AI Powered BladeRunners: The Role of AI in Implementing Zero Trust

Поделиться
HTML-код
  • Опубликовано: 11 апр 2024
  • Embark on a cybernetic journey with Ismael Valenzuela and Greg Scheidel, as they draw inspiration from the iconic Blade Runner universe featured in SANS Security 530, to explore the role of Generative AI, Machine Learning (ML), and Natural Language Processing (NLP), in establishing a robust Zero Trust architecture.
    In this webinar, you will use a Blade Runner’s favorite lifecycle, the DARIOM model-Discover, Assess, Re-Design, Implement, Operate, and Monitor-as a lens to examine how current AI technologies can be employed to enhance each phase. From the relentless pursuit of rogue replicants through threat modeling, to continuous adaptive risk assessment, this session will provide a unique perspective on how these technologies can be integrated into a comprehensive Zero Trust strategy, ensuring an adaptable and resilient defense mechanism against evolving cyber threats.
    Learn more about SEC530 Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise: www.sans.org/u/1vA1
    About the Speakers
    Ismael Valenzuela is author of the Cyber Defense and Blue Team Operations course, SANS SEC530: Defensible Security Architecture and Engineering and co-author of SEC568: Combating Supply Chain Attacks with Product Security Testing. Ismael is Vice President Threat Research & Intelligence at BlackBerry Cylance, where he leads threat research, intelligence, and defensive innovation. Ismael Valenzuela has participated as a security professional in numerous projects across the globe for over 20+ years, which included being the founder of one of the first IT Security consultancies in Spain.
    Greg Scheidel has over 30 years of hands-on experience in IT security and is experienced in desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance. He currently leads a security program at Iron Vine Security. Greg firmly believes IT and security must serve business needs rather than exist for their own sake, and is passionate about teaching others while expanding and honing his own skills. He’s also a member of the ISACA CSX-P working group to develop objectives and content related to the certification and exam.
  • НаукаНаука

Комментарии •