AI for Cybersecurity - Overview of the Field and Promising Future Directions
Overview
Syllabus
Introduction
Outline
Agenda
AI for Cybersecurity Overview
AI for Cybersecurity Life Cycle
Data Sources
External Data Sources
Cyber Security Initiatives
Key Limitations
Promising Directions
Research Illustration
Existing AI for Cybersecurity Initiatives
Exploit Data
Vulnerability Assessment Data
Vulnerability Exploit Matching
Device Vulnerability Severity Metric
Vulnerability Assessment
Workforce Development
Funding
Conclusion
Questions
Minimum Data Set Size
Decision Automation
Weak Signals
Honey Pots
AI in IoT
What comes first
What is the best solution
AI ML
MITRE Framework
Business Logic Vulnerabilities
Taught by
RSA Conference