With the advent of machine learning birthing some of the first self-writing programs, this segment examines the capacity of outside actors to tailor these technologies to their advantage. A new threat emerges where the hacker may not be there at all.
Takeaways: