Topic:From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors
Abstract:Traditional threat detection often focuses on indicators of compromise (IOCs), which offer limited visibility into an attacker’s intent and long-term behavior. However, as digital infrastructure expands across various environments, large-scale behavior analysis is needed. The current webinar explores how AI is transforming threat intelligence by enabling deeper analysis of persistent threat actors, moving from reactive detection to proactive understanding. The session will examine how AI models can analyze vast datasets, ranging from network telemetry to behavioral patterns, to uncover attacker tactics, techniques, and procedures (TTPs). Join us to gain insights into identifying intent, predicting attacker moves, and strengthening defense strategies against advanced persistent threats (APTs). Also, the webinar will discuss real-world scenarios to illustrate how AI-driven intelligence can enhance threat hunting and strategic decision-making.
Key Takeaways:
Moving beyond IOCs to behavior- and intent-based threat analysis
Understanding how AI enhances profiling of persistent threat actors
Correlating multi-source security data to uncover hidden attack patterns
Strengthening threat hunting with AI-driven insights
Anticipating attacker behavior and improve defensive strategies
Integrated AI-powered threat intelligence with SOC workflows
Speaker:
Don Warden II, Director, Incident Response, Cybolt
Bio: Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.






