AI and Cybersecurity - The Twain Shall Meet

AI and Cybersecurity - The Twain Shall Meet

CAE in Cybersecurity Community via YouTube Direct link

Detecting Intrusions using Policies, Context, and Reasoning 1. Detect potential new vulnerabilities from (Dark) Web descriptions, blogs, tweets, and discussions, extract information and map to

4 of 8

4 of 8

Detecting Intrusions using Policies, Context, and Reasoning 1. Detect potential new vulnerabilities from (Dark) Web descriptions, blogs, tweets, and discussions, extract information and map to

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

AI and Cybersecurity - The Twain Shall Meet

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 UMBO Advanced Persistent Threats AR - Long & Multi-step Process - Different vulnerabilities exploited - APT37 (REAPER)
  3. 3 UMBO AI for Cybersecurity: TLDR Version . Most IDS systems are point-based & driven by known signatures . Our system maps multiple traditional and novel sensors to a common ontology
  4. 4 Detecting Intrusions using Policies, Context, and Reasoning 1. Detect potential new vulnerabilities from (Dark) Web descriptions, blogs, tweets, and discussions, extract information and map to
  5. 5 UMBO What does that mean? Deductive Reasoning Can you represent "rules" in an Analyst's brain, and reason over them with facts ? - Background knowledge/Intelligence - New Vulnerabilities have been di…
  6. 6 Why can't we use an NLP toolkit out of the box
  7. 7 Tracking vulnerability inheritance during development Software supply chain attacks!
  8. 8 Multi-lingual Threat Intelligence

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.