Jennifer Reif
Cyber Sleuth: Finding Hidden Connections in Cyber Data
#1about 6 minutes
Understanding the complexity of modern cybersecurity threats
Cybersecurity involves diverse domains and multi-step attack chains that require compiling data from multiple sources to prevent breaches.
#2about 6 minutes
Why attackers think in graphs, not lists
Attackers exploit interconnected pathways to hop between systems, while defenders often focus on static lists of permissions, creating a strategic disadvantage.
#3about 6 minutes
Modeling connected data with graph databases
Graph databases use nodes, relationships, and labels to create a holistic view of a network, making it easier to surface hidden connections.
#4about 6 minutes
Getting started with Neo4j and the Cypher query language
Learn how to load data into Neo4j using dump files or the APOC library and write basic `CREATE` and `MATCH` queries with the Cypher language.
#5about 7 minutes
Investigating a user's direct and indirect access
A live demo shows how to use Cypher to trace a user's access from direct machine permissions to multi-hop group memberships.
#6about 5 minutes
Visualizing threats with rule-based styling in Bloom
Use Neo4j Bloom to visually explore the graph with natural language queries and apply rule-based styling with algorithms like PageRank to highlight critical assets.
#7about 5 minutes
Analyzing the blast radius of a compromised account
Discover how to find the shortest attack path to a high-value target and visualize the full blast radius of a single compromised account.
#8about 3 minutes
Resources for learning more about Neo4j
Find resources to continue learning, including a GitHub repository with the dataset, Neo4j sandboxes, and the Graph Academy.
#9about 16 minutes
Q&A on graph databases for cybersecurity
The speaker answers audience questions about required skills, tracking malware, and integrating machine learning with graph databases for threat detection.
Related jobs
Jobs that call for the skills explored in this talk.
Information Security Officer - Part-time (w/m/d)
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
Full Stack Developer (all genders welcome)
ROSEN Technology and Research Center GmbH
Osnabrück, Germany
Senior
TypeScript
React
+3
Matching moments
36:24 MIN
An introduction to graph analytics for software systems
Data Science on Software Data
03:23 MIN
Why graph technology was embedded into the Kusto engine
From Tables to Graphs in Minutes: Supercharging Kusto Graph Analytics with AI-Powered Development
18:30 MIN
AI demo for generating cybersecurity graph models
From Tables to Graphs in Minutes: Supercharging Kusto Graph Analytics with AI-Powered Development
01:43 MIN
Understanding graph databases and the Cypher query language
Putting the Graph In GraphQL With The Neo4j GraphQL Library
06:30 MIN
Representing complex data with knowledge graphs
Large Language Models ❤️ Knowledge Graphs
09:27 MIN
Understanding the fundamentals of graph databases
Martin O'Hanlon - Make LLMs make sense with GraphRAG
00:28 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
05:11 MIN
Querying connected data with Cypher in Neo4j Browser
Putting the Graph In GraphQL With The Neo4j GraphQL Library
Featured Partners
Related Videos
Graphs and RAGs Everywhere... But What Are They? - Andreas Kollegger - Neo4j
From Tables to Graphs in Minutes: Supercharging Kusto Graph Analytics with AI-Powered Development
Prof Smoke
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
The attacker's footprint
Antonio de Mello & Amine Abed
Putting the Graph In GraphQL With The Neo4j GraphQL Library
William Lyon
You can’t hack what you can’t see
Reto Kaeser
How to Cause (or Prevent) a Massive Data Breach- Secure Coding and IDOR
Anna Bacher
Plants vs. Thieves: Automated Tests in the World of Web Security
Ramona Schwering
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Cloud Software Engineer - Graph Analytics
Neo4j, Inc.
Charing Cross, United Kingdom
£59K
Intermediate
API
C++
Neo4j
NoSQL
+9

{"@context":"https://schema.org","@graph":[{"@context":"https://schema.org/","@type":"JobPosting","@id":"#jobPosting","title":"Senior Threat Data Infrastructure Engineer
Recorded Future's Insikt Group
Remote
Senior
Bash
Perl
Linux
Python
+2

{"@context":"https://schema.org","@graph":[{"@context":"https://schema.org/","@type":"JobPosting","@id":"#jobPosting","title":"Cybersecurity Lead
Deciphex & Our Group
Remote
Senior
Linux
SharePoint
Amazon Web Services (AWS)
Scripting (Bash/Python/Go/Ruby)

Cybersecurity Engineer / Analyst (VAPT | DFIR | Red Team | Posture Assessment)
Nets-international Communication
Croydon, United Kingdom
Intermediate
API
Bash
NMap
Azure
Python
+7

Data Engineer (Databricks, Neo4j)
Datamatics Technologies
Paris, France
Remote
Senior
ETL
Azure
Neo4j
Spark
+7


Senior Solution Engineer (Strategic & Enterprise Customers)- Amsterdam
Neo4j
Remote
Senior
ETL
Java
Neo4j
NoSQL
+4

