Machine Learning in Cybersecurity

Nopsec

Machine Learning in cybersecurity webinar presented by Sanja Nedic. THIS WEBINAR COVERED. Core concepts behind machine learning and main types of problems it can solve. Examples of real-world uses of machine learning in security to augment or replace rule-based or heuristic solutions to problems such as spam detection, intrusion detection, malware analysis, vulnerability prioritization, etc. Challenges of building reliable machine learning systems in security space.
Watch Now

Spotlight

Today, cyber attacks are getting increasingly worse and enterprises need to ensure that there are reliable and effective security measures in place. As political tensions continue to rise within the U.S., the potential increase in cyber war grows as well. Keeping up with a constantly changing threat landscape environment does not happen overnight. Enterprise Security refers to the strategy that a company has implemented as safety measures to reduce the risk of unauthorized access to confidential data and information. Enterprise security needs to be an established plan that is consistently worked on and refined.

OTHER ON-DEMAND WEBINARS

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now

OT & IoT Security Case Studies to Ensure Reliable Cyber Resilience

Uptime, disruption-free operations, and availability are important considerations for any OT and IoT security plan. Knowing the threats and ways to mitigate them is only half the battle. The other half involves aligning technology, assets, and knowledge base to secure the entire length and breadth of your business and its digital footprint.
Watch Now

If Cybersecurity Professionals were represented by an Emoji, which one would we be?

TechGig

Two seasoned cybersecurity professionals will discuss the breadth of cybersecurity in today's financial institutions, how this critical defence function operates, and what attributes a cybersecurity professional might need, to be successful in this field. They will also explore some of the recent major cybersecurity incidents from around the globe, and then talk about cybersecurity within HSBC itself.
Watch Now

Spotlight

Today, cyber attacks are getting increasingly worse and enterprises need to ensure that there are reliable and effective security measures in place. As political tensions continue to rise within the U.S., the potential increase in cyber war grows as well. Keeping up with a constantly changing threat landscape environment does not happen overnight. Enterprise Security refers to the strategy that a company has implemented as safety measures to reduce the risk of unauthorized access to confidential data and information. Enterprise security needs to be an established plan that is consistently worked on and refined.

resources