Next Generation of End point security protection with Machine learning

IT Security is keeping CXOs up at night across the globe. 10, even 5 years ago, the network was the perimeter for Enterprises . No longer. The endpoint is the now the last line of defense against Security attacks. Endpoint IDs and devices form the new perimeter today. Traditional security solutions such as Antivirus, Data leak prevention solutions based on static and contained information such as MD5 signatures cannot cope with ever growing security threats affecting end points. AI /ML based solutions which help identify, learn and provide superior detection opens up a new opportunity in end point security. We, as a group of passionate security / ML researchers will like to share the learning and opportunity in applying ML in new generation security solutions.

 
1 favorite thumb_down thumb_up 1 comment visibility_off  Remove from Watchlist visibility  Add to Watchlist
 

Outline/Structure of the Case Study

- New Perimeter for Enterprises and Challenges

- Current solutions and Limitations

- ML Opportunities

- Our experience with ML application in security

- Quick demo

- Road ahead

- Q&A

Learning Outcome

- Understanding on Enterprise security and threats

- Application of ML in security

- Our experience and learning

Target Audience

Enterprise customers, Security Practitioners, AI / ML Enthusiasts

Prerequisites for Attendees

General understanding of IT world, ML understanding and appreciations, Security basics

schedule Submitted 1 month ago

Public Feedback

comment Suggest improvements to the Speaker
  • Dr. Vikas Agrawal
    By Dr. Vikas Agrawal  ~  1 week ago
    reply Reply

    Dear Santhosh: Thanks for your interesting proposal. The topic is interesting. Can we please add information to the proposal regarding

    1. Which of the speakers will be covering what part of the talk, and

    2. What topics will be covered for how long,

    3. What specific algorithms do you plan to discuss, and what datasets have you used with those algorithm pipelines?

    In addition, it will really help if we have a video of you and your team introducing the topic or from your previous speaking engagements posted with the proposal, please. Warm Regards, Vikas