Artificial Intelligence & Machine Learning , Black Hat , Events

Gen AI: Humanlike, With Access to Vast Amounts of Data

Zscaler's EMEA CISO Marc Lueck on the Power and Pitfalls of AI in Cybersecurity
Marc Lueck, EMEA CISO, Zscaler

Acting as a bridge between traditional AI and machine learning, generative AI has the "ability to act as a human who has access to a tremendous amount of data," said Marc Lueck, EMEA CISO at Zscaler.

See Also: Establishing a Governance Framework for AI-Powered Applications

Lueck underscored the dual nature of artificial intelligence - as both a powerful defense mechanism and a potential vulnerability that demands careful consideration and proactive protection. He highlighted the paradoxical response to AI adoption, as a survey revealed that 95% of respondents use AI in their businesses but 89% view it as a threat.

In this video interview with Information Security Media Group at Black Hat Europe 2023, Lueck also discussed:

  • The defensive use of AI in countering evolving threats, such as sophisticated phishing attacks;
  • The potential security implications of implementing gen AI technologies;
  • The fundamental shift toward AI as a pivotal force in various industries.

Lueck has nearly 30 years of information security experience. His expertise spans enterprise security management, threat intelligence, vulnerability management, compliance and security architecture.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.