YoVDO

How to Map Networked Devices Using Graph-Based AI to Preempt Cyber Threats

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge approach to network security in this 40-minute conference talk from the RSA Conference. Dive into the world of graph-based AI and its application in mapping networked devices to preempt cyber threats. Learn how enterprise networks, with their millions of interconnected and dynamic devices, pose significant monitoring challenges, and discover how AI models, including graph neural networks, can leverage passive data to effectively map networks, identify vulnerable devices, and monitor potential threats. Gain insights into this novel open-source technique that provides actionable intelligence without the need for active scanning. Presented by Divyansh Jain, Senior Data Scientist at NVIDIA, this session offers practical examples and demonstrates the power of graph-based AI in enhancing cybersecurity measures for complex network environments.

Syllabus

How to Map Networked Devices Using Graph-Based AI to Preempt Cyber Threats


Taught by

RSA Conference

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn