Machine Learning: Data Protection’s Next Frontier
Thursday, January 24, 2019
11:00 am New York / 4:00 pm London
Machine learning, artificial intelligence and deep learning are terms that many IT security professionals are bombarded with when it comes to identifying and protecting their sensitive data. Yet many are asking these important questions:
- What's the difference between machine learning and these other terms?
- How can they help my organization comply with numerous data privacy/security challenges?
Join Ovum Analyst Maxine Holt and TITUS Senior Vice President of Strategy Mark Cassetta as they discuss the differences in these emerging technologies. Maxine and Mark will also cover key factors to consider when deciding whether machine learning is an approach you should introduce in your data protection strategy. And, if it is, how do you start?
Maxine Holt, Research Director, Ovum
close this window
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.
Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.
Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.
Mark Cassetta, Senior Vice President, Strategy, TITUS
close this window
Mark Cassetta oversees the product lifecycle from concept to implementation to customer success. He is passionate about customer advocacy and developing long-term partnerships with global customers. Since joining TITUS in 2012, he has held positions in marketing, business development and corporate strategy. He has more than a decade of experience across application development and enterprise software, managing projects within large-scale technology transformations. Prior to joining TITUS, Mark was a Senior Technology Consultant at Accenture, managing projects within large-scale technology transformations.
Bernd Steinwender, Head of Product Management, NTS Retail
close this window
Bernd is currently the Head of Product Management at NTS.
His career at NTS Retail started 2001 when he was working as a technical engineer. After that he became a project manager for many telco projects he then moved forward to the key account management. With this background he was appointed to become the Head of Product Management.
The educational background includes finalizing a higher technical school in electrical engineering and a graduate in Computer science at the JKU – Johannes Kepler University Linz in 2000..
Katharine Hulls, Vice President Marketing, Celebrus Technologies
close this window
As VP Marketing for Celebrus Technologies, Katharine is responsible for global marketing and communications, both direct to end-users and via a worldwide network of partners. This responsibility includes the development and execution of joint marketing activities with key partners, messaging and proposition creation, product marketing, digital marketing, content marketing and analyst relations.
Katharine has over 20 years’ marketing management experience with a strong focus on data and analytics software and services providers. Before joining Celebrus in July 2011, Katharine was Head of Marketing, EMEA for Experian Marketing Services which encompasses brands such as CheetahMail, QAS, Hitwise and Mosaic. Earlier during her tenure at Experian, Katharine was also Head of Marketing for CheetahMail across EMEA and UK/Ireland.
Prior to her three years at Experian, Katharine worked for predictive analytics software vendor SPSS, before their acquisition by IBM, where she led and reshaped the UK Marketing team and was part of the EMEA Marketing Management group. Previous to that, Katharine was responsible for marketing communications across EMEA and APAC for web security company Websense, and before that she held a variety of global and EMEA marketing management roles at industry analyst Gartner. Katharine started her marketing career at Sony.
Katharine holds a BA (Hons) from the University of London and the Chartered Institute of Marketing’s Postgraduate Diploma.
Peter Dorrington, European Head of Customer Insight, TeleTech Consulting
close this window
Peter is a specialist in information strategy, big data and customer analytics. He has formed and led a high performing analytics team in an Analytics Centre of Excellence and worked with a wide range of organisations across Europe. Peter has supported senior executives in preparing strategies and plans for the exploitation of big data and analytics as well as led governance and project offices of large scale analytics deployments in both traditional and digital environments and across multiple sectors.
San Zaw, Head of Pre-Sales, Asia at TIBCO Software Inc.
close this window
San Zaw is the Director of Solutions Consultants in Asia at TIBCO Software. Based in Singapore, San leads the regional pre-sales teams across South East Asia, Greater China, and Korea, and is responsible for the solution sales business growth in the Asia region.
He is a practitioner in Contextual Event Processing and Digital Services, and works with Asia’s leading Financial Services Institutions and Communications Service Providers on architecting game-changing solutions, and delivering differentiated customer experiences.
A seasoned veteran in the Telecommunications industry, San is a regular speaker and thought leader at financial and mobility innovation circles. His interests include helping enterprises monetize on their digital ecosystem, exposing businesses to the API economy, and advocating of live behaviour and lifestyle monetization with Fast Data (live insight-to-action).
San brings over two decades of experience in the field of InfoComm Technology and built a track record in solving complex business challenges for enterprises ranging from Telco, Banking, Transportation & Logistics, Healthcare, Gaming, to Defense and Statutory bodies. During his career at TIBCO, he has helped spearhead the development of the business in the emerging markets across Asia.
Prior to TIBCO, San has worked with Deutsche Telekom AG on tele-commerce initiatives, and with StarHub Ltd where he helped build the managed services consulting practice.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Inside of Windows is a methodology called Encrypting File System. It works on individual files or folders, rather than at the whole disk level like BitLocker does.
Microsoft is doing something concrete about container security with the release of the Microsoft Application Inspector, a cross-platform tool whose primary objective is to identify source code features in a systematic and scalable way.
One threat actor is taking advantage of the current problems with Citrix ADC/Netscaler for their own advantage.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.