The Internet is a warzone. Any business with a digital presence needs to protect itself from threats that exist in cyberspace. In this presentation, we’ll show you how to build a real-time anomaly detection system using Sqrrl Enterprise and Apache Spark GraphX to monitor and surface advanced persistent threats and malicious actor attacks.
As in a game of chess, successful use of machine learning techniques against adaptive adversaries, such as spammers and intruders, requires designing the learning algorithms having anticipated the opponent’s response to those algorithms. In this talk, we present techniques to design robust machine learning algorithms for adversarial environments and provide clarifying attack-defense examples.
People living in the Information Age are faced with a conundrum. They wish to be connected on a series of global, interconnected networks but they also wish to protect their privacy and to be left alone…sometimes.
Bad press, FTC consent decrees, and White House reports have all put a spotlight on bad data practices. Data scientists and designers have become increasingly aware of how privacy principles should guide their work. So, the geeks have met the wonks. Now, it’s time for the wonks to meet the geeks and use data analytics to keep pace with burgeoning data volumes, velocities, and innovations.
While the inexorable march of technology does threaten historical notions of privacy, privacy IS very much alive – a shifting, vital conversation society has with itself and its machines. This talk explores the principles of transparency, unlinkability, and intervenability to build a foundation for a design ethos for technologists.