Data Swamps to Data Lakes - Visualizing the Void of Security Audit Data

Logo
Presented by

Jake King, CEO & Cofounder, Cmd

About this talk

"In this talk, we will discuss detection of three well-defined security problems "adversarial user behavior, lateral movement and insider threat detection" using a relatively untapped data set: shell and session commands. We'll discuss machine learning (ML) techniques needed to analyze this data, present research key findings and describe the effects and mitigations of bias to achieve higher accuracy. Additionally, we will explore techniques for safeguarding ML models based on this data.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (108)
Subscribers (17979)
(ISC)² Security Congress channel contains digital content of activities at (ISC)2's Flagship conference event. You'll find keynotes, sessions and related items.