Explore the future of threat intelligence in cybersecurity through this 26-minute Black Hat conference talk. Delve into the automation of entity extraction using machine learning techniques specific to the cybersecurity domain. Learn how to leverage ML for custom entity extraction from unstructured text, generate valuable insights, and identify patterns of attacks faced by enterprises. Discover the potential of advanced techniques like word embeddings, conditional random fields, and LSDM for improving threat intelligence capabilities. Gain insights into the challenges of unseen tokens and explore open questions in the field. Access the full abstract and presentation materials for a comprehensive understanding of this cutting-edge approach to cybersecurity threat intelligence.
Death to the IOC - What's Next in Threat Intelligence