YoVDO

AI for Cybersecurity - Overview of the Field and Promising Future Directions

Offered By: RSA Conference via YouTube

Tags

Cybersecurity Courses Artificial Intelligence Courses Vulnerability Assessment Courses Disinformation Courses Workforce Development Courses Security Operations Centers Courses Cyber Threat Intelligence Courses Adversarial Machine Learning Courses

Course Description

Overview

Explore the intersection of artificial intelligence and cybersecurity in this 55-minute webcast from RSA Conference. Gain insights into prevailing cybersecurity data sources and AI applications in Security Operations Centers, Cyber Threat Intelligence, disinformation, and adversarial machine learning. Delve into key limitations and opportunities in the current landscape, and discover a multi-disciplinary roadmap for future AI developments in cybersecurity. Learn about external data sources, cyber security initiatives, and research illustrations covering exploit data, vulnerability assessment, and workforce development. Engage with topics such as decision automation, weak signals, AI in IoT, and business logic vulnerabilities. Presented by Sagar Samtani, Assistant Professor and Grant Thornton Scholar from Indiana University's Department of Operations and Decision Technologies.

Syllabus

Introduction
Outline
Agenda
AI for Cybersecurity Overview
AI for Cybersecurity Life Cycle
Data Sources
External Data Sources
Cyber Security Initiatives
Key Limitations
Promising Directions
Research Illustration
Existing AI for Cybersecurity Initiatives
Exploit Data
Vulnerability Assessment Data
Vulnerability Exploit Matching
Device Vulnerability Severity Metric
Vulnerability Assessment
Workforce Development
Funding
Conclusion
Questions
Minimum Data Set Size
Decision Automation
Weak Signals
Honey Pots
AI in IoT
What comes first
What is the best solution
AI ML
MITRE Framework
Business Logic Vulnerabilities


Taught by

RSA Conference

Related Courses

TinyML Talks - Software-Hardware Co-design for Tiny AI Systems
tinyML via YouTube
Cross-Domain Transferability of Adversarial Perturbations - CAP6412 Spring 2021
University of Central Florida via YouTube
InfoSec Deep Learning in Action
nullcon via YouTube
Zen and the Art of Adversarial Machine Learning
Black Hat via YouTube
Practical Defenses Against Adversarial Machine Learning
Black Hat via YouTube