Overview
Syllabus
0:00 - Exploring AI’s role in adversarial behavior and cybersecurity defense
00:02:04 - Example of AI misuse with Apple’s AI protocol to bypass security tools
00:02:30 - Transition to defensive use of AI technologies in cybersecurity
00:04:51 - Emphasis on creating a secure AI framework to guide implementation
00:06:12 - Exploring how Security Copilot can assist with data discovery
00:09:09 - Rise of Data Governance as a Security Concern
00:12:39 - Tracking and tagging documents for visibility
00:13:01 - Turning on auditing to enable governance and collaboration
00:15:53 - Encouragement to stay updated on evolving tools and continuous learning
Taught by
Microsoft Ignite