Statements (70)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:hospital
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Darktrace
|
gptkbp:analyzes |
gptkb:software
User Behavior Data Breaches Incident Reports Access Logs Security Incidents Network Vulnerabilities Phishing Attempts Malware Samples |
gptkbp:career_assists |
Policy Development
Compliance Audits |
gptkbp:collaborates_with |
gptkb:Police_Department
IT Departments Security Teams External Auditors |
gptkbp:communication |
Stakeholders
|
gptkbp:conducts |
Risk Assessments
Penetration Testing Forensic Analysis Security Assessments Tabletop Exercises |
gptkbp:created |
Security Policies
|
gptkbp:develops |
Incident Response Plans
Response Strategies Security Frameworks Security Metrics Threat Models Automated Solutions |
gptkbp:engages_in |
gptkb:charity
Continuous Learning Public Speaking Research Projects |
gptkbp:has_skill |
gptkb:Artificial_Intelligence
gptkb:Company gptkb:software_framework Data Analysis |
https://www.w3.org/2000/01/rdf-schema#label |
Cyber AI Analyst
|
gptkbp:improves |
Incident Response
|
gptkbp:is_a_tool_for |
AI Algorithms
SIEM Systems |
gptkbp:is_evaluated_by |
Security Posture
Security Tools Vulnerability Assessments Third-Party Risks |
gptkbp:maintains |
gptkb:document
|
gptkbp:monitors |
Network Traffic
Compliance Standards |
gptkbp:participates_in |
gptkb:software
Incident Management Threat Hunting Threat Intelligence Sharing Security Conferences Incident Response Drills |
gptkbp:provides |
gptkb:Research_Institute
Recommendations Insights Training Sessions |
gptkbp:railway_line |
Junior Analysts
|
gptkbp:recognizes |
Anomalies
|
gptkbp:reports_to |
Chief Information Security Officer
|
gptkbp:supports |
gptkb:software
Business Continuity Planning Data Protection Initiatives |
gptkbp:utilizes |
Big Data Technologies
Threat Intelligence Platforms Cloud Security Tools |
gptkbp:works_with |
Security Data
|