Difference between revisions of "Cyber Security Data Breaches Fight With AI"

From IIW
Jump to: navigation, search
 
Line 16: Line 16:
 
'''Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps: '''
 
'''Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps: '''
  
[[file:Tu3H27.png|700px]]
+
[[file:Tu3H27.png]]

Latest revision as of 06:49, 31 October 2018

Cyber Security Data Breaches Fight with AI


Day/Session:Tuesday 3H

Convener:Andreas Wehowsky

Notes-taker(s): Sofie Kubel (CenSec)


Tags for the session – technology discussed/ideas considered:

AI for threat detection, sensor networks


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:

Tu3H27.png