Connecting chapters
While reading the book, you have gone from the introductory chapters about big data and cybersecurity, through the AI problems and methods, to concrete applications and important considerations in AI projects. The connections between chapters are described in the following figure.
Figure 19.1 – Connecting knowledge from different chapters
Here is some advice on how to use this knowledge when working on your own projects and adopting AI in your organization:
- Be aware of the technological landscape: Big data is being adopted in cybersecurity tools and processes at an increasing rate and cybersecurity vendors are adding AI functionality in their products in multiple areas, such as EDR, SIEM, SOAR, DLP, and so on. Your job is to be aware of how this AI functionality works to be able to interpret the results when applying it, for example, in endpoint malware detections made using AI or anomalies detected in data transfer that...