Loading…
Welcome to the third annual Cybersecurity Across Disciplines (CyAD) Conference hosted by the National Cybersecurity Training & Education Center (NCyTE)! 
  • The schedule is tentative and subject to change.  Please check back regularly for the most current version.
  • Important Notice: All sessions are first-come, first-served. While you can plan your schedule in Sched, it does not guarantee a seat in any session. CyAD registrants check your email inbox or junk folder for Sched invite.
Wednesday June 25, 2025 8:45am - 10:25am CDT
As cybersecurity threats grow in complexity and volume, traditional security operations struggle to keep pace. This presentation explores how artificial intelligence technologies are transforming cybersecurity operations, enabling organizations to detect, analyze, and respond to threats with unprecedented speed and accuracy. 

Key TopicsEvolution of Security Operations Centers (SOCs)
  • The transition from manual monitoring to AI-augmented operations
  • Challenges faced by traditional SOCs: alert fatigue, skill gaps, and resource constraints
  • The emergence of AI-native security platforms and their integration into existing infrastructure
AI Applications in Cybersecurity Operations
  • Threat Detection and Analysis
    • Machine learning algorithms that identify anomalous network behavior and potential threats
    • Natural language processing for analyzing threat intelligence and security reports
    • Computer vision techniques for identifying suspicious visual patterns in systems
  • Incident Response Automation
    • AI-driven triage and priority of security alerts
    • Automated containment and remediation capabilities
    • Decision support systems that guide human analysts through complex incidents
  • Compliance and Governance 
    • Risk analysis and management
    • Implementing policy and procedures
    • Audit planning and implementation
Ethical and Practical Considerations
  • Managing false positives and algorithmic bias in security contexts
  • Balancing automation with human oversight and decision-making
  • Privacy considerations when implementing AI-powered monitoring
  • Regulatory compliance challenges in AI-augmented security operations
Speakers
avatar for John Sands

John Sands

Professor/Department Chair, Computer Integrated Technologies, John Sands
Dr. John Sands brings over 37 years of extensive experience in information technology management and cyber defense. He earned his Ph.D. from Colorado State University and has dedicated the past three decades to advancing technology education as a distinguished member of Moraine Valley... Read More →
Wednesday June 25, 2025 8:45am - 10:25am CDT
BLDG T-953
Feedback form is now closed.

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link