AI Powered BladeRunners: The Role of AI in Implementing Zero Trust

Subscribers:
20,100
Published on ● Video Link: https://www.youtube.com/watch?v=DQfGfs07B84



Duration: 35:04
255 views
10


Embark on a cybernetic journey with Ismael Valenzuela and Greg Scheidel, as they draw inspiration from the iconic Blade Runner universe featured in SANS Security 530, to explore the role of Generative AI, Machine Learning (ML), and Natural Language Processing (NLP), in establishing a robust Zero Trust architecture.

In this webinar, you will use a Blade Runner’s favorite lifecycle, the DARIOM model—Discover, Assess, Re-Design, Implement, Operate, and Monitor—as a lens to examine how current AI technologies can be employed to enhance each phase. From the relentless pursuit of rogue replicants through threat modeling, to continuous adaptive risk assessment, this session will provide a unique perspective on how these technologies can be integrated into a comprehensive Zero Trust strategy, ensuring an adaptable and resilient defense mechanism against evolving cyber threats.

Learn more about SEC530 Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise: https://www.sans.org/u/1vA1

About the Speakers
Ismael Valenzuela is author of the Cyber Defense and Blue Team Operations course, SANS SEC530: Defensible Security Architecture and Engineering and co-author of SEC568: Combating Supply Chain Attacks with Product Security Testing. Ismael is Vice President Threat Research & Intelligence at BlackBerry Cylance, where he leads threat research, intelligence, and defensive innovation. Ismael Valenzuela has participated as a security professional in numerous projects across the globe for over 20+ years, which included being the founder of one of the first IT Security consultancies in Spain.

Greg Scheidel has over 30 years of hands-on experience in IT security and is experienced in desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance. He currently leads a security program at Iron Vine Security. Greg firmly believes IT and security must serve business needs rather than exist for their own sake, and is passionate about teaching others while expanding and honing his own skills. He’s also a member of the ISACA CSX-P working group to develop objectives and content related to the certification and exam.




Other Videos By SANS Cyber Defense


2024-05-21Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction
2024-04-19Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
2024-04-18Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency
2024-04-17Cracking the Code: The Role of Programming in Information Security
2024-04-16Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network
2024-04-15Unlocking Cybersecurity: From Zero to Hero in the Digital Age
2024-04-12AI Powered BladeRunners: The Role of AI in Implementing Zero Trust
2024-04-11Breach Data Infrastructure
2024-04-11A View From the Trenches
2024-04-11OSINT Psychology: Understanding the Human Element of Intelligence Gathering
2024-04-11Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok
2024-04-11Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy
2024-04-11A Practical Guide To OSINT On the Russian Internet
2024-04-11Stunt OSINT: AI and Content Networking Display
2024-04-11From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners
2024-04-11Every Contact Leaves a Trace
2024-04-11Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning
2024-04-11Telegram 101 to 401
2024-04-11Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT
2024-04-11toADS Hunting Online Advertisements
2024-04-11Identifying the Secret Military Helicopters of Washington, D C



Tags:
cyber defense
cyber security
cyber defense training
cybersecurity
ismael valenzuela
sans sec530
greg scheidel
sec530 defensible security architecture and engineering
defensible security architecture
defensible security engingeering
security architecture training
security engineering training
zero trust
zero trust for the hybrid enterprise
defensible security architecture and engineering implementing zero trust for the hybrid enterprise