Security Engineering with AI
Date and time is TBD
|Location is TBD
Gain proficiency in cybersecurity risk assessment, management, and mitigation augmented by AI. Cover predictive risk analysis, automated scoring, and threat modeling. Explore adversarial machine learning for attack detection, defense strategies, and cyber attack attribution.
Time & Location
Date and time is TBD
Location is TBD
About the event
Learning Objective - Gain proficiency in cybersecurity risk assessment, management, and mitigation augmented by AI. Cover predictive risk analysis, automated scoring, and threat modeling. Explore adversarial machine learning for attack detection, defense strategies, and cyber attack attribution. Learn visualization techniques, secure AI model development, vulnerability assessment, application security testing, IAM, secure communication protocols, biometric authentication, and regulatory compliance automation, all with AI integration.
Audience – Any intermediate-senior level professional in cybersecurity
Pre-Requisite: Proficiency in Cyber Threat Intelligence, Cybersecurity Data Analysis, Anomaly Detection in Networks, IDS, and IPS is essential. Additionally, expertise in Malware Analysis, Threat Hunting with AI, SIEM with AI, Endpoint Security with AI, and Cybersecurity Forensics with AI is required. This includes enhancing SIEM with ML, AI-driven anomaly detection, NLP for event categorization, AI predictive modeling, deploying AI-driven EDR, ML for telemetry data analysis, AI-based EPP, integrating AI-powered endpoint security with threat intel feeds, utilizing ML for digital forensics, AI tools for evidence correlation, NLP for forensic report analysis, and integrating AI forensics with incident response and threat hunting.
Risk Assessment and Management with AI (4 hours)
· Utilizing AI for Predictive Risk Analysis
· Automated Risk Scoring and Prioritization
· AI-driven Threat Modeling and Scenario Analysis
Adversarial Machine Learning in Cybersecurity (4 hours)
· Adversarial Attacks Detection and Mitigation
· Adversarial Defense Strategies in AI Systems
· Cyber Attack Attribution with AI
Cybersecurity Visualization Techniques (2 hours)
· Visual Representation of Security Data
· Interactive Security Dashboards and Heatmaps
· AI-enhanced Data Visualization for Security Insights
Secure AI Model Development and Deployment (4 hours)
· AI Model Privacy Techniques
· Secure AI Model Deployment Practices
· Continuous Monitoring and Update Mechanisms
AI-driven Vulnerability Assessment and Management (8 hours)
· Automated Vulnerability Detection with AI
· Vulnerability Prioritization using AI Algorithms
· AI-powered Vulnerability Remediation Suggestions
Application Security Testing with AI (8 hours)
· AI-driven Static and Dynamic Application Security Testing (SAST/DAST)
· Automated Security Code Review using AI
· AI-powered Application Security Vulnerability Identification
Identity and Access Management (IAM) with AI (4 hours)
· AI-based Identity Verification Techniques
· Behavior-based Access Control with AI
· Continuous Authentication using AI
Secure Communication Protocols with AI (4 hours)
· AI-based Encryption and Decryption Techniques
· AI-driven Intrusion Detection in Communication Channels
· AI-powered Secure Communication Protocol Development
Biometric Authentication and Authorization with AI (2 hours)
· AI-based Biometric Identification Systems
· Continuous Behavioral Biometric Authentication
· AI-enhanced Biometric Security in Multi-factor Authentication
Regulatory Compliance Automation with AI (2 hours)
· AI-driven Compliance Auditing and Reporting
· Automated Compliance Policy Enforcement
· AI-powered Regulatory Risk Assessment and Management