in resource and location modeling, multi-agent programming, and intelligent systems. He has over 90 publications, many in highly acclaimed international journals and conference proceedings. In his current work, he emphasizesexploring the role of AI in cybersecurity, ethical design of technology, and making AI work for humanity.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/Himanshu-Sharma.jpg.webp\" alt=\"Himanshu Sharma\" width=\"200\"><\/p>\n<p><strong>Himanshu Sharma, <\/strong>Co-founder of BugsBounty, a crowdsourced security platform for ethical hackers and companies interested in cyber services.<\/p>\n<p><strong>Bio:<\/strong> Himanshu has been in the field of bug bounty since 2009 and has been listed in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&amp;T, Avira, and many more with hall of fame listings as proofs. He has helped celebrities such as Harbhajan Singh recover their hacked accounts and assisted an international singer in tracking and recovering his hacked account. Additionally, he has been a speaker at Botconf &#8217;13, RSA 2018, CONFidence, SEC-T, Hack in the Box, and SINON. He also authored three Amazon bestseller books titled Kali Linux &#8211; An Ethical Hacker&#8217;s Cookbook, Hands-On Red Team Tactics, and Hands-on Web Pentesing with Metasploit.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/-tdV1h9-L4g\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Webinar Type: Panel DiscussionDate: 27th&nbsp;July, 2021Time: 12.00 PM EST\/ 09.30 PM ISTTopic: How AI Will Change Hacking: The Good and the Bad Watch Now Abstract: Recent machine learning algorithms have produced positive results for cybersecurity, giving network security officers the chance to utilize these innovations to predict cyberattacks before an event occurs. Although AI is&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79129,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55677","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How AI Will Change Hacking: The Good and the Bad | Ronald Schmelzer<\/title>\n<meta name=\"description\" content=\"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI Will Change Hacking: The Good and the Bad\" \/>\n<meta property=\"og:description\" content=\"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T14:55:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30T16:42:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How AI Will Change Hacking: The Good and the Bad\",\"datePublished\":\"2020-08-18T14:55:34+00:00\",\"dateModified\":\"2024-08-30T16:42:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/\"},\"wordCount\":912,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/AI-Change-Hacking_Panel-Discussion-Banner.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/\",\"name\":\"How AI Will Change Hacking: The Good and the Bad | Ronald Schmelzer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/AI-Change-Hacking_Panel-Discussion-Banner.jpg\",\"datePublished\":\"2020-08-18T14:55:34+00:00\",\"dateModified\":\"2024-08-30T16:42:06+00:00\",\"description\":\"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/AI-Change-Hacking_Panel-Discussion-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/AI-Change-Hacking_Panel-Discussion-Banner.jpg\",\"width\":465,\"height\":310,\"caption\":\"AI-Change-Hacking_Panel-Discussion-Banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-will-change-hacking-the-good-and-the-bad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How AI Will Change Hacking: The Good and the Bad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How AI Will Change Hacking: The Good and the Bad | Ronald Schmelzer","description":"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/","og_locale":"en_US","og_type":"article","og_title":"How AI Will Change Hacking: The Good and the Bad","og_description":"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T14:55:34+00:00","article_modified_time":"2024-08-30T16:42:06+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How AI Will Change Hacking: The Good and the Bad","datePublished":"2020-08-18T14:55:34+00:00","dateModified":"2024-08-30T16:42:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/"},"wordCount":912,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/","name":"How AI Will Change Hacking: The Good and the Bad | Ronald Schmelzer","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg","datePublished":"2020-08-18T14:55:34+00:00","dateModified":"2024-08-30T16:42:06+00:00","description":"How AI Will Change Hacking: Current state of AI in cybersecurity and how it is being used to prevent attacks.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/AI-Change-Hacking_Panel-Discussion-Banner.jpg","width":465,"height":310,"caption":"AI-Change-Hacking_Panel-Discussion-Banner"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-will-change-hacking-the-good-and-the-bad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How AI Will Change Hacking: The Good and the Bad"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55677"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79129"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}