Dr. Mostafa Alkilani

Project Manager at University of Huddersfield, United Kingdom

Session Title: The Revolution of Artificial Intelligence in Cyber Security

The use of Artificial Intelligence (AI) in the cyber security sector is rapidly increasing. The use of machine learning – a subdiscipline of AI – has long since been established as an essential component; however, with advancements in generative language and planning techniques, new use cases are constantly being developed. This is rapidly changing the cyber security landscape. In this talk, we briefly discuss new use cases for AI technology in both attack and defence. We emphasise the strong need for collaboration and education, using the successful University of Huddersfield, UK and The Ministry of Interior, Bahrain collaboration as a case study.

Dr Alghadhi has a PhD in Diagnostic Conditional Motoring in Mechanical Engineering. Mosttafa is Project Manager for education provision at the University of Huddersfield. With strong experience in the oil and gas sector, Mosttafa’s role also involves student supervision relating to fuel aviation quality control and he also has an academic background and expertise in mechanics and electronics. He led the delivery of the University’s MSc Security Science Program with the Royal Academy of Police in Bahrain. Mosttafa now leads the delivery of the MSc Cyber Security and Digital Forensics, as well as the LLM Human Rights and Justice. Simon Parkinson is a Professor of Cyber Security at the University of Huddersfield and Advisor to the UK Government’s Cyber Security Board. his research expertise and interests span Cyber Security and Artificial Intelligence. He has led various research and knowledge exchange projects to completion, exceeding the value of £1.2m, funded by the likes of the UK’s Engineering and Physical Science Research Council (EPSRC), Defence Science and Technology Laboratory (DSTL), and Innovate UK. Through his research, he has developed new ways to detect security weaknesses in access control systems, intrusions in enterprise IT systems, and unauthorised access through new biometrics such as key typing patterns and fitness devices

TOP