The AI Potential
Facebook Twitter LinkedIn

The AI Potential

Combined Session
Thursday, September 26, 2019 13:30—14:30
Location: Emerald 3

Consumer Privacy vs. Artificial Intelligence

Modern cybersecurity threats have evolved into very effective disinformation campaigns based on what they know about you. What can we collectively do to protect our consumers and our democratic institutions that we rely upon? Hint: the solution is more than just technology.

Privacy laws are antiquated

Key takeaways:

  • Governments are too slow to respond
  • Attackers are using AI to data mine your information and target you for disinformation campaigns
  • We need to protect our online consumers from their own behaviour

Consumer Privacy vs. Artificial Intelligence
Presentation deck
Consumer Privacy vs. Artificial Intelligence
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Kevin Murphy
Kevin Murphy
Rylem Consulting
Kevin was the VP of Cybersecurity Operations and Governance at IOActive.com, a retired US Air Force intelligence officer, and the former Director of Windows Security Architecture at Microsoft with...

Panel: Protecting Customer Data through APIs and Machine Learning

The prevalence of API Attacks increasing more and more, and most all go unnoticed until it is far too late. However, many have been very visible lately including recent attacks on Instagram, Verizon, and Facebook. Many of the Security and DevOps leaders we speak to will tell us they: 1. don’t know if they are under attack, 2. don't know how many APIs they have, and 3. don't have detailed visibility into API activity once authentication has occurred. 

Machine Learning can be used to counter the exponential rise and evolution of API attacks. By leveraging machine learning, an organization can analyze normal API traffic and behaviors to detect anomalies and bad actors. Many identity based attacks (for example: stolen OAuth tokens) can go months before being discovered by conventional access policies. With machine learning, these nuanced attacks are stopped before customer data can be exfiltrated, edited, or deleted.

- What are the most common API attacks today
- An overview of how Machine Learning works
- How Machine Learning is the best first line of defense against API attacks
- How dynamic ML behavioral analysis can find attacks faster and with more precision than traditional access policies

Allan Foster
Allan Foster
ForgeRock
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of...
Nathan Lau
Nathan Lau
Federal Bureau of Investigation - Seattle Division
Nathan is an FBI Special Agent and has been a member of the FBI Seattle Cyber Task Force since 2009. When he isn’t busy educating and helping Washington companies on how to better-protect...
Kevin Murphy
Kevin Murphy
Rylem Consulting
Kevin was the VP of Cybersecurity Operations and Governance at IOActive.com, a retired US Air Force intelligence officer, and the former Director of Windows Security Architecture at Microsoft with...
Joe Zanini
Joe Zanini
Ping Identity
Joe is a Solutions Architect with Ping Identity specializing in IDaaS, MFA, and API Security. He also has considerable expertise with complex hybrid architecture implementations for workforce and...
Subscribe for updates
Please provide your email address