Darktrace Cyber AI Analyst: Autonomous Investigations

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The myriad of security tools used by businesses today creates massive quantities of data and surfaces too many alerts for analysts to effectively manage. As threats become increasingly sophisticated and the cyber security industry continues to face a skills shortage, over-worked and under-resourced teams urgently need augmentation. 

Cyber AI Analyst, the product of a research initiative from Darktrace’s R&D Center in Cambridge, was built to augment security teams and optimize threat investigation. It continuously examines every event that arises in Darktrace’s Enterprise Immune System, emulating expert human thought processes for autonomous triaging and reporting. 

Learning outcomes:

  1. Learn how an AI approach to security identifies, responds and investigates threats as they appear
  2. Understand how a technology that can mimic complex human thought processes was created
  3. Learn how supervised machine learning can be used to automate the threat investigation process, doing the heavy lifting of the daily threat investigations and identifying incidents of interest
  4. Discover how the technology reported on a nation-state APT weeks before public attribution
  5. Understand how the technology can be of great value to a SOC, augmenting and uplifting strained security team

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Darktrace here: https://www.darktrace.com/en/legal/. Please see Infosecurity Magazine’s privacy policy for more information.