Posted on
in Presentations
Are you in the process of developing or deploying an ML-based risk analytics engine to prevent identity theft and abuse? Want to better understand what specific ML models do for such use-cases, associated benefits and challenges? Come learn how to define and approach technical and operational requirements based on lessons learned through enterprise experience.
Pre-Requisites: Basic understanding of IAM specific technical controls, identity specific attacks and risk analytics.
Pre-Requisites: Basic understanding of IAM specific technical controls, identity specific attacks and risk analytics.
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community