Difference between revisions of "Cybersecurity: Evaluating & Selling"
m |
m |
||
| Line 22: | Line 22: | ||
* Interaction with human intelligence | * Interaction with human intelligence | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>xoBWBNsjWoM</youtube> | <youtube>xoBWBNsjWoM</youtube> | ||
| + | <b>Evaluating AI- and ML-Based Security Products | ||
| + | </b><br>Anup Ghosh, Founder and CEO, Invincea Liam Randall, President, Critical Stack, A Division of Capital One Chad Skipper, VP Competitive Intelligence and Product Testing, Cylance | ||
| + | Mike Spanbauer, Vice President of Research and Strategy, NSS Labs With endless AI or machine learning product claims, buyers are left bewildered with how to test these claims. It falls to independent third-party test organizations to develop and update traditional test protocols to test and validate AI and ML product capability claims. This panel will tackle the key issues that third-party testing must address to validate AI and ML security products. | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>-5dr1DCh_CU</youtube> | <youtube>-5dr1DCh_CU</youtube> | ||
| + | <b>How Should We Evaluate Machine Learning for AI?: Percy Liang | ||
| + | </b><br> | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>LB6Yk2wh81E</youtube> | <youtube>LB6Yk2wh81E</youtube> | ||
| + | <b>HH1 | ||
| + | </b><br>BB1 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>rcG_QL9GWaA</youtube> | <youtube>rcG_QL9GWaA</youtube> | ||
| + | <b>HH2 | ||
| + | </b><br>BB2 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
Revision as of 13:46, 6 September 2020
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Evaluation : Procuring
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Radial Basis Function Network (RBFN)
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
|
|
|
|