Hi [[ session.user.profile.firstName ]]

Information Security Community

  • Date
  • Rating
  • Views
  • Machine Learning and AI for Healthcare Fraud Detection and Prevention
    Machine Learning and AI for Healthcare Fraud Detection and Prevention Aleksandar Lazarevic, Senior Director, Aetna Recorded: May 16 2018 49 mins
    The United States spent around $3.5 trillion or 18% of GDP on healthcare. According to FBI, the amount of this spending lost due to fraud, waste, and abuse (FWA) ranged between $90 billion and $330 billion!

    This talk will offer practical advice on how to effectively organize and join various healthcare data sources such as claim and clinical data, how to set-up the problem, and how to design an effective machine learning solution to identify FWA leads and expedite investigator review using intuitive visualization to understand the risk factors contributing to those leads.
  • The Future of Payment Fraud Prevention
    The Future of Payment Fraud Prevention Rodrigo Camacho, CCO, Nethone Recorded: May 16 2018 35 mins
    Payment fraud prevention tools have existed since the end of the 90s and have improved continuously since. In the last 2 to 3 years we have seen a new paradigm come into the space - machine learning.

    This new technology is perfectly fitted for identifying fraud and is slowly being adopted by the market. Moving forward, using tools like this will no longer be a choice but rather an obligation for merchants. An obligation, as it will be at the origin of a competitive advantage which goes way beyond fraud prevention and will bleed into business intelligence fields.

    In this session, Rodrigo Camacho, CCO at Nethone will walk you through the evolution fraud prevention touching on the following key points;

    How the problem is solved by a large part of the industry today
    The revolution that is happening in the space today
    The halo effect that this revolution is going to have on the rest of business processes
  • Cloud Security - 5 Best Practices To Use in 2018
    Cloud Security - 5 Best Practices To Use in 2018 Rich Campagna and Salim Hafid Recorded: Mar 21 2018 61 mins
    As corporate data moves into cloud applications like Office 365, Box, and Salesforce, organizations are forced to rethink their security posture. Modern threats to cloud data range from unauthorized access to uncontrolled BYO devices. IT leaders need a forward-thinking approach to cloud security and must consider best practices when expanding the enterprise's cloud footprint, including proper identity management, comprehensive visibility, and zero-day control to name a few.

    Join cybersecurity experts Rich Campagna, Bitglass, Chief Marketing Officer and Salim Hafid, Bitglass, Product Marketing Manager for a deeper dive on these cloud security best practices.

    •Explore the tools and training you need to protect data in any application
    •Learn how cloud-first organizations are securing corporate data
    •Gain insights to better enable employee productivity and mobility
  • SD-WAN is Dead. Long Live Secure SD-WAN!
    SD-WAN is Dead. Long Live Secure SD-WAN! Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Mar 20 2018 46 mins
    In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

    This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.
  • Basic Security with Cryptocurrencies
    Basic Security with Cryptocurrencies Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets Recorded: Mar 14 2018 56 mins
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • Securing Permissioned Blockchains
    Securing Permissioned Blockchains David Huseby, Security Maven at Hyperledger Recorded: Mar 13 2018 49 mins
    Multi-party permissioned blockchains present a set of new security challenges for dev ops and system and network administration.

    This webinar will cover why a lot of what we already know from securing N-tier architectures also applies to securing permissioned blockchains. It will also cover what is different and new and discuss strategies for the practical defense of these distributed systems.
  • GDPR's influence on security
    GDPR's influence on security Rob Shapland Recorded: Feb 22 2018 43 mins
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jan 23 2018 35 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Smarter Security: Cyber Resilience, TARA and Red Teaming
    Smarter Security: Cyber Resilience, TARA and Red Teaming Peter Wood and Rob Shapland Recorded: Jan 16 2018 48 mins
    Cyber risk isn't new, but the stakes grow higher every day. An incident is no longer likely to be an isolated event, but a sustained and persistent campaign. There is no single solution that will offer protection from an attack, but a Cyber Resilience strategy can provide a multi-layered approach that encompasses people, processes and technology.

    Pete Wood will talk about eliminating the gap between IT and the business to present a united front against threats. This is a paradigm shift that uses security intelligence to guide decisions and support agility.
  • Big Data Analytics vs Privacy: Risks and Opportunities
    Big Data Analytics vs Privacy: Risks and Opportunities Rob Anderson, Head of Field Operations (Privitar),Tim Hickman, Associate (White & Case) Recorded: Dec 14 2017 58 mins
    Today's modern businesses gain competitive edge and remain innovative by using advanced analytics and machine learning. Utilising big data can build customer loyalty by improving personalised marketing campaigns; optimises fraud detection; and improves products and services by advanced testing. However, the data sets required for advanced analytics are often sensitive, containing personal customer information, and therefore come with an inherent set of privacy risks and concerns.

    This roundtable will cover a few key questions on data utility and privacy:

    - In what ways advanced analytics help businesses gain competitive edge?

    - What is defined as sensitive data?

    - Will GDPR affect the way you're allowed to use customer data?

    - What opportunities are there to utilise sensitive data?

    Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

    Key takeaways:

    - A view of the data protection landscape

    - How to remaining compliant with GDPR when using customer data

    - Use cases for advanced analytics and machine learning

    - Opportunities for maximising data utility in 2018

Embed in website or blog