YoVDO

AI for Cybersecurity - Overview of the Field and Promising Future Directions

Offered By: RSA Conference via YouTube

Tags

Cybersecurity Courses Artificial Intelligence Courses Vulnerability Assessment Courses Disinformation Courses Workforce Development Courses Security Operations Centers Courses Cyber Threat Intelligence Courses Adversarial Machine Learning Courses

Course Description

Overview

Explore the intersection of artificial intelligence and cybersecurity in this 55-minute webcast from RSA Conference. Gain insights into prevailing cybersecurity data sources and AI applications in Security Operations Centers, Cyber Threat Intelligence, disinformation, and adversarial machine learning. Delve into key limitations and opportunities in the current landscape, and discover a multi-disciplinary roadmap for future AI developments in cybersecurity. Learn about external data sources, cyber security initiatives, and research illustrations covering exploit data, vulnerability assessment, and workforce development. Engage with topics such as decision automation, weak signals, AI in IoT, and business logic vulnerabilities. Presented by Sagar Samtani, Assistant Professor and Grant Thornton Scholar from Indiana University's Department of Operations and Decision Technologies.

Syllabus

Introduction
Outline
Agenda
AI for Cybersecurity Overview
AI for Cybersecurity Life Cycle
Data Sources
External Data Sources
Cyber Security Initiatives
Key Limitations
Promising Directions
Research Illustration
Existing AI for Cybersecurity Initiatives
Exploit Data
Vulnerability Assessment Data
Vulnerability Exploit Matching
Device Vulnerability Severity Metric
Vulnerability Assessment
Workforce Development
Funding
Conclusion
Questions
Minimum Data Set Size
Decision Automation
Weak Signals
Honey Pots
AI in IoT
What comes first
What is the best solution
AI ML
MITRE Framework
Business Logic Vulnerabilities


Taught by

RSA Conference

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam