Posted on
in Presentations
Advances in AI are creating opportunities for both defenders and attackers. For defenders, in hands of a malicious actor(s), AI poses significant risk. Hear the practitioner, research and technology perspective on a framework of uses of AI by defenders and attackers. Learn how to use AI countermeasures to protect yourself. In addition, learn how to attack your own AI using a newly released open source library.
Learning Objectives:
1: Learn how AI can proactively detect anomalies in security.
2: Learn about threat intelligence.
3: Discuss how to initiate appropriate actions while updating the analyst.
Learning Objectives:
1: Learn how AI can proactively detect anomalies in security.
2: Learn about threat intelligence.
3: Discuss how to initiate appropriate actions while updating the analyst.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Participants
Koos Lodewijkx
Participant
Vice President and CTO of Security Operations and Response (SOAR), IBM Security
Share With Your Community