ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Beyond the Basics: The Role of LLM in Modern Threat Intelligence

Автор: SANS Digital Forensics and Incident Response

Загружено: 2024-02-19

Просмотров: 4128

Описание: Threat intelligence is replete with challenges, necessitating a large experience, knowledge, and techniques to really understand the threat landscape, the TTPs, and to accurately track threat actors. Given this context, it is crucial to innovate and introduce the tools and techniques to both the current and next generation of analysts who stand to benefit from shared experience. A promising avenue of innovation is the advent of large language models (LLMs). The widespread accessibility of these tools undoubtedly heralds a new era of innovation. However, practical questions arise: How do we effectively harness this technology? How might it address existing challenges? And, most crucially, how can it assist in tracking threat actors and empowering threat analysts? In this presentation, we will share some of our experiments in relation to LLMs. we will discuss the fundamental concepts and their application in Threat Intelligence. As organizations wrestle with the daunting task of finding the appropriate talent, analysts and security professionals face mounting pressure due to the vast volume of data, and increasingly sophisticated threats. LLMs emerges as a powerful solution, providing opportunities to streamline, enhance, and analyze information more effectively to better understand and analyze the threat landscape. We will kick of our presentation by providing a high-level overview of the fundamentals of large language models then we will discuss about the current techniques commonly used in prompt engineering (use to optimize the efficacy of large language models). We will delve in details about few-shot learning, role prompting, RAG and we will also discuss about implementing LLM agents to automate threat intelligence processes. Attendees will gain practical insights into how LLM can be utilized to maximize the efficacy of Threat Intelligence processes while also being aware of potential challenges and limitations. The presentation will not simply sing the praises of LLM; instead, it will offer a constructive and practical approach to using these new tools for empowering security analysts around the world. At the end of the presentation, you will have a clear understanding of how to use these tools not only to enhance your daily work but also to expand your application of LLMs across various domains.

Key takeaway:
-Understanding of LLMs: Attendees will gain a comprehensive understanding of how large language models function within Threat Intelligence.
-Harnessing LLMs: Attendees will learn the optimal strategies and techniques, from prompt engineering to the specifics of few-shot learning, role prompting, and RAG.
-TI Automation with LLM Agents: Attendees will explore how to leverage LLMs for automating threat intelligence processes.
-Enhancing TI Processes: Attendee will discover how to optimize and refine Threat Intelligence processes using AI tools.
-Understanding the Challenges: They will also understand potential pitfalls, limitations, and challenges inherent to using LLMs in the security domain.

View upcoming Summits: http://www.sans.org/u/DuS

SANS Cyber Threat Intelligence Summit 2024
Beyond the Basics: The Role of LLM in Modern Threat Intelligence
Thomas Roccia, Senior Security Researcher, Microsoft
Roberto Rodriguez, Principal Security Researcher, Microsoft

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Beyond the Basics: The Role of LLM in Modern Threat Intelligence

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise Approach

How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise Approach

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

The .AI Bubble

The .AI Bubble

Безопасность ИИ: понимание угроз.

Безопасность ИИ: понимание угроз.

Краткое объяснение больших языковых моделей

Краткое объяснение больших языковых моделей

Securing the Cloud Software Supply Chain: Strategies & Best Practices | CyberMindr | Anjali Shukla

Securing the Cloud Software Supply Chain: Strategies & Best Practices | CyberMindr | Anjali Shukla

Zero to CTI: A Novice’s Journey into Threat Intelligence

Zero to CTI: A Novice’s Journey into Threat Intelligence

Как я использую ИИ для качественного анализа всего

Как я использую ИИ для качественного анализа всего

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Building Production-Ready RAG Applications: Jerry Liu

Building Production-Ready RAG Applications: Jerry Liu

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting  - SANS THIR Summit 2019

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting - SANS THIR Summit 2019

Deconstructing the Analyst Mindset

Deconstructing the Analyst Mindset

Stanford CS229 I Machine Learning I Building Large Language Models (LLMs)

Stanford CS229 I Machine Learning I Building Large Language Models (LLMs)

GraphRAG: союз графов знаний и RAG: Эмиль Эйфрем

GraphRAG: союз графов знаний и RAG: Эмиль Эйфрем

Demystifying LLMs and Threats   My Journey

Demystifying LLMs and Threats My Journey

How to Build, Evaluate, and Iterate on LLM Agents

How to Build, Evaluate, and Iterate on LLM Agents

ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches - SANS CTI Summit 2019

ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches - SANS CTI Summit 2019

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]