Summary
AI is changing the cybersecurity field, powering both defensive and offensive tactics. Therefore, organizations must adequately build roadmaps for integrating AI into business security operations. AI is powering CTI, threat hunting, SOC, IR, and many services to address three key use cases: system protection, staying ahead of adversaries, and faster threat response. In this chapter, we have introduced threat hunting and its importance in security intelligence. We have also shown that AI is a double-edged sword, as it can serve both organizations and adversaries. As a result, you should be able to highlight the importance of AI in your CTI program to the strategic team, position AI in your organization's security stack, and advise in the acquisition and deployment of an AI-based security tool (whether designed internally or acquired from a third-party vendor). In the next chapter, we look at practical use cases for cyber threat modeling and intrusion analysis.