Machine Learning: Data Protection’s Next Frontier
Thursday, January 24, 2019
11:00 am New York / 4:00 pm London
Machine learning, artificial intelligence and deep learning are terms that many IT security professionals are bombarded with when it comes to identifying and protecting their sensitive data. Yet many are asking these important questions:
- What's the difference between machine learning and these other terms?
- How can they help my organization comply with numerous data privacy/security challenges?
Join Ovum Analyst Maxine Holt and TITUS Senior Vice President of Strategy Mark Cassetta as they discuss the differences in these emerging technologies. Maxine and Mark will also cover key factors to consider when deciding whether machine learning is an approach you should introduce in your data protection strategy. And, if it is, how do you start?
Maxine Holt, Research Director, Ovum
close this window
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.
Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.
Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.
Mark Cassetta, Senior Vice President, Strategy, TITUS
close this window
Mark Cassetta oversees the product lifecycle from concept to implementation to customer success. He is passionate about customer advocacy and developing long-term partnerships with global customers. Since joining TITUS in 2012, he has held positions in marketing, business development and corporate strategy. He has more than a decade of experience across application development and enterprise software, managing projects within large-scale technology transformations. Prior to joining TITUS, Mark was a Senior Technology Consultant at Accenture, managing projects within large-scale technology transformations.
Bernd Steinwender, Head of Product Management, NTS Retail
close this window
Bernd is currently the Head of Product Management at NTS.
His career at NTS Retail started 2001 when he was working as a technical engineer. After that he became a project manager for many telco projects he then moved forward to the key account management. With this background he was appointed to become the Head of Product Management.
The educational background includes finalizing a higher technical school in electrical engineering and a graduate in Computer science at the JKU – Johannes Kepler University Linz in 2000..
Katharine Hulls, Vice President Marketing, Celebrus Technologies
close this window
As VP Marketing for Celebrus Technologies, Katharine is responsible for global marketing and communications, both direct to end-users and via a worldwide network of partners. This responsibility includes the development and execution of joint marketing activities with key partners, messaging and proposition creation, product marketing, digital marketing, content marketing and analyst relations.
Katharine has over 20 years’ marketing management experience with a strong focus on data and analytics software and services providers. Before joining Celebrus in July 2011, Katharine was Head of Marketing, EMEA for Experian Marketing Services which encompasses brands such as CheetahMail, QAS, Hitwise and Mosaic. Earlier during her tenure at Experian, Katharine was also Head of Marketing for CheetahMail across EMEA and UK/Ireland.
Prior to her three years at Experian, Katharine worked for predictive analytics software vendor SPSS, before their acquisition by IBM, where she led and reshaped the UK Marketing team and was part of the EMEA Marketing Management group. Previous to that, Katharine was responsible for marketing communications across EMEA and APAC for web security company Websense, and before that she held a variety of global and EMEA marketing management roles at industry analyst Gartner. Katharine started her marketing career at Sony.
Katharine holds a BA (Hons) from the University of London and the Chartered Institute of Marketing’s Postgraduate Diploma.
Peter Dorrington, European Head of Customer Insight, TeleTech Consulting
close this window
Peter is a specialist in information strategy, big data and customer analytics. He has formed and led a high performing analytics team in an Analytics Centre of Excellence and worked with a wide range of organisations across Europe. Peter has supported senior executives in preparing strategies and plans for the exploitation of big data and analytics as well as led governance and project offices of large scale analytics deployments in both traditional and digital environments and across multiple sectors.
San Zaw, Head of Pre-Sales, Asia at TIBCO Software Inc.
close this window
San Zaw is the Director of Solutions Consultants in Asia at TIBCO Software. Based in Singapore, San leads the regional pre-sales teams across South East Asia, Greater China, and Korea, and is responsible for the solution sales business growth in the Asia region.
He is a practitioner in Contextual Event Processing and Digital Services, and works with Asia’s leading Financial Services Institutions and Communications Service Providers on architecting game-changing solutions, and delivering differentiated customer experiences.
A seasoned veteran in the Telecommunications industry, San is a regular speaker and thought leader at financial and mobility innovation circles. His interests include helping enterprises monetize on their digital ecosystem, exposing businesses to the API economy, and advocating of live behaviour and lifestyle monetization with Fast Data (live insight-to-action).
San brings over two decades of experience in the field of InfoComm Technology and built a track record in solving complex business challenges for enterprises ranging from Telco, Banking, Transportation & Logistics, Healthcare, Gaming, to Defense and Statutory bodies. During his career at TIBCO, he has helped spearhead the development of the business in the emerging markets across Asia.
Prior to TIBCO, San has worked with Deutsche Telekom AG on tele-commerce initiatives, and with StarHub Ltd where he helped build the managed services consulting practice.
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
A joint analysis from Kenna Security and the Cyentia Institute finds that enterprises are getting better at patching vulnerabilities, specifically by focusing on critical flaws as opposed to trying to fix very problem that is published.
Microsoft's latest bug-hunting program is targeting the company's Azure DevOps platform, which looks to make software development more secure.
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
A security researcher has found another flaw in Intel's SGX software than can allow an attacker to escalate administrative privileges within an infected machine.
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.
An interview with Steve Grobman, CTO of McAfee