Posted on
in Presentations
Are you in the process of developing or deploying an ML-based risk analytics engine to prevent identity theft and abuse? Want to better understand what specific ML models do for such use-cases, associated benefits and challenges? Come learn how to define and approach technical and operational requirements based on lessons learned through enterprise experience.
Pre-Requisites: Basic understanding of IAM specific technical controls, identity specific attacks and risk analytics.
Pre-Requisites: Basic understanding of IAM specific technical controls, identity specific attacks and risk analytics.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community