top of page

Security Engineering with AI

Date and time is TBD

|

Location is TBD

Gain proficiency in cybersecurity risk assessment, management, and mitigation augmented by AI. Cover predictive risk analysis, automated scoring, and threat modeling. Explore adversarial machine learning for attack detection, defense strategies, and cyber attack attribution.

Tickets are not on sale
See other events
Security Engineering with AI
Security Engineering with AI

Time & Location

Date and time is TBD

Location is TBD

About the event

Learning Objective - Gain proficiency in cybersecurity risk assessment, management, and mitigation augmented by AI. Cover predictive risk analysis, automated scoring, and threat modeling. Explore adversarial machine learning for attack detection, defense strategies, and cyber attack attribution. Learn visualization techniques, secure AI model development, vulnerability assessment, application security testing, IAM, secure communication protocols, biometric authentication, and regulatory compliance automation, all with AI integration.

Audience – Any intermediate-senior level professional in cybersecurity

Pre-Requisite: Proficiency in Cyber Threat Intelligence, Cybersecurity Data Analysis, Anomaly Detection in Networks, IDS, and IPS is essential. Additionally, expertise in Malware Analysis, Threat Hunting with AI, SIEM with AI, Endpoint Security with AI, and Cybersecurity Forensics with AI is required. This includes enhancing SIEM with ML, AI-driven anomaly detection, NLP for event categorization, AI predictive modeling, deploying AI-driven EDR, ML for telemetry data analysis, AI-based EPP, integrating AI-powered endpoint security with threat intel feeds, utilizing ML for digital forensics, AI tools for evidence correlation, NLP for forensic report analysis, and integrating AI forensics with incident response and threat hunting.

Risk Assessment and Management with AI (4 hours)

· Utilizing AI for Predictive Risk Analysis

· Automated Risk Scoring and Prioritization

· AI-driven Threat Modeling and Scenario Analysis

Adversarial Machine Learning in Cybersecurity (4 hours)

· Adversarial Attacks Detection and Mitigation

· Adversarial Defense Strategies in AI Systems

· Cyber Attack Attribution with AI

Cybersecurity Visualization Techniques (2 hours)

· Visual Representation of Security Data

· Interactive Security Dashboards and Heatmaps

· AI-enhanced Data Visualization for Security Insights

Secure AI Model Development and Deployment (4 hours)

· AI Model Privacy Techniques

· Secure AI Model Deployment Practices

· Continuous Monitoring and Update Mechanisms

AI-driven Vulnerability Assessment and Management (8 hours)

· Automated Vulnerability Detection with AI

· Vulnerability Prioritization using AI Algorithms

· AI-powered Vulnerability Remediation Suggestions

Application Security Testing with AI (8 hours)

· AI-driven Static and Dynamic Application Security Testing (SAST/DAST)

· Automated Security Code Review using AI

· AI-powered Application Security Vulnerability Identification

Identity and Access Management (IAM) with AI (4 hours)

· AI-based Identity Verification Techniques

· Behavior-based Access Control with AI

· Continuous Authentication using AI

Secure Communication Protocols with AI (4 hours)

· AI-based Encryption and Decryption Techniques

· AI-driven Intrusion Detection in Communication Channels

· AI-powered Secure Communication Protocol Development

Biometric Authentication and Authorization with AI (2 hours)

· AI-based Biometric Identification Systems

· Continuous Behavioral Biometric Authentication

· AI-enhanced Biometric Security in Multi-factor Authentication

Regulatory Compliance Automation with AI (2 hours)

· AI-driven Compliance Auditing and Reporting

· Automated Compliance Policy Enforcement

· AI-powered Regulatory Risk Assessment and Management

Share this event

bottom of page