In this episode of CISO Tradecraft, host G Mark Hardy sits down with Tomas Roccia, a senior threat researcher at Microsoft, to delve into the evolving landscape of AI and cybersecurity. From AI-enhanced threat detection to the complexities of tracking cryptocurrency used in cybercrime, Tomas shares his extensive experience and insights. Discover how AI is transforming both defensive and offensive strategies in cybersecurity, learn about innovative tools like Nova for adversarial prompt detection, and explore the sophisticated techniques used by cybercriminals in high-profile crypto heists. This episode is packed with valuable information for cybersecurity professionals looking to stay ahead in a rapidly changing field.
Defcon presentation: Where is my crypto Dude? https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Thomas%20Roccia%20-%20Where%E2%80%99s%20My%20Crypto%2C%20Dude%20The%20Ultimate%20Guide%20to%20Crypto%20Money%20Laundering%20%28and%20How%20to%20Track%20It%29.pdf
GenAI Breaches Generative AI Breaches: Threats, Investigations, and Response - Speaker Deck https://speakerdeck.com/fr0gger/generative-ai-breaches-threats-investigations-and-response
Transcripts: https://docs.google.com/document/d/1ZPkJ9P7Cm7D_JdgfgNGMH8O_2oPAbnlc
Chapters
- 00:00 Introduction to AI and Cryptocurrencies
- 00:27 Welcome to CISO Tradecraft
- 00:55 Guest Introduction: Tomas Roccia
- 01:06 Tomas Roccia's Background and Career
- 02:51 AI in Cybersecurity: Defensive Approaches
- 03:19 The Democratization of AI: Risks and Opportunities
- 06:09 AI Tools for Cyber Defense
- 08:09 Challenges and Limitations of AI in Cybersecurity
- 09:20 Microsoft's AI Tools for Defenders
- 12:13 Open Source AI Security: Project Nova
- 18:37 Community Contributions and Open Source Projects
- 19:30 Case Study: Babit Crypto Hack
- 22:12 Money Laundering Techniques in Cryptocurrency
- 23:01 AI in Tracking Cryptocurrency Transactions
- 26:09 Sophisticated Attacks and Money Laundering
- 33:50 Future of AI and Cryptocurrency
- 38:17 Final Thoughts and Advice for Security Executives
- 41:28 Conclusion and Farewell