'Understanding leads to better decision making - faster decision making - which is going to benefit all of us' - Cisco's AJ Shipley on using AI & LLMs for security incident communication

Young Colleagues Working on Computers and Talking at a Workplace
(Image credit: Shutterstock)

At Cisco Live 2024 in Amsterdam, the company unveiled its latest range of solutions for networking, cloud, and cybersecurity.

During his keynote, Cisco’s EVP & GM for Security Collaboration and Business Units, Jeetu Patel, highlighted that fragmented solutions are a thing of the past, and that the cloud environment requires an integrated platform on a “zero trust, with zero friction” basis.

But one of the key issues facing SOCs and CISOs today is not one of cyber defense, but of communication. In particular, communicating the needs, concerns and risks facing security teams to the executive and c-suite level.

This is an area that AJ Shipley, VP, Product - Threat Detection & Response, is very passionate about, and is an area that has excellent use cases for artificial intelligence and large language models (LLM).

Opening up the domain of security experts

Traditionally when responding to a threat or breach, security teams have to translate highly technical indicators, metrics and timestamps into a digestible and succinct report to be passed to the executive level, so that they can understand exactly how the business has been impacted.

This is a time consuming process, especially in the immediate aftermath of a breach, when the time of a security team could be better spent on incident response and data recovery. A fast response is an effective response, and this is where AI and LLMs can save crucial time.

Cisco’s Extended Detection & Response (XDR) platform provides exactly that, Shipley explains, as it can “take those same set of technical indicators and timestamps - different what we call in the industry tactics, techniques, procedures (TTP), credential dumping, or push bombing attack or lateral movement.

“We're able to take those, feed them into a large language model and say, ‘in four paragraphs, tell me what happened,’ and it spits out a very human readable four paragraphs, based on the timestamps.”

Shipley explains that the LLM can identify where an incident occurred, which machines communicated with each other and the connection they used, and what privileges were escalated through the process, providing the security team in seconds with a report that otherwise may have taken hours.

A primary concern of the security team is that the LLM could simplify highly technical language to an extent that compromises the accuracy of its description, but Shipley assures that a non-security audience, “can read it and they will know with a very, very high degree of precision, exactly what happens.”

The metrics involved in the security sector are very important for understanding how and where an attack has occurred, but highly specific industry terminology doesn’t communicate well outside of the expertise.

“I've spent my entire career in the security space. For too long It's kind of been the domain of just the security experts. It's almost kind of been like this black magic if you will, or this like very kind of like secretive club that you have to have a secret handshake to get into.

“I think ultimately at the end of the day, understanding leads to better decision making - faster decision making - which is going to benefit all of us.”

More from TechRadar Pro

Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
AI business data center
"It is literally driving our product development direction" - how Cisco is redefining networking security to better protect against cyberattacks and human error
An abstract image of a lock against a digital background, denoting cybersecurity.
Why AI is playing a growing role in helping SOC teams keep up with cyber threats
Cisco Live 2025
Cisco Live! 2025 - all the news and updates as they happened
Cloud, networking and internet
“That's the experience we have built up over 40 years, to then bring in to the next 40 years” - Cisco’s Chintan Patel on realizing potential of AI and the lessons to learn from the Internet boom
Concept art representing cybersecurity principles
“Everything starts with security" - AWS CISO on how making security simple can be the key to safety
A person holding out their hand with a digital AI symbol.
How will the evolution of AI change its security?
Latest in Pro
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
AI quantization
What is AI quantization?
US flags
US government IT contracts set to be centralized in new Trump order
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Latest in Features
inZOI.
inZOI early access is the most disappointed I’ve been with a game in years
A close up of a xenomorph with Earth reflected on its head in the Alien: Earth TV show teaser
Disney+ celebrates 5 years of streaming with 2025 lookahead – here are 3 movies and shows I can't wait to watch
Samsung Galaxy Z Fold 6 in Paris in front of the Louvre pyramid
I switched to a Samsung Galaxy Z Fold 6 five months ago and I haven’t looked back – here are five things you need to know before buying a foldable phone
iPhone 16 Pro Desert Titanium in hand
I think the rumored iPhone 17 Pro redesign looks great – but is it Apple enough?
AI quantization
What is AI quantization?
Hume AI
What is Hume: Bring emotional understanding to AI-generated voices