The Devil Inside

  • Date 06 Jun 2019

The Devil Inside

06 Jun 2019, 13:20 - 13:45

Tech Talks
Language:
English

Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data security and user privacy.

Learning Outcomes:

  1. Learn about effective ML-based threat detection methods applied on network data at scale.
  2. Gain knowledge into various evasion techniques adopted by adversaries and how can ML help uncover and circumvent them.
  3. Understand the importance of combining various ML techniques such as anomaly detection, clustering, graph analysis to detect new attacks and extract useful intelligence.
  4. Understand the types of "actionable intelligence" that ML can help us derive from large network data to minimise critical response time in prioritising and mitigating attacks.
  5. Learn best practices to upgrade technical intelligence with manual and automated ML methods useful to both defenders and Law enforcement for takedowns.

 

Contributors

  • Tim Bandos

    Speaker

    Vice President, Cybersecurity

    Digital Guardian

    Tim Bandos is Vice President of Cybersecurity at Digital Guardian. He has over 15 years of experience in the cybersecurity realm with a heavy focus...

Business Issues covered

  1. What will this session help you to do?
    • Build a robust cyber response and resilience strategy
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.