Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(National Institute of Standards and Technology (NIST) & U.S. DEPARTMENT OF HOMELAND SECURITY (DHS))
Line 1: Line 1:
[http://www.youtube.com/results?search_query=cybersecurity+ai++artificial+intelligence+deep+learning Youtube search...]
+
[http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence+deep+learning Youtube search...]
  
 
* [[Defense - Anomaly Detection]]
 
* [[Defense - Anomaly Detection]]
Line 5: Line 5:
 
* [[Capabilities]]  
 
* [[Capabilities]]  
  
 +
<youtube>JNAu-wn3y0k</youtube>
 +
<youtube>SiAgnyUc-70</youtube>
 
<youtube>zGBJ7iH0xOw</youtube>
 
<youtube>zGBJ7iH0xOw</youtube>
 
<youtube>ojTz7bOjT6o</youtube>
 
<youtube>ojTz7bOjT6o</youtube>
Line 28: Line 30:
 
<youtube>xG9jazUpEus</youtube>
 
<youtube>xG9jazUpEus</youtube>
  
== Selling & Evaluating ==
 
[http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...]
 
  
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
 
 
* Outcomes evaluation, not processing
 
* Product currently being used, or has been validated in a proof of concept (POC) trial
 
* Interaction with human intelligence
 
 
<youtube>xoBWBNsjWoM</youtube>
 
<youtube>-5dr1DCh_CU</youtube>
 
<youtube>LB6Yk2wh81E</youtube>
 
<youtube>rcG_QL9GWaA</youtube>
 
  
 
== General Cybersecurity ==
 
== General Cybersecurity ==
Line 65: Line 55:
 
<youtube>7ECjQOX2cTw</youtube>
 
<youtube>7ECjQOX2cTw</youtube>
 
<youtube>f6Hp5SQFOXw</youtube>
 
<youtube>f6Hp5SQFOXw</youtube>
 +
 +
== Selling & Evaluating ==
 +
[http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...]
 +
 +
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
 +
 +
* Outcomes evaluation, not processing
 +
* Product currently being used, or has been validated in a proof of concept (POC) trial
 +
* Interaction with human intelligence
 +
 +
<youtube>xoBWBNsjWoM</youtube>
 +
<youtube>-5dr1DCh_CU</youtube>
 +
<youtube>LB6Yk2wh81E</youtube>
 +
<youtube>rcG_QL9GWaA</youtube>

Revision as of 08:19, 28 June 2018

Youtube search...

Darktrace

Youtube search...

Watson

Youtube search...


General Cybersecurity

YouTube search...

National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)

YouTube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence