This workshop gives an introduction to AI technology and then moves to practical examples of how AI technology can be used as a daily workflow and task optimization tool for Cyber Security Professionals.
This workshop gives an introduction to AI technology and then moves to practical examples of how AI technology can be used as a daily workflow and task optimization tool for Cyber Security Professionals.
Student/Lab Requirements:
Windows 11 or MacOS
Internet Access
OpenAI and/or Anthropic/Claude API key would be “nice to have”.
No virtual machine required. Lab’s will be demonstrated while the student follows along at their pace.
Syllabus
Brief History of AI and LLM Technology
Machine Learning, AI, and Data Science Concepts
Applying AI to Information Security Challenges
Introduction to Prompt Engineering
What is a prompt
Best Practices Prompt structure
Examples: good and bad prompts
Integrating AI into your daily workflow
General workflow ideas
Coder/programming assistance
Fabric: the gift of good prompt engineering
Putting together applications to leverage AI
Case Study 1: Predictive Reconnaissance and Intelligence Security Monitoring
An AI driven threat intelligence creation tool
Case Study 2: Leveraging Model Context Protocol for Workflow Improvement
MCP Servers to provide focused workflow tools, resources, and prompts
"I write malware, hack, and teach infosec for a living!"
Bio
Joff Thyer has been a Security Analyst with Black Hills Information Security (BHIS) since 2013. He has an associate in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements.
Derek Banks has been with Black Hills Information Security (BHIS) since 2014 as a security analyst, penetration tester and red teamer, and now fulfills a leadership role in the BHIS Security Operations Center (SOC). He has a B.S. in Information Systems and a M.S. in Data Science, as well as several industry certifications. Derek has experience in computer forensics and incident response, creating custom host and network-based logging and monitoring solutions, penetration testing and red teaming.