Download Publication

Using AI for Offensive Security
Release Date: 08/06/2024
- Current challenges with offensive security
- Overview of LLMs and AI agents
- How AI can assist across five security phases: reconnaissance, scanning, vulnerability analysis, exploitation, and reporting
- How threat actors are using AI
- AI advances expected in the near future
- Current limitations of using AI in offensive security
- Governance, risk, and compliance considerations when using AI in offensive security
Download this Resource
Related Resources
Acknowledgements

Candy Alexander
Executive Cybersecurity Advisory, Alexander Cyber Advisory Services
Candy Alexander is an internationally recognized cybersecurity leader with over 35 years of experience driving strategic security initiatives for global organizations. As a strategic cybersecurity executive consultant, she not only specializes in helping organizations elevate their cyber risk management and security programs, but also instills confidence in her clients with her ability to align cybersecurity programs to achieve business obj...

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 140 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Josh Buker
Research Analyst, CSA
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more