 So all of this is about exploitation of data and of course these data needs to be protected to be so what do we do inside the security? Thank you Patrick and thank you theory for this opportunity. We live in very interesting times The security aspect has become a bit compounded with many conflicts And in the allotted time I will speak about seven distinct things One will be the premise second will be the threat the third at the strategy as we see it for Will mentioned about quantum technology, but not quantum computing, which is what Franco would be speaking AI and cyber some examples in the future the premise Let me lay down the premise first We may all agree that there are no air gaps in cyber security be perimeter cloud space or edge number two the surface area of Cyber vulnerability has expounded many folds with the adoption of IOTs and sensors This is particularly true because we are a living in the world where most of our Critical infrastructures are connected three Encryption is everywhere and securing our encryptions is the key to our digital future or success Today, we are more an encryption economy The an example would be to look at digital signatures Everything that we validate are based on digital signatures And if there is a vulnerability on digital signatures, then we can imagine how our future might be compromised Now, let me talk briefly about the threats global trends in cryptography are Heavily compromised powerful algorithms like the shows and the grovers Come are using equally powerful computers that can crack down any encryption standards. They do that with Quantum simulators, which are very powerful computers that can compromise encryptions quantum computers That is something. It's like, you know, we all know when there was the The advent of y2k. There was a date, but nobody knows when quantum computers will come in. It's it's knowing the unknown third The majority of encrypted web data relies on an encryption standard called RSA 2048 a quantum computer with four zero nine nine qubits will break it in a few minutes This we don't see going beyond 2028. If not, it has already happened Systems using today's cryptography for long-term author Authentication is at risk. Just look at your health data. If that is compromised Well, that's why many of these hospitals are being hacked because their data has very long tail and cryptography built on mathematical algorithms are Vulnerable to brute-force attack Finally the grid will become the first in the line of attack when nations conflict or there are other Compelling economic narratives. This includes national defense systems critical infrastructures It's most of us most of what we have today banks financial institutions healthcare army navy. They all critical infrastructures The strategy let me put out two or three of these broad strategies, which are being employed now The first one is hack now Vaporize now. So if you have the algorithm, you have the cryptography to break these encryptions You vaporize it now or you hack now and store it store it and weaponize it later When you have the ability to break the encryption So basically what we are trying now trying is to move from Mathematics to quantum physics which according to pure science is it's much much more difficult to crack And this rest on two principles. One is the Heisenberg's principle of Uncertainty which enables the identification of eavesdropping actually the the pipe falls as soon as somebody comes into the chain The second is the no cloning theorem prohibits copying of data From quantum states these are two and the third there is a third one, which is the Bell's inequality principle which prevents implanting attacks on Fizz on physical systems Let me speak about quantum technology. I'm not going into quantum computing. See the this arises of the second quantum revolution Incidentally the first quantum revolution was much of the touted technologies that we have nuclear Semiconductor and laser the second is more characterized now by manipulation Individually manipulating individual quantum systems. For example eavesdropping using quantum key distribution Quantum computing breaking the RSA code. I Will now all you to AI and cyber AI systems will be vulnerable to adversarial attacks From any domain where AI augments action, which means the moment you use AI there is a vulnerability It's like a boomerang it can come back to you These attacks will involve evasion data poisoning Manipulation there thereby rendering AI Much ineffective. For example, let me give you a conflict scenario The let's say the field use is in AI is supercharged Intel, which is ISR The AI use case in this case case will be object detection, which is asset Person and weapon and the AI attack in this case would be extraction Annivation so if you look at what the Russians were able to do with their military fields In this current attack, you will see a lot of this exploitation happening where they were able to mask most of their Places where they had kept their aircrafts examples I would give of AI in a in a Is the combination of AI and being used with haps You know using satellites would be a little more challenging, but you have a haps which operated a much Lower altitude and these become aerial data centers So tomorrow when you are moving into autonomous areas of conflict You would be using more of haps and haps would act as area day Aerial data centers, which will ensure quick communication to people who are on the field and the second is it's not a fiction It's human enhanced Enhancement technology which is cybernetically enhanced Human beings which means that the human being you know Has implants in his body and he's able to connect to a haps and he's able to you know Take decisions much faster than Then having to call to a command center now finally I would look at the future which is the AI based Neural systems, so you have AI you have quantum But the challenge of AI Or the success of Building quantum encryptions is based on how much complexity you can build with AI you are able to increase this complexity Using a technology which we call cipher text Currently the highest standard that NIST has agreed is about to raise to the power of 256 but with AI Based neural systems you can increase this complex complexity of the cyber bit text to about to raise to the power of 2.6 million so that's how the future of The complexity of AI encryptions will be there are pluses there are minuses But this is how I see the the technology evolving There are you know I have emphasized more on the military part of it because the earlier adapters of all these advanced technologies We believe are Difference forces and it is only after the difference in the military use it would become much more applicable in the civil world Thank you. Thank you to be good point connecting with what Sorry Katsu to mention about the need for distinctive policies I would take two point here is a when it comes AI and cybersecurity You describe the complex system and it increase the attack surface what we call the attack surface The more complex your system is it increases notably what you've seen from Amina and what to be explained means a Lot of identities will be created all these machine will be identity and you know in Cybersecurity one of the biggest point is manage the identity And then the access based on the identity to the systems So that that's a big complexity and also you use AI for the attack Which is done there is a kind of try to neutralize Fortunately the parallelism is not yet in place. So we have a few challenging times ahead of us So thank you to be for this overview