What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
Machine Learning (ML), Artificial Intelligence (AI), and cybersecurity are paramount for businesses today. In fact, the three technologies hold the most weight when they are working in tandem. ML and AI are clear staples in cybersecurity. Both intelligences are at the forefront of virus prevention and threat detection as they have the ability to augment traditional antivirus and firewall protection pipelines to enable tight data protection. Interlocking ML and AI with cybersecurity is critical if you want to survive and thrive in the enterprise, and the impact they are having on the industry has only just begun.
Organisations need cybersecurity and AI & ML
Following on from their first podcast 'How to Defend Against Ransomware in 2022', Sophos turn to Dr Eric Cole, Founder and CEO at Secure Anchor Consulting, to discuss the impact of AI and ML on cybersecurity. Sharing their expertise this time is Joshua Saxe, Chief Scientist at Sophos. Joshua draws on his eponymous keynote at the 2021 AMTSO Testing Town Hall to explore burning questions such as:
- Why do vendors need to have scientific transparency when claiming the use of AI in their technologies?
- How is AI positively impacting the work of security officers and cybersecurity as a whole, especially since AI has been crowned the 'snake oil' of the twenty-first century?
- How well will AI automate work currently performed manually within SOCs?
- What is the best advice for organisations and businesses leaders when it comes to integrating and ensuring you are getting the most out of AI and ML in cybersecurity strategies?
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101