{"guid":"598ea856-2834-429c-a6bb-6e56c89b589e","title":"Agentic Cyber Defense with External Threat Intelligence","subtitle":null,"slug":"sps25-56457-agentic-cyber-defense-with-e","link":"https://talks.python-summit.ch/sps25/talk/QNWFTD/","description":"This talk will detail how to integrate external threat intelligence data into an autonomous agentic AI system for proactive cybersecurity. Using real world datasets—including open-source threat feeds, security logs, or OSINT—you will learn how to build a data ingestion pipeline, train models with Python, and deploy agents that autonomously detect and mitigate cyber threats. This case study will provide practical insights into data preprocessing, feature engineering, and the challenges of adversarial conditions.","original_language":"eng","persons":["Jyoti Yadav"],"tags":["56457","2025","sps25","Data Science \u0026 More","Aula","sps25-eng"],"view_count":89,"promoted":false,"date":"2025-10-17T15:30:00.000+02:00","release_date":"2025-10-20T00:00:00.000+02:00","updated_at":"2026-04-02T12:30:08.192+02:00","length":1546,"duration":1546,"thumb_url":"https://static.media.ccc.de/media/conferences/sps25/56457-598ea856-2834-429c-a6bb-6e56c89b589e.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sps25/56457-598ea856-2834-429c-a6bb-6e56c89b589e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sps25/56457-598ea856-2834-429c-a6bb-6e56c89b589e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sps25/56457-598ea856-2834-429c-a6bb-6e56c89b589e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/sps25-56457-agentic-cyber-defense-with-e","url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_title":"Swiss Python Summit 2025","conference_url":"https://api.media.ccc.de/public/conferences/sps25","related":[],"recordings":[{"size":16,"length":1546,"mime_type":"audio/opus","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-10-20T04:40:06.673+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/opus/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_opus.opus","url":"https://api.media.ccc.de/public/recordings/92746","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"},{"size":204,"length":1546,"mime_type":"video/webm","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-10-20T08:48:21.696+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/webm-hd/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/92793","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"},{"size":71,"length":1546,"mime_type":"video/webm","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-10-20T08:46:02.263+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/webm-sd/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/92792","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"},{"size":23,"length":1546,"mime_type":"audio/mpeg","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-10-20T04:40:02.927+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/mp3/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/92745","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"},{"size":55,"length":1546,"mime_type":"video/mp4","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-10-20T04:39:59.189+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/h264-sd/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_sd.mp4","url":"https://api.media.ccc.de/public/recordings/92744","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"},{"size":158,"length":1546,"mime_type":"video/mp4","language":"eng","filename":"import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-10-20T04:33:03.667+02:00","recording_url":"https://cdn.media.ccc.de/events/sps25/h264-hd/import-56457-eng-Agentic_Cyber_Defense_with_External_Threat_Intelligence_hd.mp4","url":"https://api.media.ccc.de/public/recordings/92714","event_url":"https://api.media.ccc.de/public/events/598ea856-2834-429c-a6bb-6e56c89b589e","conference_url":"https://api.media.ccc.de/public/conferences/sps25"}]}