-
Hands-On AI for Cybersecurity
- Gain practical experience applying machine learning models to pressing security challenges, from intrusion detection to vulnerability analysis.
-
Skills & Community
- Sharpen your coding chops and collaborate with a global network of cybersecurity and AI enthusiasts, students, and corporate innovators.
-
Career-Boosting Prizes
- Compete for prestigious awards, recognition, and job opportunities. A hackathon win can shine on your resume or portfolio.
-
Showcase on the SANS Website
- All AI submissions will be featured on the SANS site, offering visibility to thousands of professionals and potential employers.
-
Developers & Tech Enthusiasts
- Love to build, create proofs of concept, and iterate quickly? This hackathon is ideal for full-stack programmers, data scientists, or hobbyists eager to explore AI in security.
-
Students & Academic Communities
- If you’re an undergrad, grad student, or part of a research lab, this hackathon provides real-world experience that can bolster your academic and professional profile.
-
Companies & Organizations
- Startups, established enterprises, and R&D teams can use this hackathon to:
- Discover new AI-driven techniques for defending data and systems.
- Find promising talent among the participants.
- Foster a culture of rapid innovation.
- Startups, established enterprises, and R&D teams can use this hackathon to:
- Email Contacts:
Feel free to reach out with any questions or collaboration ideas. If you need help brainstorming, debugging, or connecting with other participants, these contacts are here to assist you.
Tools and TechnologiesYou are free to use any tools, technologies, and methods—provided they are open source and can be immediately used by the broader community. This requirement ensures that the entire cybersecurity ecosystem benefits from your innovation. Below is a curated list of potential frameworks and libraries that have inspired successful solutions in the past. Consider integrating, adapting, or even improving upon these ideas for your project:
-
Data Concierge AI (a.k.a. Concierge)
- What It Is: An AI system that only uses the data you provide locally—great for privacy and security-conscious environments.
- Why It’s Useful: Perfect for cybersecurity solutions requiring full control over data handling (e.g., regulated industries or sensitive data sets).
- GitHub Repository: InfoSecInnovations/concierge
-
Continue.dev
- What It Is: An open-source code assistant (similar to GitHub Copilot) that integrates seamlessly into your development workflow.
- Why It’s Useful: Speeds up coding, helps with rapid prototyping, and supports multiple models for customizable AI-assisted development.
- Website: https://www.continue.dev/
-
Fabric
- What It Is: An open-source framework for augmenting human tasks with AI. It uses modular AI prompts that can be mixed and matched.
- Why It’s Useful: Allows you to quickly prototype a variety of AI-driven cybersecurity tools, from threat detection to automated remediation scripts.
- GitHub: danielmiessler/fabric
- Learn More: Fabric Origin Story
-
AI-Terminal-Assistant
- What It Is: A command-line AI assistant that integrates with your terminal.
- Why It’s Useful: Ideal for developers who prefer CLI-based tools, enabling AI-based solutions in a minimalistic environment.
- GitHub: boukeversteegh/ai-terminal-assistant
-
FasterWhisper
- What It Is: A high-performance speech-to-text engine (no mainstream UI yet).
- Why It’s Useful: Potentially transform security operations by automating transcription of threat intelligence briefings, recorded interviews, or incident response calls.
- GitHub: SYSTRAN/faster-whisper
-
Ollama
- What It Is: A powerful platform enabling local AI capabilities across many models.
- Why It’s Useful: Great if your project requires offline or on-premise AI processing for security or compliance reasons.
- Website: https://ollama.com/
-
LLAVA
- What It Is: A computer vision system capable of understanding and interpreting visual data.
- Why It’s Useful: Useful for building AI tools that perform image or video analysis to detect anomalies, malicious activities, or suspicious patterns in visual data.
- GitHub: PKU-YuanGroup/Video-LLaVA
-
PKU-YuanGroup/Video-LLaVA
- What It Is: “Video-LLaVA: Learning United Visual Representation by Alignment Before Projection.” (See arxiv.org PDF)
- Why It’s Useful: Ideal for advanced projects involving deep learning approaches to video analytics in cybersecurity (e.g., anomaly detection in surveillance footage).
- Pick a Tool or Framework: Choose one or more from the list above to get an idea of example tools and then bring your own open-source solution to the table.
- Define Your Cybersecurity Challenge: Are you focusing on threat detection, data privacy, secure DevOps, or something else entirely?
- Prototype & Iterate: Use code assistants like Continue.dev or AI-Terminal-Assistant to quickly develop and test your concepts.
- Open Source & Documentation: Make your project publicly available (e.g., on GitHub) with clear instructions so others can easily adopt, reuse, and contribute to your solution.
- AI-Powered Threat Detection & Incident Response: Build systems that monitor logs, network traffic, or endpoint activity for anomalies, enabling swift detection and automated containment of security threats.
- Automated Incident Response: Integrate a local AI agent (like Concierge) to analyze event data and autonomously take action—e.g., quarantine a compromised server.
- AI-driven Vulnerability Scanning: Combine computer vision (LLAVA, Video-LLaVA) with existing vulnerability databases to flag potential configuration errors or anomalies in hardware setups.
- Interactive Security Dashboards: Use a code assistant to quickly spin up front-end prototypes that visualize threat intelligence, highlight key anomalies, and guide security teams.
- Digital Forensics & Investigation Tools: Leverage machine learning or natural language processing to quickly analyze large volumes of data, reconstruct attack timelines, or identify malicious insiders.
- Automated Penetration Testing & Network Enumeration: Develop AI-driven agents that proactively test networks for vulnerabilities and suggest remediation steps—minimizing manual effort and improving accuracy.
- Predictive Analytics for System Resilience: Use time-series analysis or predictive modeling to forecast system failures or potential attack vectors, helping organizations shore up defenses in advance.
- Automating Cybersecurity Workflows: Streamline repetitive tasks such as patch management, risk assessment, or compliance checks, and reduce human error by integrating AI-based automation.
- Vulnerability Assessment & Zero-Day Detection: Combine AI algorithms with real-time threat intelligence feeds to identify and prioritize vulnerabilities—potentially catching novel attacks before they spread.
- Supply Chain Security & Data Integrity: Employ AI to verify software components, detect tampering, or ensure the integrity of packages and updates across distributed systems.
- Security Education & Awareness: Build interactive AI-driven training platforms or chatbots that educate users on common threats, social engineering tactics, and safe cybersecurity practices.
We can’t wait to see what you’ll build! By combining creativity with cutting-edge AI, you have the potential to make a significant impact on the cybersecurity field—and maybe even take home that top prize. Good luck, and happy hacking!
