February 9, 2017 By Murthy Rallapalli 3 min read

Since 2015, I have been designing and administering graduate courses at Georgia State University (GSU) in areas such as big data, information security and data privacy. I find this not only fun, but also a great opportunity to provide real-life knowledge to aspiring IT students from all over the world.

In one of the classes I taught last year, I had students representing 12 different nationalities. The best part, though, is watching the students’ eyes glow when they realize how technology and real life work together at the enterprise level.

An Education in Cognitive Application

Last year, I had an opportunity to study Watson for Oncology. I learned how it was able to analyze the meaning and context of structured and unstructured data in clinical notes and reports to determine a recommended treatment.

If we apply the same data concept to the cybersecurity realm, cognitive systems can understand research reports and best practices, providing real-time input to security analysts at speeds previously unimaginable. This level of insight could only otherwise be obtained from years of experience as a security analyst. But security analysts are, after all, humans and therefore prone to judgment errors.

In May 2016, IBM launched a year-long project in collaboration with eight universities. The researchers feed Watson for Cyber Security more than 15,000 security documents, including reports and data from the IBM X-Force Exchange, each month. This augmented intelligence can help reduce analysts’ workloads and improve accuracy with incident response. Analysts will receive rich guidance and incident cases from none other than Watson itself.

Fast forward to 2017. I am attending a luncheon with Dr. Bala Ramesh, interim chair and board of advisers professor at GSU. I floated the idea of designing and developing a course in cognitive computing for cybersecurity to him. Things moved quickly, and I am now involved in designing the course for GSU master’s students this summer.

Becoming a Cognitive Security Analyst

Initially, I sought to understand how one becomes a security analyst today. Currently, the path is fairly structured, consisting of training followed by technical certifications such as CISSP, CISM and CISA. Many universities offer information security degree programs that meet the standards for the National Centers of Academic Excellence in Cyber Defense (CAE-CD). The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the CAE-CD program to reduce vulnerabilities in the U.S. information infrastructure by promoting higher education, research and professional training in cyberdefense.

Degree programs from any participating institutions offer the skills and proficiencies required to become a security analyst. Many other universities not yet certified as part the program also offer specialized educational programs. But my challenge was to design a totally new course that teaches students how to become cognitive security analysts.

Teaching What Watson Can Do

The approach I took is twofold. My goal was to first ensure that the fundamentals of cognitive computing are well understood and, second, impart knowledge of cybersecurity in conjunction with cognitive computing. The modules I plan to cover in the program are:

  1. Introduction to Cognitive Computing — IBM Watson;
  2. IBM Watson Ecosystem;
  3. Roadmap for Building Your Cognitive Application (“Powered by Watson”);
  4. Designing and Developing Your Cognitive Application;
  5. Enrich Your Cognitive Application with Content;
  6. Train Your Cognitive Application; and
  7. Test and Deploy Your “Powered by Watson” Cognitive Application.

I am sure setting up an ecosystem will present its own challenges and require me to adjust the agenda and content. Simply getting the ecosystem off the ground will be a good first challenge.

As I embark on this journey of designing a one-of-a-kind cognitive course in cybersecurity for GSU, I plan to blog about my progress and any unforeseen challenges that arise. I hope you will follow along. I always say that difficulties strengthen the mind. Here’s hoping that any upcoming challenges are met with enthusiastic students who are passionate about solving today’s security problems.

More from Artificial Intelligence

How AI can be hacked with prompt injection: NIST report

3 min read - The National Institute of Standards and Technology (NIST) closely observes the AI lifecycle, and for good reason. As AI proliferates, so does the discovery and exploitation of AI cybersecurity vulnerabilities. Prompt injection is one such vulnerability that specifically attacks generative AI. In Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, NIST defines various adversarial machine learning (AML) tactics and cyberattacks, like prompt injection, and advises users on how to mitigate and manage them. AML tactics extract information…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

How I got started: Cyber AI/ML engineer

3 min read - As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interset, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team today. Did you go to college? What did you go to school for? Pospelova: I graduated with a bachelor’s degree in computer science and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today