AI Security & Cybersecurity Expert | Security Researcher at Amazon Alexa AI Security | OWASP Leader
I am a Security Engineer at Amazon Alexa AI Security, working on securing AI-driven technologies impacting 70M+ U.S. Alexa users and millions globally. My expertise spans AI Security, Genomic Data Security, Cloud Security, and IoT Security, with a focus on application security and AI security research.
I contribute to NIST’s Genomic Cybersecurity Initiative, serve as a peer reviewer in cybersecurity research, and actively participate in AI Security Working Groups. As a leader in OWASP, I have contributed to security standards like the OWASP LLM Top 10, shaping best practices for AI and machine learning security.
My insights have been featured at DEF CON’s IoT Village, CISA Bulletins, and National Vulnerability Database (NVD). I also hold several CVEs in widely used systems, and I regularly engage with cybersecurity policy, AI regulations, and red-teaming methodologies.
I am available to provide expert insights on AI Security, Cybersecurity Policy, AI Regulations, Cloud & IoT Security, and Application Security.
📩 Let’s connect for media opportunities on AI security and emerging threats!
From smart home devices to smart cars, IoT actually gave us our “connected world”, but maybe not a “Safe” one. Imagine all your smart devices on your home network being controlled by someone on the other side of the world, your smart TVs, smart lights, baby monitors, routers, printers, workspace surveillance cameras, and literally everything else! This talk explores how the methods of manipulating domain name resolution can be used to exploit and remotely take over most of the connected devices in a private network. We will talk about how it can be used to scan a private network externally for IoT devices, and how it can put even private devices open to the public! We will cover some tools that can be used to takeover a device and exfiltrate the data of a victim under a minute with minimum user interaction. We demonstrate how the data can be exfiltrated...