AI for the Future of your Business

  •  TYPE: Channel   DATES: May 14 - May 17, 2019
Event Channels

AI for the Future of your Business: Effective, Safe, Secure & Ethical

Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for machine-based automation. To do so, we have had to become more and more focused, sophisticated and somehow limited to narrow knowledge domains, trying to do one single thing as good as it can be done. With AI entering the equation, this task will be taken away from us, eventually causing some kind of relief in an omnipresent cybersecurity skills shortage. There are different angles and aspects to better and comprehensively understand, how AI will change our thinking and daily life as technology professionals.

Sessions:

Artificial Intelligence & Machine Learning in Cybersecurity 101

Date: Tuesday, May 14, 2019 Time: 09:00-13:00 Location: BODENSEE II

AI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This workshop will introduce the various AI technologies and describe the areas where they can be applied today.   It will include real life examples of how it is being used.   It will also discuss the limitations of the current state of the art and some of the research into overcoming these.  The session...

AI for the Future of your Business

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: AMMERSEE II

AI for the Future of your Business
AI covers a range of technologies and some of these are sufficiently mature for commercial exploitation and some are not.  This session will describe the areas where they can be applied today. It will include real life examples of how it is being used.   It will also discuss the limitations of the current state of the art and some of the research into overcoming these. 

Use Case: AI Powered Conversational Experience at the Singapore Art Museum

Panel: What are the Secrets to Successful AI?
You have AI. She has AI. It’s 2019. We’re all going to have AI powering conversational experiences with our customers. But there’s a problem. How do you make your AI stand out from your competitors’ AI?

The Identity Problem of Chatbots

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: AMMERSEE II

The Identity Problem of Chatbots
Chatbots are alternatively being hyped as a great opportunity and a great disappointment. There is a plethora of options on how to build and design chatbots and a lot of platforms where they can run. To make things even more complicated there is a lot of confusion around the lines between chatbots and artificial intelligence and how the two intersect. This talk aims to clarify the range of concepts and give you a conceptual framework that will make it much simpler to guide strategic...

Intelligent Chatbots - Different Approaches and their Use Cases
We go through different approaches to chatbots development. The presentation consists of a few Jupyter notebooks with code samples. We show and compare a few examples of neural networks architectures that can be used for chatbots. Based on our experience and presented architectures we give some advice on which architecture should be used where. Key Takeaways know the chatbots taxonomy and difference between each what is important to build an intelligent chatbot what kind of...

Panel: Chatbot Identity - Challenges and Possible Solutions
Chatbots are replacing humans in many domains from online sales assistants to online learning.  However, they can often be very stilted and mechanical in their interactions – how can we give a chatbot a more human persona?  As with all systems, using a chatbot involves a level of mutual trust and this depends upon identity.  How can the human be sure that the identity of the chatbot and how can the chatbot be sure of the identity of the human?  This panel will...

The 6 Major Ethical Issues of AI

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: AMMERSEE II

The 6 Major Ethical Issues of AI
This will provide a short introduction to ethics and why it is relevant to AI.  It will outline the ethical problems that Artificial Intelligence raises.  Ethics considerations can help to better identify beneficial applications while avoiding harmful ones.  In addition, new technologies are often viewed with suspicion and mistrust.  This can unreasonably inhibit the development of technologies that have significant beneficial potential.  It will describe six areas...

AI's Ethical Problems and Blockchain's Solutions
Blockchain is, simply put, a public list. And because AI uses a list to predict things then we can see that AI and Blockchain fit nicely together. This is lucky because AI is presenting problems Blockchain helps solve. Is it fair that Facebook control the most powerful AI system on the planet -- a system built with end-user data? Blockchain helps decentralize AI and it allows users to be compensated for their data. It also allows the monetization of open source. And that's important stuff...

Panel: Integrating Ethics into AI Research, Development, and Adoption
Digital Transformation rewuires leaders to gain a new, informed perspective on the implications of technology and security on business decisions. AI driven tools lack transparency and may lead to unexpected consequences, which makes it complex to evaluate them and requires, more than ever, interdisciplinary expertise. In this panel, we will try to initiate a conversation that we haven´t really had so far, but is critical fort he success of our bsuiness and technology strategies.

Identity Is at the Center of Zero Trust, Not the Network

Date: Wednesday, May 15, 2019 Time: 11:00-12:00 Location: CHIEMSEE

Identity Is at the Center of Zero Trust, Not the Network

Panel: Placing Identity at the Center of Security Designs & Models
What does it mean to have identity at the center of your security infrastructure? At its core, it says that we have to build our solutions to always question who someone is, what they want to do. We can no longer blindly trust that just because they come from a known location those questions no longer matter. At the center of those questions is a critical concept: identity. At the center of those questions is one crucial idea: identity. Our solutions must continually validate the identity...

Privacy — Do We Actually Care?

Date: Wednesday, May 15, 2019 Time: 12:00-13:00 Location: AMMERSEE I

Privacy — Do We Actually Care?
This session will highlight how we rationalize or perceive data-privacy, why we care and actually don't, and what we expect from companies when it comes to our own data.  This session will explore and explain how understanding individuals’ expectation about privacy, and the principle of behavioral economics will have an enormous impact on how companies conduct business today and more importantly, tomorrow. 

LIVE Demo of an Interoperable Personal Data Receipt Ecosystem – the Kantara Initiative Privacy Control Panel System

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition

Date: Wednesday, May 15, 2019 Time: 14:30-15:30 Location: CHIEMSEE

Rethinking Trust in Cloud Platforms: Secure and Trusted Out-Of-Band Data Acquisition
The complexity and sophistication of modern malware are evolving rapidly. Malwares today are able to exploit both hardware and software to infiltrate systems and tamper with data used for management. The revelation of several attacks on host machines, highlights that anything with shared resources can be attacked.  In cloud environment, data management is done by a centralised server that maintains the state of each platform. However, this is not...

Navigating NIST Sp-800-63-3 Thanks to Practical xAL Cheat Sheets
Trust. Trust is the most fundamental notion in every one of our business interactions, whatever our needs are: low or high assurance. Do you know that, by June 2019, NIST SP-800-63-3 will celebrate its second birthday? It is a framework that improved lots of points over the previous LoA scale and gained a lot of maturity thanks to implementers, researchers, and confrontations to other Trust frameworks. Still you may find it hard to find your way wherever you try to be a compliant IAL2...

Fight Cyber Risks with Risk Aware DevOps Engineers!
To keep a customer’s trust risk and security is key for Financial Enterprises like ING. At the same time we want to work Agile in an BizDevOps format, because we know it gives us the increased velocity and quality of software we need. And this way of working leads to happier and therefore more productive employees. A separate security team that has to check all software before it goes into production would be a huge bottleneck, especially if you have...

The Anatomy of an IAM Cyber Kill Chain

Date: Wednesday, May 15, 2019 Time: 15:30-16:30 Location: CHIEMSEE

The Anatomy of an IAM Cyber Kill Chain
In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to...

The POWER HACKER – Don’t Let the Lights Go Out – A Look Inside the MIND of a Hacker
Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes. This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to...

At the Intersection of API Security, Cybersecurity and IAM: the Next Wave of Intelligent Solutions
Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of...

Stealing the Crown Jewels

Date: Wednesday, May 15, 2019 Time: 17:30-18:30 Location: ALPSEE

Stealing the Crown Jewels
Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi. This talk looks at the result from penetration testings of PAM systems at major enterprises and...

Panel: Leveraging Privileged Access Management Solutions for Enterprise
Compromising privileged accounts can lead to loss of valuable information. Therefore,  Privileged Access Management is becoming a top priority for enterprises.  Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific...

EIC Boot Camp: Cloud first in the Real World: Facilitating a Hybrid and Integrative IT Landscape that is Secure and Compliant

Date: Friday, May 17, 2019 Time: 13:30-16:00 Location: AMMERSEE I

CIOs, CISOs, Cloud architects and IT pros alike face the same challenges when moving into the cloud: They need to fulfill their business requirement and secure their infrastructure with a sustainable approach for enterprise hybrid cloud security. They have to protect public and private cloud environments together with their on-premises services. We look at the following challenges: How to develop your own tailored "Cloud First" approach? How does a company change its IT strategy...

Quick Links

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00 $2625.00 S$3360.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00