DiscoverThe SecureWorld Sessions
The SecureWorld Sessions
Claim Ownership

The SecureWorld Sessions

Author: SecureWorld

Subscribed: 20Played: 68
Share

Description

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more.

Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
41 Episodes
Reverse
In this episode, we are speaking with Aaron Ansari, Vice President of Cloud One - Conformity at Trend Micro. What are the remote work security gaps exposed by the COVID-19 shift to the cloud? What are common factors in cloud security misconfigurations? With cybersecurity features built into many cloud platforms, do you need a third-party or external cloud security solution? We explore these questions and more. Says Ansari: "Cloud providers have an enormous, robust, complex set of services that are available for organizations and people to build infrastructure and environment in their cloud. It's fantastic; it's very rich; it's very diverse. And it covers all the things that you would want to see covered, from database to computer storage to traffic and network and routing, and all that sort of content. But what's lacking there is the diverse skill set needed to cover all those services. So when you're building a cloud environment, you might be a developer. And as a developer, you are specifically going through and trying to build an application, but you don't have a real deep understanding of database and you don't have a real deep understanding of computers. And so on and so forth. You're sitting there, building this environment by yourself, and you're just clicking. Yes, I need this. Yes, I need this. Next, next, next, next, next, and boom, you've got an environment. Now, it might be functional for what you're trying to do. But the reality is that you just took a blueprint that you think kind of works and you tried to build your house, and you didn't build your house correctly. It might look like something that it's supposed to on the outside, but on the inside, you put something a little too heavy on one wall and the whole thing comes crumbling down." Resource links: •  Trend Micro Cloud Security solutions overview: https://www.trendmicro.com/en_us/business/capabilities/solutions-for/cloud.html •  Cloud One - Conformity: https://www.trendmicro.com/cloud-one-services •  New SecureWorld VIRTUAL conferences: https://www.secureworldexpo.com/events •  SecureWorld Remote Sessions webcast briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
In this episode, we are speaking with noted author Joseph Steinberg. His works on cybersecurity have been read by millions of people, including a security certification exam study guide and recently the "Cybersecurity for Dummies" book. We cover a variety of topics: AI in cybersecurity; the rise of the insider threat risk; translating risk to executives or end-users; IoT security; and more. RESOURCE LINKS: •  Trend Micro's Incident Response Guidebook: https://www.trendmicro.com/vinfo/us/security/news/managed-detection-and-response/cyberattacks-from-the-frontlines-incident-response-playbook-for-beginners • Joseph Steinberg's official website: https://josephsteinberg.com •  SecureWorld Remote Sessions webcast briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions •  Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
Insider Threat Risk

Insider Threat Risk

2020-06-1644:25

In this episode, we discuss in depth the cybersecurity risks that come from insiders. What does a malicious insider threat look like? How about the accidental insider threat? How can executives become accidental insider threats? And more. Hear insights from these experts:  •  Dr. Larry Ponemon of the Ponemon Institute •  Sudeep Venkatesh, Chief Product Officer, Egress •  John Grim, Head of Research, Development, and Innovation, Verizon Threat Research Advisory Center •  Dr. Chris Pierson, Founder & CEO, BlackCloak Also, Trend Micro shares mitigation techniques for PowerShell-based malware and attacks. Links from the show: •  Trend Micro paper, "Tracking, Detecting, and Thwarting PowerShell-based Malware and Attacks": https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/tracking-detecting-and-thwarting-powershell-based-malware-and-attacks • SecureWorld web conference, "Are We Taking the Insider Threat Seriously Enough?": https://www.secureworldexpo.com/resources/insider-threat-giving-the-attention-it-deserves • Fireside chat with Dr. Larry Ponemon of the Ponemon Institute (podcast): https://www.secureworldexpo.com/resources/larry-ponemon-interview-podcast •  SecureWorld Remote Sessions webcast briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions •  Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
In this episode, we are speaking with Rob Morgus, Director of Research and Analysis at the U.S. Cyberspace Solarium Commission. He is the lead author on a new white paper which uncovers the parallels between the COVID-19 pandemic and the cyber threat landscape. He also explains new cybersecurity priorities the Commission published as a result of lessons from the coronavirus response. Says Morgus: "The bottom line is that the United States on cybersecurity—and now we're experiencing something similar—has experienced a number of wake up calls over the last decade, decade and a half. In 2014, hacking OPM, and we didn't really improve the state of our government cybersecurity in 2015. In 2016, we saw Russia turn off the power grid in Ukraine, and we haven't really taken massive steps to improve the security of our power grid. We saw NotPetya and WannaCry in 2017-2018; we haven't really done much to lock down our critical systems. And now we're experiencing the pandemic, which is a massive disruption. These have all been opportunities for us to wake up and smell the roses, and we continually sort of hit the snooze button. And the main contention, and if you take away one thing from the pandemic white paper, it is that now is the time to invest. We've had plenty of opportunities to say, hey, we need to do this. We should have the foresight to do so, and now I think we're seeing that it's more urgent than ever." Will we heed the wake up call from COVID-19? Also, Trend Micro shares ransomware mitigation techniques for Maze ransomware. SHOW LINKS:  •  Trend Micro research on Maze ransomware mitigation techniques: https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/security-strategies-for-enterprises/ent-threats-ransomware •  White Paper #1 (June 2020) by U.S. Cyberspace Solarium Commission: https://drive.google.com/file/d/1wCHVtIFlw84uZIPOTZe2nkdGau15fLAQ/view •  March 2020 U.S. Cyberspace Solarium Commission Report: https://www.solarium.gov/report •  SecureWorld Remote Sessions webcast briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions •  Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
In this episode, we are speaking to "The Privacy Professor" Rebecca Herold, one of the authors of the new NIST Privacy Framework and host of her own privacy and cybersecurity podcast. She unpacks the privacy and security challenges of coronavirus contact tracing, which relies on massive amounts of personal data to work. "I mean, you can't preserve privacy if you can't control the data," Herold says. "And to control the data, you have to have security applied to it in many different ways and layers, making sure only those who need access can get access, protecting the data from being captured as it's being transmitted through different types of pathways and other methods." Also, Trend Micro shares ransomware mitigation techniques for the new Nefilim ransomware. RESOURCE LINKS: •  Trend Micro research: "Nefilim Ransomware Threatens to Expose Stolen Data":  https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/nefilim-ransomware-threatens-to-expose-stolen-data • Rebecca Herold's podcast: https://www.privacyguidance.com/radio.html • Rebecca Herold's LinkedIn page: https://www.linkedin.com/in/rebeccaherold/ •  SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions •  Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
In this episode, we are speaking to Shawn Tuma, cybersecurity and data privacy attorney with Spencer Fane LLP. He says the two key elements of cyber resilience are an incident response plan and cyber insurance. But do you know what your cyber insurance policy covers? Tuma says cyber insurance policies can lead to unpleasant surprises during an incident if you do not understand your policy. @ 14:30 Tuma says: "You're just tuned up and ready to go on a moment's notice. You get alerted you have an incident. And while you're not exactly excited about that, you're glad that you have this incident response plan in place. You activate your plan, you begin execution. Only then do you discover that not only does your company have cyber insurance, but that insurance policy specifically dictates what vendor or professional service firms you can use. And none of those approved vendors are the ones that you included on your external Incident Response Team. Okay, that's a problem." Also, Trend Micro uncovers new types of industrial Internet of Things (IIoT) cyberattacks in some fresh research. See the link below. RESOURCE LINKS: •  Trend Micro research: "Threats and Consequences: Attacks on Smart Manufacturing Systems": https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-and-consequences-a-security-analysis-of-smart-manufacturing-systems • Shawn Tuma's resource site: https://shawnetuma.com •  SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions •  Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
In this episode, we are speaking to CNN Analyst and retired U.S. Air Force Col. Cedric Leighton. The real world and the cyber world are converging. Criminal elements are increasingly turning to cybercrime. And nation-state hackers continue to look for what is next. @ 34:49 Leighton says: "We will know that the Chinese, the Russians, the North Koreans, even the Iranians are going to continue to be active in cyberspace. They will take advantage of new work modes that may outlast the coronavirus pandemic. And those new work modes lead to new vulnerabilities. There's new vulnerabilities will lead to new methods of exploitation by these and other bad actors." Also, Trend Micro research uncovers geopolitics and cyber attacks against the oil and gas industry. RESOURCE LINKS: Trend Micro research on Geopolitics and Cyber Attacks: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industry Col. Cedric Leighton on LinkedIn: linkedin.com/in/cedricleighton/ SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions Deep dive Web Conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization.
In this episode, we are speaking to CISO and Holistic Health practitioner Jothi Dugar about the impact of cybersecurity stress on mental health. @9:04 Dugar says: “You kind of have to be connected 24 by 7 because you have to know what’s going on. You have to do incident response, you’re on call, you’re probably working more than 40 hours a week. And you have to be on top of it with your A game on at all times to deal with cyber incidents or outages or breaches at any time in the day or night.” She explains how mindset and reframing can help lower your stress level and reduce your risk of burnout. Also, Premiere podcast partner Trend Micro uncovers how leadership and boards view cloud adoption differently than, say, security engineers. Check out their discussion in the video below. RESOURCE LINKS: Trend Micro #LetsTalkCloud video: https://www.youtube.com/watch?v=fNzgkI9iVAU Jothi Dugar cybersecurity wellness feedback form: http://www.jothidugar.com/speaker-feedback SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions Deep dive Web Conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization.
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode, we are speaking to Neal O'Farrell, Founder of the PsyberResilience Project. He started a movement to develop a mental health baseline among cybersecurity professionals and to tackle the issues of cybersecurity stress and burnout. He says burnout hurts your organizational security posture and is causing us to lose important people and widen the talent gap. Also, what are the top causes of cybersecurity burnout? @7:55: “One thing that's come on very strong is unrealistic expectations. This I hear repeatedly. They think we know all this stuff, they think that we're capable of working 12, 14, 16 hour days there. They think that we constantly know about the new threats before any one else, that we have unpacked and understand all these vendor tools, that we win all the time. There's no kind of theory of acceptable losses in security. So unrealistic expectations certainly is up there in the top five." RELATED LINKS: • Trend Micro updates “Know the Symptoms, Protect Your Device While Working from Home": https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/know-the-symptoms-protect-your-devices-while-working-from-home • The PsyberResilience Project - Take the Survey: https://www.thepsyberproject.com • SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions • Deep dive Web Conferences: https://www.secureworldexpo.com/resources?cat=web-conferences
In this episode, we speak to attorney Michael Simon of cybersecurity and data privacy law firm XPAN Law Group. We cover the historic move to Zoom and other remote work tools. What are the privacy, legal, and security risks of this new digital workforce? How can you avoid certain lawsuits against your organization by optimizing remote work tools? @6:26 Simon says: "This is not the death knell for privacy. I see people write up that privacy's done, it's over with. I've got friends in the government who would tell me, 'Oh, it's all over.' No, it's not. This is the opposite. We're going to have to take and build privacy and cybersecurity far more into the things that we do, because now we're all using primarily these mechanisms. You know, we're being all digital. And that has to be built in." RESOURCE LINKS: Trend Micro updates "Developing Story: COVID-19 Used in Malicious Campaigns": https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-names-and-malicious-domains "Don’t let your virtual meetings expose you to privacy and security risks," by Michael Simon, XPAN Law: https://xpanlawgroup.com/dont-let-your-virtual-meetings-expose-you-to-privacy-and-security-risks/ Connect with Michael Simon on LinkedIn: https://www.linkedin.com/in/michael-simon-9400014/ Baseline remote work privacy & security story. Zoom sued, announces security upgrades: https://www.secureworldexpo.com/industry-news/zoom-sued-over-privacy-announces-cybersecurity-upgrades SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions
Many cyber threats are taking on a COVID-19 theme. In this episode, we are speaking to Myla Pilao of Trend Micro, where the Threat Research Team tracks more than 5 billion threats, daily. @7:20 Pilao says: "So every day, we collect terabytes of threat data coming in from honey pots, from submissions from our partners, from customers, from feedback loops, from a lot of our crawling technologies. So we are attempting to combine all this collection of data from many, many sources. This gives us one big thing: the visibility of the nature and even the geolocation of the threat." RESOURCE LINKS: Trend Micro Updates “Developing Story, COVID-19 Malicious Use Campaigns": https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-names-and-malicious-domains SecureWorld Remote Sessions Daily Briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions Deep Dive Web Conferences: https://www.secureworldexpo.com/resources?cat=web-conferences The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization.
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. They call themselves the COVID-19 CTI League. Some have labeled them superheroes in cyberspace, like the Justice League. The mission of this volunteer organization: defend hospitals and healthcare facilities against cyber attacks so that medical professionals can focus on caring for COVID-19 cases and saving lives. In this episode, we interview CTI League Co-Founder Ohad Zaidenberg. Plus, new findings from Trend Micro reveal how big the COVID-19 cybercrime problem has become. RESOURCE LINKS: Trend Micro “Developing Story: COVID-19 Used in Malicious Campaigns": https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-names-and-malicious-domains Connect with the CTI League: https://cti-league.com Follow Ohad Zaidenberg: https://twitter.com/OhadMZ NEW SecureWorld Remote Sessions daily briefings: https://www.secureworldexpo.com/resources?cat=remote-sessions Deep dive web conferences: https://www.secureworldexpo.com/resources?cat=web-conferences
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. Who would launch a cyberattack against the World Health Organization as it responds to the coronavirus pandemic? In this episode, we’re interviewing the man who uncovered a live cyberattack against the WHO, the potential value (the why?) of such an attack, and the wave of cybercrime and fraud coming from coronavirus and COVID-19 related websites. Also, how can organizations and the enterprise safeguard against cyberattacks during the pandemic? Plus, teleworking tips from Trend Micro and its vice president for cybersecurity, Greg Young. RESOURCE LINKS: NEW SecureWorld Remote Sessions: https://www.secureworldexpo.com/resources?cat=remote-sessions Trend Micro on making remote work secure: https://blog.trendmicro.com/suddenly-teleworking-securely/ Connect with Alexander Urbelis: https://www.linkedin.com/in/alex-urbelis-25aaab1/ 2020 Web conference schedule: https://www.secureworldexpo.com/resources?cat=web-conferences
In this episode, we’re doing something new. We are sharing key learnings from our first week of daily online briefings. Called the SecureWorld Remote Sessions, this is our way of bringing security professionals together in the face of the coronavirus (COVID-19) pandemic. Featured interviews are with: Stephen Head, Director, IT Risk Advisory Services, Experis Finance; Chris Shull, vCISO, Salem Medical Center; Jordan Fischer, Managing Partner, XPAN Law Group; and James Goepel, Board of Directors, CMMC Accreditation Body. Plus, the latest on Microsoft Office 365 related phishing attacks from Trend Micro and its 2019 Security Roundup Report. RESOURCE LINKS: NEW SecureWorld Remote Sessions: https://www.secureworldexpo.com/resources?cat=remote-sessions Trend Micro 2019 Security Roundup Report : https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/the-sprawling-reach-of-complex-threats 2020 web conference schedule: https://www.secureworldexpo.com/resources?cat=web-conferences
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode, we talk to Ryan Mostiller, Senior Security Engineer at Penske Automotive Group, about how Blue Teams can help secure the organization and get credit for doing it. Plus, details on a new initiative in response to the coronavirus (COVID-19): announcing the SecureWorld Remote Sessions. RESOURCE LINKS: NEW SecureWorld Remote Sessions: https://www.secureworldexpo.com/resources?cat=remote-sessions Trend Micro 2019 Security Roundup Report : https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/the-sprawling-reach-of-complex-threats Ryan Mostiller: https://www.linkedin.com/in/ryanmostiller/
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode, we talk to Austin Rappeport, head of threat defense and blue team member, and Chris Carlis, red team coordinator, both of Zurich Insurance Group. We look at cybersecurity through a blue team versus red team lens and how the two work together on purple team exercises to find security vulnerabilities. Plus, Trend Micro's 2019 annual security roundup report, "The Sprawling Reach of Complex Threats."  RESOURCE LINKS: Trend Micro 2019 Security Roundup Report : https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/the-sprawling-reach-of-complex-threats Chris Carlis: https://events.secureworldexpo.com/speakers/chris-carlis/ Austin Rappeport: https://www.linkedin.com/in/austin-rappeport-067a8161/ SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/events
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode: InfoSec professionals are frustrated by the amount of time they spend evaluating third-party risk. David Barton of UHY Advisors says this should actually be someone else’s job. He explains steps to overcome this cybersecurity frustration. Plus, in our interview with Matt Clapham, Director of Cybersecurity at GE Healthcare, he talks about finding the rarest of the rare in cybersecurity talent and a few easy steps to uncovering potential security team members. Also, Trend Micro’s Zero Day Initiative paid out seven figures in bug bounties in 2019. ZDI has an update on how you can add security research as a side hustle. RESOURCE LINKS: Zero Day Initiative 2020 submission advice for security researchers: https://www.zerodayinitiative.com/blog/2020/2/19/submission-advice-for-security-researchers David Barton, UHY Advisors: https://www.linkedin.com/in/david-barton-203148/ Matt Clapham, GE Healthcare: https://www.linkedin.com/in/mattclapham/ SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/events NIST on the cybersecurity talent gap: https://www.secureworldexpo.com/industry-news/nist-on-the-cybersecurity-talent-gap-regional-alliances
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode: How do you develop cybersecurity advocates across the organization? Featured interviews with: Deneen DeFiore, VP & CISO, United Airlines; Zaki Abbas, VP & CISO, Brookfield Asset Management; Milinda Rambel Stone, VP & CISO, Provation Medical; Brent Lassi, CISO, Bluecore; Mike Muha, Chief Security and Privacy Officer, Workforce Software. Also, Trend Micro shares about Dynamic Challenges to Threat Detection and Endpoint Security—and how to overcome them. RESOURCE LINKS: • SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/events • Trend Micro “Dynamic Challenges to Endpoint Security” paper: https://www.trendmicro.com/vinfo/us/security/news/security-technology/dynamic-challenges-to-threat-detection-and-endpoint-security-and-how-to-overcome-them
The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode, we’re sharing new revelations about how the Equifax data breach happened. From newly unsealed court documents in the US DOJ case, we look at 10 steps Chinese nation-state hackers are accused of taking in the attack. We also interview Graeme Payne who worked for Equifax and was fired after being blamed for human error that led to the breach. What did he learn that can benefit security teams? Also, new Trend Micro research on the Outlaw Hacking Group and Trend Micro’s hands-on workshop, “Threat Defense Challenge,” at SecureWorld Philadelphia 2020. RESOURCE LINKS: SecureWorld Philadelphia "Threat Defense Challenge": https://events.secureworldexpo.com/agenda/philadelphia-pa-2020/ Trend Micro "Outlaw Hacking Group" research: https://blog.trendmicro.com/trendlabs-security-intelligence/outlaw-updates-kit-to-kill-older-miner-versions-targets-more-systems/ Bruce Schneier podcast Interview: https://www.secureworldexpo.com/resources/bruce-schneier-market-insecurity-podcast Graeme Payne, formerly of Equifax: https://www.linkedin.com/in/payneg/ 10 Steps Chinese Hackers Allegedly Took in Equifax Breach: https://www.secureworldexpo.com/industry-news/equifax-hacker-indictment-10-fast-facts SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/events
The Two Faces of AI

The Two Faces of AI

2020-02-1121:57

The SecureWorld Sessions is a cybersecurity podcast that gives you access to people and ideas that impact your career and help you secure your organization. In this episode, we share a new definition of artificial intelligence, discuss the upheaval AI will cause, and look at the dark side of AI. Interviews with Annie Searle of University of Washington; Craig Spiezle of the Online Trust Alliance and AgeLight; Steve Brown, the Bald Futurist; and Dr. Raj Sachdev, Dean of Columbia College School of Business. Also, Trend Micro shares about “counter-AI and ML,” which could work against us and against the security of your organization. RESOURCE LINKS: • Trend Micro "AI and ML cyberthreats" paper: http://bit.ly/TM_AI_ML • SecureWorld 2020 conference schedule: https://www.secureworldexpo.com/events
loading
Comments 
Download from Google Play
Download from App Store