AI/Machine Learning is the Future of Information Security

We blend insights and strategy to help deploy AI/Machine Learning for Information Security for organizations and governments.

Learn More



We provide strategic training on AI/Machine Learning for Information Security

We target both business and government leaders and middle management teams to build their capabilities in the deployment of AI/ML for information security.

Learn More

We provide easy access to resources on AI/Machine Learning for Information Security

We provide easy access to resources on AI/ML for information security to support researchers, industry practitioners and policy makers in adopting best practices in the deployment of AI/ML solutions for information security management.

Learn More
About Us

What We Do


We are professionals in the field of Artificial Intelligence (AI) and Machine Learning (ML) specializing in the information security domain. We provide:
 

  1. Capability-building programs on “AI/ML for Information Security.”
     
  2. Cloud systems for learning management systems, knowledge management and compliance management to help translate training into implementation programs that produce outcomes at the workplace and help secure the returns on investment in training initiatives.
     
  3. Project management support in the implementation of AI/ML solutions for information security.



Our Trainers

Promote Customer Centricity
Foster Data-Driven Culture
Optimize ICT Infrastructure
Drive Sustainable Profitability
Course Outline

Our Courses

Artificial Intelligence / Machine Learning for Information Security

This course provides a broad introduction to the deployment of AI/ML for information security and related cybersecurity challenges.

Learn more

AI Ethics and Governance

This program seeks to provide a practical overview on the process of designing, developing and implementing ethical AI programs as well as AI and data governance frameworks for organizations.

Learn more







Artificial Intelligence / Machine Learning for Information Security


Overview

Artificial Intelligence (AI) and Machine Learning (ML) are increasingly being deployed in information security either as a tool for defence, or as a weapon in cyberattacks. AI/ML are powerful tools in helping organisations minimise the impacts of cybersecurity threats. At the same time, it is imperative that AI/ML systems, including the models and algorithms, be protected against cyber-attacks. This course provides a broad introduction to the deployment of AI/ML for information security and related cybersecurity challenges. It explores various machine learning and data mining solutions to cybersecurity threats and problems. The course will review the vulnerabilities of AI/ML systems, risk mitigation solutions, using AI in cybersecurity defence and defending against AI-aided cyberattacks. This course will introduce participants to open source Machine Learning tools such as Jupyter notebook using packages like scikit-learn. Participants will learn the different algorithms in some of most widely adopted machine learning methods such as supervised learning, unsupervised learning and reinforcement learning.


TARGET AUDIENCE

  • Information security/cybersecurity professionals with no background in AI/ML.
  • C-suite personnel such as Chief Information Security Officer, Chief Technology Officer, Chief Information Officer without any strong background in AI/ML.
  • Business executives who are technically inclined and who typically manages technical projects together with technology specialists.
  • Adult learners with some computer knowledge and a keen interest in artificial intelligence, machine learning and cybersecurity.


COURSE OBJECTIVES

This course seeks to equip participants with:

  • An overview of concepts, techniques, and applications of AI/ML in the field of information security including understanding machine learning techniques: supervised, unsupervised & reinforcement learning.
  • An understanding of how AI/ML is used to respond to cyber threats, how to monitor and ensure AI is safe from cyber hackers or security breaches including understanding generative adversarial networks and their use cases.
  • The basics of developing machine learning algorithms and its usage in information security, including understanding of discriminative and generative algorithms as well as the current trends in AI/ML specifically for cybersecurity.
  • The knowledge and skills relating to managing the processes and procedures in projects dealing with the deploying AI/ML for information security.


LEARNING OUTCOMES

Upon completion of this course, the learner will be able to work in partnership with an AI specialist (if the learner is not already one), to:

  • Evaluate the appropriateness of AI/ML for cybersecurity defence and identify their shortcomings including qualitatively analysing malware and anomaly detection using machine learning.
  • Identify security, safety and privacy vulnerabilities of AI systems, including AI-specific cybersecurity risks, and recommend appropriate risk mitigation actions and recognise limitations, if any.
  • Analyze various AI-aided attack techniques and recommend appropriate mitigations or compensating controls.
  • Keep abreast of new developments in AI/ML information security in order to assess the risks, if any, they pose to their organisation.


Course Duration

2 days at 8 hours per day (total 16 hours)


Pre-requisites

  • Foundational cybersecurity and IT knowledge
  • Basic programming skills



COURSE OUTLINE


Topic 1: Artificial Intelligence/Machine Learning for Information Security

  • Security Principles: Confidentiality, Integrity and Availability
  • AI/ML for cybersecurity
    • Use cases of AI/ML applications for cybersecurity
    • Defensive and offensive postures
    • Threat modelling AI systems
    • Harnessing AI for cybersecurity defence
      • Cyber attacker methodology
      • Data gathering techniques
    • AI-powered attacks and corresponding mitigations
      • AI-aided attacks and corresponding mitigation strategies
      • Vulnerabilities and risk mitigation strategies in machine-learning-based AI systems
  • Attacks on machine learning systems
    • History of security attacks on AI/Machine Learning
    • Types of Attacks
    • Exploiting vulnerabilities in machine-learning-based AI systems
    • Engineering risk mitigations for ML-based AI systems


Topic 2: Basics of Machine Learning and AI

  • What is AI and machine learning
  • Types of machine learning
    • Supervised Learning
    • Unsupervised Learning
    • Reinforcement Learning
    • Deep Learning
      • Neural Network
  • Types of machine learning algorithms
    • Regression
    • Classification
    • Clustering and Anomaly Detection
  • Synthetic Data Generation


Topic 3: Intrusion Detection System

  • Overview of Intrusion Detection System (IDS)
  • Build a Neural Network Model for IDS
  • Train and Evaluate the Model
  • Challenges of AI for Security


Topic 4: Application of Machine Learning for Cybersecurity

  • How ML is deployed for cybersecurity
    • Anomaly detection1
    • Intrusion detection and prevention2
    • Malware analysis and detection3
      • Understanding malware
      • From features to classification of malware
      • Demo/hands-on Android Malware Analysis
        • Features
        • Model Selection
    • Phishing detection4
  • ML techniques deployed to fight cyber attacks
    • Supervised learning: Algorithms (eg random forest and SVM5 which can be trained on labeled data to identify specific types of cyber-attacks)
    • Unsupervised learning: Algorithms (clustering and anomaly detection which can identify patterns in data without being specifically trained to do so).
    • Deep learning: Algorithms (eg CNN6 and LSTM7 which can be trained to identify patterns in data and perform complex decision making, such as identifying malware in a file)
    • Reinforcement learning: Algorithms that can learn to make decisions in dynamic, uncertain environments, such as identifying a zero-day exploit in a network.


Topic 5: Machine Learning in Cybersecurity Exercises

  • Installation of Anaconda on Kali Linux8 Setup
  • Hands on Python
  • Data Pre-processing
  • Pandas9, Keras10 and TensorFlow11
  • Examples of Supervised, unsupervised and deep learning
  • Penetration Test with Kali Linux
    • Introduction to Kali Linux
    • Installation and Environment Setup
    • Security Assessment using Kali Linux
    • Penetration Testing Demo


Topic 6: Case Studies

  1. Study of an AI-based Intrusion Detection System (IDS) in detecting and preventing cyber attacks
  2. Analysis of the use of AI-based malware detection and classification techniques in a real-world scenario
  3. Study of the use of AI-based techniques in automating incident response and forensic analysis
  4. Examination of the impact of AI-based techniques on network security, including network traffic analysis and anomaly detection
  5. Exploration of the use of AI-based techniques for secure and efficient management of cloud-based systems


Delivery of Training

  • Seminar style
  • Hands on exercise
  • Online quizzes



1 ML algorithms can be trained to identify patterns of normal network and system behavior, and then flag any deviation from that behavior as potentially suspicious.

2 ML algorithms can be used to analyze network traffic and identify patterns that are indicative of a cyber attack, such as a brute force login attack.

3 ML algorithms can be used to analyze files and identify patterns that are indicative of malware, such as known malware signatures or suspicious code patterns

4 ML algorithms can be used to identify patterns in emails and other communications that are indicative of phishing attempts.

5 SVM or Support Vector Machine is a supervised learning algorithm that can be used for classification and regression tasks. The algorithm finds the best boundary or "hyperplane" that separates the data into different classes. Once the boundary is determined, new data can be easily classified by seeing on which side of the boundary it falls. SVM can be used for both linear and non-linear data.

6 CNN or Convolutional Neural Network is a type of neural network architecture that is particularly well suited to image and video data. CNNs are designed to automatically and adaptively learn spatial hierarchies of features from input data. It does this by applying convolutional filters to the input data, which scan the data for specific patterns or features. CNNs are used in image classification, object detection, and video analysis.

7 LSTM or Long Short-term Memory is a type of Recurrent Neural Network (RNN) architecture. RNNs are neural networks that process sequential data, such as time series data or natural language. LSTMs are particularly useful for processing sequential data because they are able to maintain a "memory" of past information and selectively choose which information to use when making predictions. LSTMs are used in natural language processing, speech recognition, and time series forecasting.

8 Kali Linux is a Debian-based distribution that is primarily used for penetration testing, digital forensics, and security auditing. It comes with a wide array of tools for information gathering, vulnerability scanning, and exploitation. In the context of deploying AI/ML for cybersecurity, Kali Linux can be used to perform reconnaissance, vulnerability scanning, and exploit testing on target systems to generate data for training and testing of the AI/ML models.

9 Pandas is a Python library for data manipulation and analysis. It provides data structures and data analysis tools for handling and manipulating numerical tables and time series data. In the context of deploying AI/ML for cybersecurity, pandas can be used to clean, manipulate and prepare the data for training and testing of the ML models.

10 Keras is an open-source neural network library written in Python. It is a high-level API that allows for easy and fast prototyping of deep learning models. It can run on top of TensorFlow, Microsoft Cognitive Toolkit, or Theano. In the context of deploying AI/ML for cybersecurity, Keras can be used to quickly and easily build and test different deep learning models for tasks such as intrusion detection, malware detection, and phishing detection.

11 TensorFlow is an open-source software library for machine learning. It provides a set of tools for building, training, and deploying machine learning models, including deep neural networks. In the context of AI/ML deployment for cybersecurity, TensorFlow can be used to develop and train machine learning models that can detect and respond to cyber threats, such as malware, phishing attacks, and network intrusions. These models can be integrated into cybersecurity systems to provide real-time threat detection and response capabilities. Additionally, TensorFlow can also be used to analyze large amounts of network and endpoint data to identify patterns and anomalies that may indicate a security incident.



Return to “Our Courses”







AI Ethics and Governance

Design, Develop and Implement Ethical AI Programs and AI and Data Governance Frameworks



Overview

In recent years, the world has seen significant advances in the sophistication and pervasive use of AI. Governments, enterprises and organizations have begun issuing principles, frameworks and recommendations on AI ethics and governance. The rise of a data and AI-driven economy necessitate enterprises, organizations and governments to build new capabilities on data and AI governance among its employees, partners, vendors and any entities that have any dealing in the deployment of AI. This program seeks to provide a practical overview on the process of designing, developing and implementing ethical AI programs as well as AI and data governance frameworks for organizations. It provides real world examples of how AI and data governance frameworks can be developed in practice.


Who should attend

  • ICT professionals including data and AI engineer, data analysts, data scientists
  • C-suite executives including CEOs, CTOs, CDOs12, CMOs13, CLOs14, CCOs15
  • Business executives and government officers (including those with non-technical backgrounds)


Learning Outcomes

At the end of this 1-day16 program, participants will be able to:

  1. Design, develop and implement an AI and data governance framework that can readily be deployed in practice;
  2. Oversee the execution of a sound AI and data governance program to better manage organizational risks while rolling out AI and data programs and initiatives;
  3. Develop key performance indicators for AI and data governance frameworks and programs.


Course Outline17

This course is divided into 2 parts:

  • PART 1: AI ETHICS AND GOVERNANCE
  • PART 2: DATA GOVERNANCE


PART 1: AI ETHICS AND GOVERNANCE


AI Ethics and Governance Framework

  1. Objectives of deploying AI – why ethical AI matters


AI Ethical Principles

  1. Accountability
  2. Accuracy
  3. Auditability
  4. Traceability
  5. Explainability
  6. Fairness
  7. Human centricity and well being
  8. Human rights alignment
  9. Inclusivity
  10. Progressiveness
  11. Responsibility, accountability and transparency
  12. Robustness and security
  13. Sustainability


AI Governance Framework

  • Nature of an AI Governance
    • Distinction between data and AI governance framework
    • Data governance as the foundation of AI governance
  • AI Governance as part of Corporate Strategy
    • AI governance against the broader Governance, Risk & Compliance context
  • Why AI Governance is critical when organizations roll out AI initiatives


Internal Governance Structure and Measures

  • Clear role and responsibilities for ethical deployment of AI
  • Risk management and internal controls


Level of Human Involvement in AI-augmented Decision Making

  • Human-in-the-loop
  • Human-out-of-loop
  • Human-over-the-loop


Operations Management

  • Data preparation
  • Algorithm development
  • Choose model
    • Data for model development
  • Data lineage and provenance record
  • Ensuring data quality
  • Probability-Severity of Harm Matrix
  • Minimizing inherent bias
    • Selection bias
      • Measurement bias
      • Different datasets for training, testing and validation
      • Periodic review and updating of datasets
  • Algorithm and Model
    • Repeatability
      • Regular tuning
      • Reproducibility


Stakeholder Interaction and Communication

  • General disclosure
  • Policy for explanation
  • Interacting with consumers
  • Option to opt-out
  • Communication channels
  • Acceptable user policies
  • Interacting with other organizations
  • Ethical evaluation


Model AI Governance Framework

The need to be:

  • Algorithm-agnostic
  • Technology-agnostic
  • Sector-agnostic
  • Scale and Business Model-agnostic


Use Cases and Case Studies in Industry

  • Facebook
  • Microsoft
  • Cujo AI
  • Mastercard
  • Suade Labs
  • Grab
  • Pymetrics
  • Symphony Ayasdiai
  • MSD


PART 2: DATA GOVERNANCE


What is Data Governance

  • The Business Context
    • Why Data Governance is becoming more critical for organizations
      • The Business Value of Data Governance – Data governance business case
      • Big picture (vision, mission) – define business value of data governance program
      • Business alignment – identify business benefits & metrics, align data governance with business needs
      • Data monetization
        • Data as corporate asset
    • Risk Management & Data Governance
      • Theft, misuse & data corruption
      • Examples of successful data governance strategies
    • Regulatory Compliance: The Challenges of New Regulations
    • Ethical concerns around data use
  • What Data Governance entails
    • Scope of Data Governance & Data Management
    • Policy Framework design and development
      • Determine baseline policy requirements
      • Identify use cases to demonstrate value
    • Holistic approach to data governance
    • Development Methods
      • Federation
      • Core Principles
      • Policies
      • Metrics to measure effectiveness, efficiency
    • Data governance in the cloud
    • Enhancing Trust in Data
    • Classification and access control
    • Data governance versus data enablement and data security
    • Incident handling
    • Data use cases


Elements of Data Governance Framework

  • Tools, People and Processes
    • Data classes, data policies, data cataloguing & metadata management
    • User authorization and access management
    • People’s roles & responsibilities
    • People & processes together: Considerations, issues


Data Life Cycle Management

  • Phases of Data Life Cycle
    • Data creation, cleaning, processing, structuring, modelling, deployment, storage, usage, archiving & destruction
  • Workflow management for data acquisition
    • Data management plan
    • Applying governance over the data life cycle
    • Data assessment and profiling
  • Improving Data Quality
    • Lineage tracking, types of lineage
    • Data quality in big data analytics
    • Data quality in AI/ML models
    • Techniques for data quality management
      • Scorecard
      • Prioritization
      • Annotation
      • Profiling
  • Cost of data quality issues


Operationalizing Data Governance

  • Data governance policy
    • Building internal & external trust
    • Transparency
  • Developing policy structure
    • Engagement & buy in – engagement model
    • Strategy
    • Charters, policies and standards
  • Data governance delivery framework
  • Architecture and design
    • Align and prioritize
    • Identify tools and technology support
    • Operating framework
  • Roles and responsibilities
  • Step by step guidance


Legal and Compliance: Data Protection & Compliance Requirements

  • Personal Data Protection Act
  • Cybersecurity Act
  • Computer Misuse Act


Monitoring of Data Governance Programs

  • Why perform monitoring?
  • Data quality monitoring
  • Data lineage monitoring
  • Program performance monitoring
  • Security monitoring
  • Compliance monitoring
  • Monitoring system
    • Analysis in real time
    • System alerts
    • Notifications
    • Reporting & analytics
    • Customization
    • Monitoring criteria


Building a Culture of Data Privacy & Security

  • Data culture – what it is & why it is important
  • Leadership – starting at the top & the cascading effects
    • Benefits of data governance to businesses
    • Approaches: low profile, central controlled, agile or traditional
    • Maintaining agility
  • Peoples Dimensions
    • Business and technical capabilities needed
    • Roles & responsibilities
    • Team structure & business units
    • Organizational persona and perception
    • Training
    • Communications
  • Scaling the data governance process up and down
    • Data value & sustainability


Data Governance in Practice

  • Roadmapping (short and long term deployment plans)
  • Managing discoverability, security and accountability
  • Assessment (information maturity, change capacity, data environment)
  • Policy management, simulation, monitoring & change management
  • Sustaining Plans
  • Operations and changes
    • Rollout plans
    • Technology solutions
  • Audit & Compliance
  • Case Studies
    • Google Internal Data Governance
    • Microsoft Data Governance Practices



12 Chief Data Officers

13 Chief Marketing Officers

14 Chief Legal Officers

15 Chief Compliance Officers

16 This 1-day course can also be conducted over 2 days where the second day will focus on case studies and practical exercises to apply what has been learnt on Day 1. A typical program is 8 hours per day.

17 Credit is given to IMDA’s Model Framework for AI Governance (Second Edition) which has been released publicly for adoption by both industry and government. See further: http://go.gov.sg/ai-gov-mf-2



Return to “Our Courses”

Course Delivery

Our Training Approach


Training Strategy and Pedagogy


All training should result in organizations performing better. In delivering our courses, we adopt a learning and development framework called PEbAAL which stands for Performance-based, Experiential, Adaptive & Agile Learning.



Performance-based, Experiential, Adaptive & Agile Learning


The PEbAAL framework focuses on driving performance for organizations through experiential, adaptive and agile learning.




Our courses are focused on delivering outcomes and are tailored to suit the needs of organizations especially in the area of problem solving or value creation for organizations.


While most of the courses covered in this program are 1-day courses, the programs can be adapted to suit any duration to suit the needs of the organizations based on the principles of learning agility and flexibility.


Typically, C-suite executives attend very short courses lasting 2 to 3 hours only while middle management as well as the operational teams attend courses with a duration of between 1 to 2 days (8 hours per day).



Mode of Delivery


Our courses are typically tailored to suit the needs of the organizations especially the preferred mode of delivery. We typically adopt a hybrid model of learning including instructor-led synchronous as well as asynchronous training.


We also provide a cloud Learning Management System (LMS) system for organizations that requires such cloud systems to manage their learners’ learning journey. Where organizations have their own LMS, we offer services to integrate our contents and pedagogical strategies with their cloud LMS.




Business and Training Needs Analysis


The implementation of our PEbAAL framework typically starts with a business needs as well as a training needs analysis (TNA) involving both the organization as well as the learners, especially those at supervisory levels.


Upon completion of the TNA, we then embark on the learning program design and development before rolling out the program.


We adopt a 7-Step approach in carrying out a strategic review as well gap analysis for organizations before the commencement of any training programs.




Outcome-based Learning


We collaborate with our partners and clients to offer outcome-based learning that focuses on performance based on the key performance indicators for organizations.


For evaluation of training effectiveness, we focus primarily on organizational or business impact as well securing the returns on investment in training and development as shown in the chart below:




Implementation of Learning Outcomes at the Workplace


Under the PEbAAL framework, learning must ultimately lead to better organizational performance. Learnings must therefore be implemented at the workplace in order to secure the required organizational impact.


In our programs, we typically monitor how the learnings are implemented over a period of time (which varies according to the needs of the organization) as shown in the following chart:


About Us

Our Trainers

Zaid Hamzah

Zaid is an AI/data strategist & practitioner specializing in AI in finance & law, AI & data governance & AI in information security. An AI patent holder, his current practice revolves around driving value creation & higher performance through AI-enabled growth strategies. Zaid is currently an Executive Education Fellow at the National University of Singapore (NUS) School of Computing’s Advanced Computing for Executives centre where he runs programmes on AI Innovation Management, Intellectual Property Rights in AI Innovation & Commercialisation of AI Innovation. He has taught legal AI at the Singapore Management University School of Law. Zaid is deeply involved in AI R&D & innovation. His AI patent relating to risk management in a supply chain context was granted by the Intellectual Property Office of Singapore in December 2023. Author of 9 books spanning law, technology, intellectual property & AI, Zaid has over 35 years of professional experience. He has previously served as (i) Microsoft's Director for intellectual property & commercial software; (ii) Senior Legal Advisor to Singtel’s joint venture with Warner Bros & Sony Pictures; (iii) Chief Regulatory Legal & Compliance Officer at publicly-listed Telekom Malaysia; (iv) Associate, Khattar Wong & Partners (Singapore law firm) & (v) Singapore Government service. Zaid has a law degree from the National University of Singapore & completed his Masters in International Relations at the Fletcher School of Law & Diplomacy, Tufts University on a Fulbright scholarship. Zaid’s current professional practice work involves corporate growth strategy & performance management, intellectual asset management & strategic risk management including cybersecurity risk management.


Garrett Teoh

Garrett is a data scientist and AI strategist with over 18 years of professional experience in leading data and AI projects, from strategy to design, future roadmap design, and delivery rollouts. He has held senior data science appointments with leading global consulting firms (including Accenture as Director of Applied Intelligence, ASEAN). He is currently Senior Director at Capgemini as Head of Data and Analytics for Southeast Asia. Garrett builds data practice and capabilities across the APAC region and has led data innovation programs in various sectors from financial services, consumer retail, telecommunications, healthcare, manufacturing to the public service sectors. Garrett is a Kaggle Masters data scientist with a vision that the art of data science will be the new art of strategy in this digital future. His key mission is to empower leaders to navigate uncertainties and make smarter decisions with human ingenuity, data, and artificial intelligence. He was a biostatistician for a Singapore research centre (Genome Institute of Singapore, part of ASTAR), performing statistical analysis and developing analytical models to decipher and break the genetic code for biomedical breakthroughs and advances. Garrett has co-authored several biomedical research papers and published on top medical journals and volunteered as data science and analytics instructor for schools and universities. Garrett graduated from Nanyang Technological University (2007) with a Master of Science (Bioinformatics) and Monash University (2004) with a Bachelor of Computing (Information and Business Systems).



What We Do

Contact

Email Us

To contact us regarding our resources and course offerings, email
Zaid Hamzah (Mr), our Founder and lead trainer at [email protected].


Join Our Network

Be Part of Our Mailing List