IOT Security and Risks. How Machine Learning Can Mitigate
Discuss a number of challenges that exist in identifying compromises in IoT environments. We will then discuss in detail the AI and ML-based analytics and deployment methodologies that can be used to identify compromises in this area. We will show several examples of compromises and how they were identified with AI and Machine Learning algorithms..
About Pete Nicoletti
Pete has 31 years of progressive responsibility in the deployment, marketing, sales, product development, engineering design, project implementation and operation of information technology, IaaS/SaaS/PaaS, cloud, data center operations, the entire spectrum of security technologies, compliance frameworks, Global Security Deployments and operations and Managed Security Service Provider services and operations.
Click or Tap for Tickets and Sponsorship