February 9, 2017 By Murthy Rallapalli 3 min read

Since 2015, I have been designing and administering graduate courses at Georgia State University (GSU) in areas such as big data, information security and data privacy. I find this not only fun, but also a great opportunity to provide real-life knowledge to aspiring IT students from all over the world.

In one of the classes I taught last year, I had students representing 12 different nationalities. The best part, though, is watching the students’ eyes glow when they realize how technology and real life work together at the enterprise level.

An Education in Cognitive Application

Last year, I had an opportunity to study Watson for Oncology. I learned how it was able to analyze the meaning and context of structured and unstructured data in clinical notes and reports to determine a recommended treatment.

If we apply the same data concept to the cybersecurity realm, cognitive systems can understand research reports and best practices, providing real-time input to security analysts at speeds previously unimaginable. This level of insight could only otherwise be obtained from years of experience as a security analyst. But security analysts are, after all, humans and therefore prone to judgment errors.

In May 2016, IBM launched a year-long project in collaboration with eight universities. The researchers feed Watson for Cyber Security more than 15,000 security documents, including reports and data from the IBM X-Force Exchange, each month. This augmented intelligence can help reduce analysts’ workloads and improve accuracy with incident response. Analysts will receive rich guidance and incident cases from none other than Watson itself.

Fast forward to 2017. I am attending a luncheon with Dr. Bala Ramesh, interim chair and board of advisers professor at GSU. I floated the idea of designing and developing a course in cognitive computing for cybersecurity to him. Things moved quickly, and I am now involved in designing the course for GSU master’s students this summer.

Becoming a Cognitive Security Analyst

Initially, I sought to understand how one becomes a security analyst today. Currently, the path is fairly structured, consisting of training followed by technical certifications such as CISSP, CISM and CISA. Many universities offer information security degree programs that meet the standards for the National Centers of Academic Excellence in Cyber Defense (CAE-CD). The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the CAE-CD program to reduce vulnerabilities in the U.S. information infrastructure by promoting higher education, research and professional training in cyberdefense.

Degree programs from any participating institutions offer the skills and proficiencies required to become a security analyst. Many other universities not yet certified as part the program also offer specialized educational programs. But my challenge was to design a totally new course that teaches students how to become cognitive security analysts.

Teaching What Watson Can Do

The approach I took is twofold. My goal was to first ensure that the fundamentals of cognitive computing are well understood and, second, impart knowledge of cybersecurity in conjunction with cognitive computing. The modules I plan to cover in the program are:

  1. Introduction to Cognitive Computing — IBM Watson;
  2. IBM Watson Ecosystem;
  3. Roadmap for Building Your Cognitive Application (“Powered by Watson”);
  4. Designing and Developing Your Cognitive Application;
  5. Enrich Your Cognitive Application with Content;
  6. Train Your Cognitive Application; and
  7. Test and Deploy Your “Powered by Watson” Cognitive Application.

I am sure setting up an ecosystem will present its own challenges and require me to adjust the agenda and content. Simply getting the ecosystem off the ground will be a good first challenge.

As I embark on this journey of designing a one-of-a-kind cognitive course in cybersecurity for GSU, I plan to blog about my progress and any unforeseen challenges that arise. I hope you will follow along. I always say that difficulties strengthen the mind. Here’s hoping that any upcoming challenges are met with enthusiastic students who are passionate about solving today’s security problems.

More from Artificial Intelligence

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

3 proven use cases for AI in preventative cybersecurity

3 min read - IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million.Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance.Here are three ways how AI is helping to make that possible:1. Attack surface management: Proactive defense with AIIncreased complexity and interconnectedness are a growing headache for security teams, and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today