|
|
| Line 123: |
Line 123: |
| | {| class="wikitable" style="width: 550px;" | | {| class="wikitable" style="width: 550px;" |
| | || | | || |
| − | <youtube>t1Swvz2dpUQ</youtube> | + | <youtube>hx1vlorz1w4</youtube> |
| − | <b>"Security: Computing in an Adversarial Environment," Carrie Gates | + | <b>How the Future of Cybersecurity Depends on AI/ML |
| − | </b><br>Apr. 12, 2012: "Security: Computing in an Adversarial Environment," presented by Carrie Gates, CA Labs; moderated by Christopher W. Clifton, Purdue University. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones...and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult. What you'll learn: * The security mindset -- what it is, why it's needed * The social side of security -- usability, adoption, identity, trust | + | </b><br>SparkCognition's Director of Cybersecurity, Rick Pither, discusses the role of artificial intelligence and machine learning in the cyber security landscape. For more information on AI in cybersecurity visit: http://bit.ly/2Vdzj0j |
| − | * A deeper dive on insider threat as a case study -- what it is, how to detect it, how to prevent it Presenter: Carrie Gates, Senior Vice President and Director of Research, CA Labs Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine. Moderator:
| |
| − | Christopher W. Clifton, Associate Professor of Computer Science, Purdue University Dr. Clifton works on data privacy, particularly with respect to analysis of private data.
| |
| | |} | | |} |
| | |}<!-- B --> | | |}<!-- B --> |
| Line 151: |
Line 149: |
| | {| class="wikitable" style="width: 550px;" | | {| class="wikitable" style="width: 550px;" |
| | || | | || |
| − | <youtube>hx1vlorz1w4</youtube> | + | <youtube>t1Swvz2dpUQ</youtube> |
| − | <b>How the Future of Cybersecurity Depends on AI/ML | + | <b>"Security: Computing in an Adversarial Environment," Carrie Gates |
| − | </b><br>SparkCognition's Director of Cybersecurity, Rick Pither, discusses the role of artificial intelligence and machine learning in the cyber security landscape. For more information on AI in cybersecurity visit: http://bit.ly/2Vdzj0j | + | </b><br>Apr. 12, 2012: "Security: Computing in an Adversarial Environment," presented by Carrie Gates, CA Labs; moderated by Christopher W. Clifton, Purdue University. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones...and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult. What you'll learn: The security mindset what it is, why it's needed The social side of security usability, adoption, identity, trust A deeper dive on insider threat as a case study what it is, how to detect it, how to prevent it Presenter: Carrie Gates, Senior Vice President and Director of Research, CA Labs Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine. Moderator: Christopher W. Clifton, Associate Professor of Computer Science, Purdue University Dr. Clifton works on data privacy, particularly with respect to analysis of private data. |
| | + | |
| | + | |
| | + | |
| | + | |
| | |} | | |} |
| | |<!-- M --> | | |<!-- M --> |