Artificial Intelligence & Machine Learning
Category

Artificial Intelligence & Machine Learning

Threat actors are always on the prowl for another victim. Luckily the tools used to detect and defeat those attacks are constantly evolving. Join us to learn more about how data from artificial intelligence and machine data can give security professionals the advantage.

Artificial Intelligence & Machine Learning

How to Contain Insider Threats Through User-Centric Machine Learning and AI

Mark Bower - Egress Technologies  •   • 

Start this Session

AI and Machine Learning: More Than Buzzwords?

Sam Curry - Cybereason  •   • 

Start this Session

Analyzing Human & Machine Behavior to Mitigate Account Takeover

Ryan Wilk - NuData Security  •   • 

Start this Session

AI and Machine Learning: More Than Buzzwords?

Chris Testa - Cybereason  •   • 

Start this Session

Using User-Centric Machine Learning to Contain the Insider Threat

Mark Bower - Egress Technologies  •   • 

Start this Session

Handling Threat Intelligence and Hunting Operations with AI

Sridhar Sidhu - Wells Fargo  •   • 

Start this Session

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyberdefense

Session In Development  • 

Apurva Jain - Darktrace  •   • 

Preview this Session

Evolving from Detective to Predictive Insider Threat Monitoring

Harshil Doshi - Forcepoint  •   • 

Start this Session

How Financial Institutions Can Use Customer Identity & Behavior to Reduce Payments Fraud & Friction

Maxim Shifrin - IBM  •   • 

Start this Session

AI for Security: The Ghost in the Machine (Learning)

Giovanni Vigna - Lastline  •   • 

Start this Session

Artificial Intelligence and Machine Learning: How They Both Intersect with Cybersecurity

Randy Sabett - Cooley LLP  •   • 

Start this Session

Artificial Intelligence (A.I.) and the Dawn of the Self-Defending Network

Nicole Eagan - Darktrace  •   • 

Start this Session

Session Contributors

Alex Niu

Director of Solution Engineering, DataVisor

Read Bio
Antonio Moreno

Global Business Director, Security and Biometrics, Nuance

Read Bio
Apurva Jain

Regional Sales Manager, Darktrace

Read Bio
Chris Testa

Regional Vice President, Cybereason

Read Bio
Christopher Bontempo

VP Security Marketing, IBM Security

Read Bio
Dena Bauckman

VP of Product Management, ZixCorp

Read Bio
Diana Kelley

Cybersecurity Field CTO, Microsoft

Read Bio
Ed Ferrara

VP and Principal Analyst, Forrester Research

Read Bio
Eric Bucher

Field Solutions Engineer, Cequence Security

Read Bio
Giovanni Vigna

Co-founder and CTO, Lastline

Read Bio
Gleb Esman

Senior Product Manager, Fraud Analytics and Research, Splunk

Read Bio
Guru Bhat

GM technology & Head of Engineering, PayPal

Read Bio
Harshil Doshi

Security Strategist, Forcepoint

Read Bio
Jade Catalano

Sr. Product Manager, Splunk

Read Bio
Jim Apger

Sr Security Architect, Splunk

Read Bio
Justin Fier

Director of Cyber Analysis and Intelligence, Darktrace

Read Bio
Kumar Ritesh

Senior Vice President - Cyber Security, Antuit

Read Bio
Mark Bower

General Manager and CRO, Egress Technologies

Read Bio
Matthew Joseff

Minister of Reality, Senior Security Specialist, Splunk

Read Bio
Maxim Shifrin

Trusteer Technical Product Manager for Pinpoint Solutions, IBM

Read Bio
Michael Sherwood

Director of Technology and Innovation, City of Las Vegas

Read Bio
Mustafa Rassiwala

Sr. Director of Products, Lastline

Read Bio
Naveen Gurusiddaiah

Head - Technical Services, Micro Focus, India

Read Bio
Nicky Dewhurst

Director, Darktrace

Read Bio
Paul Cordero

Modeling Architect, Brighterion

Read Bio
Randy Sabett

Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

Read Bio
Ryan Stolte

Founder & CTO, Bay Dynamics

Read Bio
Ryan Wilk

VP Customer Success, NuData Security

Read Bio
Sam Curry

Chief Security Officer, Cybereason

Read Bio
Shaked Vax

Trusteer Products Strategist, IBM Security

Read Bio
Shirley Inscoe

Senior Analyst, Aite Group

Read Bio
Sridhar Sidhu

Senior Vice President - Enterprise Information Security, Wells Fargo

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.