Hi [[ session.user.profile.firstName ]]

Preventing Threats using Machine Learning, Contextualization and Predictability

With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
Recorded May 21 2015 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Dufour, Senior Director of Security Architecture, Webroot
Presentation preview: Preventing Threats using Machine Learning, Contextualization and Predictability
  • Channel
  • Channel profile
  • 2015 Cyberthreat Defense Report Recorded: May 28 2015 43 mins
    Steve Piper, CEO, CyberEdge and Hal Lonas, CTO, Webroot
    This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
  • Preventing Threats using Machine Learning, Contextualization and Predictability Recorded: May 21 2015 36 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
  • Webroot’s 2015 Threat Brief Preview Recorded: Apr 16 2015 38 mins
    Grayson Milbourne, Security Intelligence Director
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
  • Dimensions of Next Generation Threat Intelligence Recorded: Apr 23 2014 49 mins
    Mike Suby, VP of Research, Frost & Sullivan, Grayson Milbourne, Security Intelligence Director, Webroot
    Join Frost & Sullivan and Webroot as we explore the benefits of a comprehensive approach to detecting threats, and the need for fast and highly accurate automated determinations.
  • Proactive Protection through Real Time Intelligence Recorded: Apr 9 2014 29 mins
    Grayson Milbourne, Security Intelligence Director, Webroot
    Outdated security approaches and stagnant, inaccurate data put your users at risk from today’s sophisticated cyber-attacks. Join us to learn about Webroot BrightCloud Security Services, and discover why companies such as RSA, F5, and Cisco have incorporated them into their solutions. We will also demonstrate how Webroot correlates disparate data on IPs, URLs, Files and Apps to provide highly accurate, next generation threat intelligence that enables our partners to proactively combat today’s advanced, and even previously unknown, threats in real time.
Next Generation Threat Intelligence
Webroot BrightCloud® Security Services redefine online threat intelligence, and enable our partners and customers to proactively protect their users from today's advanced threats even before they're known. Our advanced, self-learning network continuously scans the internet, leaving no place for threats to hide. Data is captured through millions of sensors and threats are identified in milliseconds using behavioral and contextual analysis, meaning we can identify and stop even brand new, previously unknown threats in real time. Learn more about BrightCloud Security Services at www.brightcloud.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Threats using Machine Learning, Contextualization and Predictability
  • Live at: May 21 2015 5:00 pm
  • Presented by: David Dufour, Senior Director of Security Architecture, Webroot
  • From:
Your email has been sent.
or close