BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250713T040104Z
UID:259602F5-6521-43A9-AFDE-65C524E30AC4
DTSTART;TZID=America/New_York:20250709T190000
DTEND;TZID=America/New_York:20250709T194500
DESCRIPTION:Vulnerability management is a critical aspect of cybersecurity.
  While cybersecurity is often perceived as a specialized field\, existing 
 cybersecurity bodies of knowledge provide a wealth of accessible content. 
 Nonspecialists can draw on this material to design systems for security\, 
 provided they adopt a disciplined\, integrative approach grounded in an in
 formed understanding of cybersecurity concepts and frameworks. In this tut
 orial\, we first offer a conceptual framework for systematically managing 
 vulnerability management. Then\, we exemplify the practical use of this fr
 amework while exercising automated reasoning based on a symbolic artificia
 l intelligence (AI) model. We conclude by highlighting further potential o
 f AI in vulnerability management.\n\nParticipants will be able to:\n\n- Un
 derstand core concepts of cybersecurity in system design context.\n\n- Be 
 able to adopt a practical\, systematic approach to vulnerability managemen
 t.\n\n- Explore and learn about the potential of neurosymbolic AI for vuln
 erability management.\n\nSpeaker(s): Avi Shaked\, PhD\n\nAgenda: \nIntrodu
 ction: Concepts of cybersecurity in system design\n\nApproach for vulnerab
 ility management\n\nFramework for systematically managing vulnerabillities
 \n\nPotential of Neurosymbolic AI for vulnerability management\n\nQuestion
  and Answers\n\nVirtual: https://events.vtools.ieee.org/m/487636
LOCATION:Virtual: https://events.vtools.ieee.org/m/487636
ORGANIZER:rajesh.gundeti@ieee.org
SEQUENCE:52
SUMMARY:Addressing vulnerabilities in system design using symbolic AI
URL;VALUE=URI:https://events.vtools.ieee.org/m/487636
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Vulne
 rability management is a critical aspect of cybersecurity. While cybersecu
 rity is often perceived as a specialized field\, existing cybersecurity bo
 dies of knowledge provide a wealth of accessible content. Nonspecialists c
 an draw on this material to design systems for security\, provided they ad
 opt a disciplined\, integrative approach grounded in an informed understan
 ding of cybersecurity concepts and frameworks. In this tutorial\, we first
  offer a conceptual framework for systematically managing vulnerability ma
 nagement. Then\, we exemplify the practical use of this framework while ex
 ercising automated reasoning based on a symbolic artificial intelligence (
 AI) model. We conclude by highlighting further potential of AI in vulnerab
 ility management.&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;br&gt;Participants will be able to:
 &lt;/strong&gt;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li style=&quot;color: rgb(0\, 0\, 0)\;&quot;&gt;&lt;span lang=&quot;EN-GB
 &quot;&gt;Understand core concepts of cybersecurity in system design context.&lt;br&gt;&lt;
 br&gt;&lt;/span&gt;&lt;/li&gt;\n&lt;li style=&quot;color: rgb(0\, 0\, 0)\;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Be
  able to adopt a practical\, systematic approach to vulnerability manageme
 nt.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/li&gt;\n&lt;li style=&quot;color: rgb(0\, 0\, 0)\;&quot;&gt;&lt;span lang=&quot;E
 N-GB&quot;&gt;Explore and learn about the potential of neurosymbolic AI for vulner
 ability management.&lt;/span&gt;&lt;/li&gt;\n&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;Introdu
 ction: Concepts of cybersecurity in system design&lt;/p&gt;\n&lt;p&gt;Approach for vul
 nerability management&lt;/p&gt;\n&lt;p&gt;Framework for systematically managing vulner
 abillities&lt;/p&gt;\n&lt;p&gt;Potential of Neurosymbolic AI for vulnerability managem
 ent&lt;/p&gt;\n&lt;p&gt;Question and Answers&lt;/p&gt;
END:VEVENT
END:VCALENDAR

