BlueHat Oct 23. S15: Breach Path Busters: Using Graphs and AI to Decode Cyber Threats

Ғылым және технология

Kathy Vu, Aideen Fay, and Brian Fong from Microsoft discuss innovative strategies for scaling operations, making sense of data, and driving efficient change in cybersecurity. They demonstrate how converting traditional tabular data into graphs can help visualize and connect information to identify potential breach paths. They discuss the use of graphs to enumerate outcomes, build a decision tree of attack vectors, and transform theoretical breach paths into executable queries. They also highlight the importance of Blast Radius Analysis for prioritizing vulnerabilities and managing remediation efforts.
The speakers touch on the use of AI technology, such as GPT4 and Azure OpenAI Services, to simplify data analysis and lower the barrier to understanding effective security practices. They conclude by discussing how these techniques can empower both Red and Blue Team operations, enabling rapid scaling of red team findings and providing valuable insight for defenders.

Пікірлер

    Келесі