Jennifer Reif
Cyber Sleuth: Finding Hidden Connections in Cyber Data
#1about 6 minutes
Understanding the complexity of modern cybersecurity threats
Cybersecurity involves diverse domains and multi-step attack chains that require compiling data from multiple sources to prevent breaches.
#2about 6 minutes
Why attackers think in graphs, not lists
Attackers exploit interconnected pathways to hop between systems, while defenders often focus on static lists of permissions, creating a strategic disadvantage.
#3about 6 minutes
Modeling connected data with graph databases
Graph databases use nodes, relationships, and labels to create a holistic view of a network, making it easier to surface hidden connections.
#4about 6 minutes
Getting started with Neo4j and the Cypher query language
Learn how to load data into Neo4j using dump files or the APOC library and write basic `CREATE` and `MATCH` queries with the Cypher language.
#5about 7 minutes
Investigating a user's direct and indirect access
A live demo shows how to use Cypher to trace a user's access from direct machine permissions to multi-hop group memberships.
#6about 5 minutes
Visualizing threats with rule-based styling in Bloom
Use Neo4j Bloom to visually explore the graph with natural language queries and apply rule-based styling with algorithms like PageRank to highlight critical assets.
#7about 5 minutes
Analyzing the blast radius of a compromised account
Discover how to find the shortest attack path to a high-value target and visualize the full blast radius of a single compromised account.
#8about 3 minutes
Resources for learning more about Neo4j
Find resources to continue learning, including a GitHub repository with the dataset, Neo4j sandboxes, and the Graph Academy.
#9about 16 minutes
Q&A on graph databases for cybersecurity
The speaker answers audience questions about required skills, tracking malware, and integrating machine learning with graph databases for threat detection.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
ROSEN Technology and Research Center GmbH
Osnabrück, Germany
Senior
TypeScript
React
+3
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:54 MIN
The growing importance of data and technology in HR
From Data Keeper to Culture Shaper: The Evolution of HR Across Growth Stages
04:17 MIN
Playing a game of real or fake tech headlines
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
03:16 MIN
Improving the developer feedback loop with specialized tools
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
03:16 MIN
The importance of client-side encryption for AI features
AI in the Open and in Browsers - Tarek Ziadé
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
Featured Partners
Related Videos
Graphs and RAGs Everywhere... But What Are They? - Andreas Kollegger - Neo4j
From Tables to Graphs in Minutes: Supercharging Kusto Graph Analytics with AI-Powered Development
Prof Smoke
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
The attacker's footprint
Antonio de Mello & Amine Abed
Putting the Graph In GraphQL With The Neo4j GraphQL Library
William Lyon
You can’t hack what you can’t see
Reto Kaeser
How to Cause (or Prevent) a Massive Data Breach- Secure Coding and IDOR
Anna Bacher
Web-based Information Visualization
Johanna Schmidt
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Recorded Future's Insikt Group
Remote
Senior
Bash
Perl
Linux
Python
+2

Deciphex & Our Group
Remote
Senior
Linux
SharePoint
Amazon Web Services (AWS)
Scripting (Bash/Python/Go/Ruby)

Sentrabyte Digital Solusi
Remote
£18-30K
Senior
API
Linux

aXite Security Tools
Amsterdam, Netherlands
Node.js
Angular
JavaScript

Talent Group
Carballedo, Spain
Senior
Bash
Python
Scripting (Bash/Python/Go/Ruby)



Jane Street
Charing Cross, United Kingdom

Darktrace
The Hague, Netherlands