Are you ready for “cognification”?

“The AI in security market is expected to be valued at USD3.92 billion in 2017 and to reach
 USD34.81 billion by 2025, a CAGR of 31.38%."

 

“Addressing today’s threats requires real-time Artificial Intelligence to scale your team of information security analysts across your entire enterprise.”

 

As one analyst puts it, “The volume of threat data is exceeding the capacity of even the most skilled security professional, and organizations are drowning in a sea of information that continues to grow as rapidly as the threat landscape itself. When organizations see over 200,000 security events every day and don’t have the skills to stay ahead, where do you turn?”

The answer, increasingly, in the use of AI-based solutions. Not only can automated, intelligent systems analyse volumes of data no humans can tackle, but they can spot patterns and anomalies far more quickly too

These abilities not only improve security, they lower its cost by reducing the number of analysts needed to manage the current crop of passive defences.

In combination with human analysts these systems are also far quicker and more accurate in identifying more complex threats and anomalies.

AI solutions now exist in network security, endpoint security, application security, and cloud security. Vendors exist who have applied machine learning to identity and access management (IAM), risk and compliance management, encryption, data loss prevention (DLP), unified threat management (UTM), antivirus/antimalware, intrusion detection/ prevention system (IDS/IPS), and pretty much every other area of cybersecurity – firewall, security and vulnerability management, disaster recovery, DDOS mitigation, web filtering, application white listing, and patch management.

Advanced AI and Machine Learning is helping analysts meet the volume and sophistication of modern attacks, reducing organizational risk, improving visibility and improving SOC teams’ ability to stay ahead of modern threats. 

But with so many vendors claiming AI expertise, how can CISOs evaluate the AI ecosystem? How do vendors differentiate?

The e-Crime AI Forum will cover these and other key subjects for its audience of professionals tasked with safeguarding digital assets and sensitive data. There will be real-life case studies, strategic talks and technical break-out sessions to help end-users understand how these new technologies can be cost-effectively deployed in real-life business situations.

  • Understanding AI, machine learning, deep learning and neural nets

    • What exactly is Artificial Intelligence?

    • What’s the difference between machine learning, deep learning, neural nets, context awareness computing, and natural language processing?

    • What can AI do better than humans and what does it do worse?

  • Evaluating AI and machine learning solutions

    • How do their AI engines differ?
    • What are they good at and what are they bad at?
    • What questions should you ask an AI vendor?
  • AI in core network security

    • Automating asset discovery and network intelligence
    • Is AI plus human analysts the optimum combination?
    • What about the endpoints?
    • AI in zero trust environments
  • AI in alert prioritization and data analysis

    • Separate the signal from the noise
    • Automating incident response
    • Is AI plus human analysts the optimum combination?
    • Automating the SOC
  • AI in identity and access management

    • Detecting Shared Logins and User Credentials
    • Third-Party Access Data Compromise
    • Privileged User Account Abuse
    • Geolocation and Remote Access Security
  • AI’s role in defending against malicious insiders

    • Accurately identify malicious insiders from user behaviours
    • Detecting data snooping
    • Predicting employee departure and preventing data exfiltration
  • Improving web security

    • How many websites do you have? Auditing web presence and applications
    • Advanced web attacks and exploitation
    • Secure web application development
    • Stopping SQL injection and XSS attacks once and for all
  • Deploying AI solutions

    • What is the difference between deploying AI versus conventional solutions?
    • How much training / data do you need for the solution to work?
    • Are AI solutions more difficult to maintain or scale?

Who attends

Job titles

Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
CISO
CISO
CISO
CISO
CISO, Head of Digital Security & Risk
CISO, Head of Information Security
Director , Technical Investigations
Global IS Manager
Chief of Cybercrime Section
Head of Technical Support
Director Enterprise Technology
Head of Group I.T.
Chief Risk Officer
Head of Cybercrime Unit
Global Head of IT Security
CIO
Head of Cybercrime Investigations
Head of Information Security
Head of Information Security
Director Global Investigations
Group I.T. Security Officer
Head of Risk & Resilience
Head of I.T. Security Operations
Director
Group I.T. Audit Manager
Head of Information Security
Group CISO
Global Head of Fraud Investigations
Head of Information Security
Group Infrastructure Manager
Head of I.T.
Global Head of Cyber Intelligence
Head of Payment & Financial Crime
Head of Internal Audit
Head of Fraud Oversight
Group Finance & Compliance Director
Head of Business Risk
Head of Operational Risk Management
Group Data Security Manager
Global Security Manager
Head of I.T. Security
Head of Customer Security
Chief Information Officer
Director of Security
Head of Payments
Head of I.T. Security
Head of Cyber & Investigations
Head of Information Security
Head of Penetration Testing
Global Manager, Service Continuity
Global Head I.T. Governance
Director, Information Security
Chief, Cyber Crimes
Head of Investigations
Chief Executive
Group I.S. Manager
Head of Information Security Risk
Head of Global I.T. Security
Head of Digital Risk
CIO Risk Manager
Head of IT Risk & Control
Director of Risk & Compliance
Head of Emergency Response
Head of Business Controls
Director Of Information Security
Director of Security
Chief Security Officer
Director, Global Security
Global IS Risk Manager
Head of Data Protection
Head of ISAG
Group Fraud Manager
Director
Head of Information Security
Global Security Supervisor
Director Group Risk Management
Global Fraud Risk Controller
Head of I.T. Security
Head of I.T. Security Risk Management
Group Information Security Manager
Head of Informantion Security Risk
Head of Payments & Fraud
Head Cybersecurity Operations
Director Cybercrimes
Global I.T. Security & Compliance
Chief Technology Risk Officer
Head of Specialist Crime
Group IT Security Analyst
Head of Policy & Performance
Head of Internal Audit
Head of Operational Security
Head of Operations & Infrastructure
Head of Cyber Threat Intelligence

Organisations

Trafigura
GE Capital
Babcock International Group
Scotia Gas Networks
Telefónica O2
Bank of America Merrill Lynch
ING
Catella Bank
Channel 4
H&M
BP
John Lewis Partnership
Royal Canadian Mounted Police
Experian
Jordan Cyber Crime Project
Zamir Telecom
John Wiley & Sons
Halma
Zurich Financial Services
Security Service of Ukraine
HSBC
British Medical Association
Romanian Directorate
TUI Travel
Markit
Western Union
Pennant International Group
TSL Education
Liverpool Victoria
The Finance Practice
Camelot Group
Capital One
Noble Group
HSBC
Dixons Carphone
Halma
Ghana International Bank
British American Tobacco
First Rate Exchange Services
Unum Provident
Santander
Rexam
Matalan
John Lewis Partnership
Home Retail Group
Allen & Overy LLP
ITV
Virgin Money
Spamhaus
Rank Group
EveryMatrix
Shop Direct
Sky
QVC
Lloyds Banking Group
General Motors Corporation
Tullett Prebon
Atcore Technology
Department of Homeland Security
Aviva
CIFAS
Premier Oil
HSBC
Rothschild
HSBC
Liverpool Victoria
Permanent TSB
Auto Trader
Public Health England
Selfridges
NBC Universal
Office of Civil Nuclear Security
UBM
Citigroup
SABMiller
Legal & General
Post Office
JD Sports
CERT-UK
Eurostar
Mayer Brown LLP
Swiss Re
UBS
Open University
The Bank of Tokyo - Mitsubishi UFJ
Dixons Carphone
Post Office
JustGiving
Bank of America Merrill Lynch
FIA Pakistan
Norgren
GE Capital
City of London Police
Unipart Group
Heathrow
Inmarsat
Modern Times Group
Ocado
Capital One

Industries

Banking
Industrial Engineering
Industrial Engineering
Oil/Gas
Telecommunications
Banking
Banking
Banking
Media
Retail
Oil/Gas
Retail
National Law Enforcement
Banking
National Law Enforcement
Telecommunications
Retail
Electronic/Electrical Equipment
Insurance
Central Government
Banking
Healthcare
National Law Enforcement
Travel/Leisure/Hospitality
Media
Banking
Aerospace/Defence
Media
Insurance
Banking
Casinos/Gaming
Banking
Mining/Metals
Banking
Retail
Electronic/Electrical Equipment
Banking
Food/Beverage/Tobacco
Banking
Insurance
Banking
Household/Personal Products
Retail
Retail
Retail
Legal
Media
Banking
Charity
Casinos/Gaming
Software
Retail
Media
Retail
Banking
Automobiles/Parts
Banking
Banking
Central Government
Insurance
Central Government
Oil/Gas
Banking
Banking
Banking
Insurance
Banking
Media
Central Government
Retail
Media
Central Government
Healthcare Services
Banking
Food/Beverage/Tobacco
Insurance
Transportation/Shipping
Retail
National CERT
Transportation/Shipping
Legal
Insurance
Banking
Education
Banking
Retail
Transportation/Shipping
Charity
Banking
National Law Enforcement
Industrial Engineering
Industrial Engineering
Regional Law Enforcement
Transportation/Shipping
Transportation/Shipping
Telecommunications
Media
Transportation/Shipping
Banking


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, SW1V 1EQ. UK
Telephone: 0844 415 6752
 

Directions:
Please click here