You may access the recording on-demand and pass your exam by September 29th, 2023 at 5pm PST to get certified!
Course 2 Title: Applications of AI and ML to the World of Information Security
Course 2 Description:
New technologies create opportunities for both defenders and attackers in the world of Information Security. But what are the real-world use cases in our world of information security? Can AI and ML be used by attackers to create ransomware? Is it possible for attackers to generate Business Email Compromise scams? Can we in Information Security utilize AI and ML to be more efficient in threat detection and analysis?
In the second session, our instructors:
- Explore the different use cases that AI and ML can augment how we protect people and defend data
- Describe the feasibility of attackers using AI and ML to attack organizations
- Make recommendations on what policies and controls need to be in place with the adoption of technologies such as Generative AI