Name
The Semantic Abyss: Architectural Constraints and Effective Application of LLMs in Security
Description

LLMs perform semantic reasoning over patterns, while threat detection requires causal reasoning over system states. This architectural mismatch creates specific deployment challenges. Transformer architectures excel at pattern recognition but face structural constraints with causal inference and mechanistic understanding.

This session focuses on creating a shared understanding where LLM architecture aligns with security tasks versus where it faces fundamental limits. Learn which use cases leverage LLM strengths appropriately (threat intelligence summarization, documentation, policy interpretation) versus which require causal approaches (novel threat detection, behavioral analysis, attack chain reconstruction).

Attendees leave with practical evaluation criteria for AI security tools and implementation strategies that reduce analyst workload.

Themes
Geopolitics & Digital Sovereignty, Cyber Threats & Attacks
Date & Time
Wednesday, February 25, 2026, 9:30 AM - 10:00 AM
Session language
English
Theater
Theater 1

*Please note that you register for a session through the general registration.

Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.