{"id":1691,"date":"2024-06-28T09:51:52","date_gmt":"2024-06-28T09:51:52","guid":{"rendered":"https:\/\/icter.lk\/?post_type=post_speaker&#038;p=1691"},"modified":"2024-06-28T10:42:05","modified_gmt":"2024-06-28T10:42:05","slug":"dr-mohamed-nabeel","status":"publish","type":"post_speaker","link":"https:\/\/icter.lk\/icter_2024\/speaker\/dr-mohamed-nabeel\/","title":{"rendered":"Dr. Mohamed Nabeel"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Biography:<\/strong><\/h3>\n\n\n\n<p>Mohamed Nabeel, PhD, is a principal researcher at Palo Alto Networks where he leads<br>the efforts on graph based threat intelligence research in the web security team. He is<br>passionate about building AI powered tools and techniques to help defenders stay one<br>step ahead of Internet miscreants. During his spare time, he teaches AI\/Data Science to<br>graduate students. He has authored and presented 20+ US patents and 25+ papers at<br>top security conferences and journals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Securing AI: Navigating AI risks to build a safe digital world<\/strong><\/h2>\n\n\n\n<p>Today, we stand on the precipice of the Fourth Industrial Revolution, a transformative<br>era driven by unprecedented advancements in AI. At the heart of this revolution lies<br>GenAI (e.g. ChatGPT or Gemini), a branch of AI that holds immense potential to<br>reshape every data driven opportunity. However, like any new groundbreaking<br>technology, with great power comes great responsibility. As we harness the capabilities<br>of AI, we must also address the inherent risks it poses and implement robust strategies<br>to mitigate them. Make no mistake, with mitigation techniques in place, robust AI has<br>the potential to create a safer world bringing a new era of prosperity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Biography: Mohamed Nabeel, PhD, is a principal researcher at Palo Alto Networks where he leadsthe efforts on graph based threat intelligence research in the web security team. He ispassionate about building AI powered tools and techniques to help defenders stay onestep ahead of Internet miscreants. During his spare time, he teaches AI\/Data Science tograduate students. [&hellip;]<\/p>\n","protected":false},"featured_media":1692,"comment_status":"closed","ping_status":"closed","template":"","class_list":["post-1691","post_speaker","type-post_speaker","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/post_speaker\/1691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/post_speaker"}],"about":[{"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/types\/post_speaker"}],"replies":[{"embeddable":true,"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/comments?post=1691"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/media\/1692"}],"wp:attachment":[{"href":"https:\/\/icter.lk\/icter_2024\/wp-json\/wp\/v2\/media?parent=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}