AI & ML Enhanced Attacks
Facebook Twitter LinkedIn

AI & ML Enhanced Attacks

Combined Session
Wednesday, May 15, 2019 12:00—13:00
Location: AMMERSEE II

Devil's in the Details: AI, Bad Guys, & Messy Data

All the information that is needed to find and stop bad actors from entering our financial system already exists and is available to you today; it’s just buried in terabits of messy, unstructured data all over the internet. For those performing investigations and evaluating risk, this needle in a stack of needles problem is huge and growing: Unstructured data already dominates the web (growing exponentially year over year), and the traditional technology these departments use cannot keep up.

Recent developments in natural language processing technology (NLP), the field of AI that focuses on human language, have, for the first time, made it possible for automated systems to find and deliver identity-relevant intelligence hidden in unstructured textual data. These innovations unlock a new world of actionable insight, providing much-needed ammunition in the fight against frauds, money-laundering, financial crime and terrorism.

Key takeaways:

- All the information financial institutions need to sort criminals from customers exists; it's just buried in unstructured text and spread throughout public and private data
- The traditional identity verification technology financial institutions use can only leverage structured text, allowing many criminals to freely use the world's financial system to support criminal enterprise
-Innovations in natural language processing technology (NLP), the field of AI that focuses on human language, have finally made it possible for automated systems to find and deliver identity-relevant intelligence hidden in unstructured textual data.
-These innovations unlock a new world of actionable insight, providing much-needed ammunition in the fight against fraud, money-laundering, financial crime, and terrorism.

Devil's in the Details: AI, Bad Guys, & Messy Data
Presentation deck
Devil's in the Details: AI, Bad Guys, & Messy Data
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Chris Mack
Chris Mack
Basis Technology
As VP of Product, Text Analytics, Chris sets the direction for Basis Technology’s flagship Rosette text analytics platform. He has a deep and broad understanding of trends in text analytics...

Outsmarting AI

One can think of many arguments of why machine learning (ML) is a game changer in the field of cybersecurity. In fact, today, many ML applications already exist to protect our systems from attacks in more intelligent ways than before. However, have you considered that your own ML model can be the direct target of attacks? This talk elaborates on the topic of adversarial attacks in ML; How they work and how you can defend against them. 

Key takeaways:

Outsmarting AI
Presentation deck
Outsmarting AI
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Frederic Stallaert
Frederic Stallaert
ML6
Frederic is a versatile, broad minded data engineer, passionate about machine learning and artificial intelligence. As a machine learning engineer & AI strategist at ML6, he works on a variety...

Trusting Your AI

The huge promise offered by AI, and particularly machine learning, has led to an explosion in uptake of AI methods applied to a wide variety of business problems. However, machine learning and the data to which it is applied can be extremely complex, resulting in opaque systems that are not understood by their creators and not trusted by their users. In this talk, I will discuss approaches that can improve trust in AI systems, focussing in particular on explainability (how and why did the system produce this output?) and robustness (how can the system be exploited, and can we defend against such attacks?).

Key takeaways:

- Deploying AI comes with its own unique set of risks and challenges

- Your AI system will be of no use if the relevant stakeholders do not trust it

- AI systems can be gamed and exploited in surprising and subtle ways

Trusting Your AI
Presentation deck
Trusting Your AI
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Richard Tomsett
Dr. Richard Tomsett
IBM
Richard has been part of the Emerging Technology team in IBM Research since February 2016, where he specialises in AI and data science applications. He has worked on a broad variety of client...
Subscribe for updates
Please provide your email address