ISC2 Security Congress 2025 (Oct/2025)
In the ever-evolving cybersecurity threat landscape, offensive security operations are crucial for staying ahead of the latest actors. But how can we become efficient and escalate the continuous emulation of real Tactics, Techniques, and Procedures (TTPs)?
This talk digs into leveraging AI models to augment and scale penetration testing, red teaming, and attack emulation, from reading and interpreting Cyber Threat Intelligence to building and executing threat scenarios.
It covers:
- The applicability of various AI models to offensive security;
- Creating an AI-based workflow from threat intelligence reports through test execution and remediation support;
- Practical examples of scripting and AI to automate steps in the Offensive Security Operations workflow, based on existing frameworks.
ISC2 Security Congress 2025: https://2025isc2securitycongress.eventscribe.net/
This recorded demo demonstrates how a threat actor can leverage AI (in this case, OpenAI's GPT-5) to classify a screenshot as a target either for phishing or password guessing.
This demo illustrates how n8n can be used to deploy a workflow that collects intelligence reports and generates Atomic Red Team test cases from their contents. The video was sped up to save time.
https://events.isc2.org/p/s/augmenting-offensive-security-operations-with-ai-6881
Recording available at the ISC2 Congress website.