Date: 1st March 2018
Location: The Vintry, Abchurch Yard,
Off Abchurch Lane, London, EC4N 5AX
Time: 5pm – 7pm
Predict Future Cyber Attacks
We are really pleased to have former Orbitz CISO & co-founder of Kenna Security, Ed Bellis presenting how machine learning, predictive modelling, and big data techniques are being used to provide powerful, actionable forecasts for customers based on their own assets and vulnerabilities.
The latest exploit prediction capabilities are taking cyber threat forecasting to a new level of accuracy and giving IT security teams a head start on seeing likely attacks before they happen.
Please register for the event below.
Date: 1st March 2018
Location: The Vintry, Abchurch Yard,
Off Abchurch Lane, London, EC4N 5AX
Time: 5pm – 7pm
Predict Future Cyber Attacks
We are really pleased to have former Orbitz CISO & co-founder of Kenna Security, Ed Bellis presenting how machine learning, predictive modelling, and big data techniques are being used to provide powerful, actionable forecasts for customers based on their own assets and vulnerabilities.
The latest exploit prediction capabilities are taking cyber threat forecasting to a new level of accuracy and giving IT security teams a head start on seeing likely attacks before they happen.
Please register for the event below.
Date: 1st March 2018
Location: The Vintry, Abchurch Yard,
Off Abchurch Lane, London, EC4N 5AX
Time: 5pm – 7pm
Predict Future Cyber Attacks
We are really pleased to have former Orbitz CISO & co-founder of Kenna Security, Ed Bellis presenting how machine learning, predictive modelling, and big data techniques are being used to provide powerful, actionable forecasts for customers based on their own assets and vulnerabilities.
The latest exploit prediction capabilities are taking cyber threat forecasting to a new level of accuracy and giving IT security teams a head start on seeing likely attacks before they happen.
Please register for the event below.
Agenda
- What we mean by AI
- Why context is important
- A view into predictive of cyber risk management
- Q&A
- Drinks and Networking