Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 2262
Filter

Prof. Dr. Beril Sirmacek | Trustworthy AI - opening up the black box

11/18/2020
Views 89
0
algorithm, automation, color, computer vision, engineering, food, human, intelligence, machine learning, motivation, neural network, research, robot, security, self-driving car, team, twitter, abraham maslow, black box, credit card, decision-making, dog, explainable artificial intelligence, understanding
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Dr. Christian Nagel | The Future of VC - How the Industry Gets Disrupted

11/18/2020
Views 85
0
analytics, database, information, investor, news, research, social media, tool, value chain, venture capital, accuracy and precision, decision-making, evaluation, parameter, tesla, inc., unicorn (finance), web crawler, wonder woman
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ulli Waltinger | Trustworthy AI for the Physical World

11/17/2020
Views 42
0
automation, bias, causality, engineer, expert, intelligence, learning, machine learning, memory, reason, research, risk, science, simulation, society, software , system, compressor, credibility, explainable artificial intelligence, laboratory, leverage (finance), personal computer, trust (social science)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Charlotte Seiler | The Berlin AI ecosystem

11/17/2020
Views 122
0
ai, artificial intelligence, berlin, digital economy, economic development, economy, education, entertainment, entrepreneurship, germany, google, innovation, intelligence, management, network, news, question, research, robotics, startup company, startups, amazon (company), attention, business process management, debriefing, landscape, research and development, travel visa, ecosystem service, rise of ai summit 2020, rise of ai, rise of ai summit, berlin partner, ecosyststem
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Damian Boeselager | An European perspective on a regulatory framework for AI/ Big Data/ ML

11/17/2020
Views 37
0
advertising, ai, artificial intelligence, berlin, big data, big tech, digital transformation, digitization, eu, european union, interoperability, künstliche intelligenz, law, machine learning, microsoft, privacy, research, retail, amazon (company), competition (economics), copyright infringement, efficient energy use, european single market, financial market, information privacy, market (economics), rights, trade secret, volt, zero-sum game, european parliament, fabian westerheide, rise of ai, rise of ai summit, damian boeselager, europe ai, gaia-x
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ethics of algorithms - from theoretical discussion to practical application | Rise of AI Summit 2020

11/17/2020
Views 95
0
ai, artificial general intelligence, artificial intelligence, berlin, bias, big data, ethics, künstliche intelligenz, law, machine learning, mind, privacy, reason, research, background check, civil society, decision-making, ethics of artificial intelligence, force, information privacy, race (human categorization), rights, supervised learning, technological singularity, understanding, predictive policing, chinese room, pre-crime, fabian westerheide, rise of ai, rise of ai summit
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Adrian Locher | AI Strategies

11/17/2020
Views 345
0
ai, artificial intelligence, automation, berlin, big data, business model, computer, engineering, infrastructure, internet, investor, künstliche intelligenz, language, machine learning, research, sales, self-driving car, soft skills, startup company, steve jobs, sustainable business, technology, tensorflow, business-to-business, imagenet, luck, medical imaging, radiology, fabian westerheide, rise of ai, rise of ai summit, overqualification
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Dorothee Bär | Germany's Strategy for AI

11/17/2020
Views 196
0
ai, artificial intelligence, berlin, best practice, big data, cloud computing, computing, creativity, disability, education, european union, innovation, künstliche intelligenz, machine learning, progress, reason, research, risk, robotics, safety, science, self-driving car, software , startup company, climate change mitigation, literacy, supercomputer, transparency (behavior), dorothee bär, fabian westerheide, rise of ai, rise of ai summit
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Chris Boos | Now that AI Is Here, What Do We Do with It

11/17/2020
Views 176
0
agriculture, ai, artificial intelligence, automation, berlin, big data, creativity, innovation, künstliche intelligenz, language, learning, machine learning, productivity, reason, research, robot, robotic process automation, self-driving car, technology, apple inc., assembly line, business process automation, curiosity, economies of scale, factory, human overpopulation, industrial revolution, industrialisation, lifelong learning, fabian westerheide, rise of ai, rise of ai summit, egotism
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Risk Bounds for Low Cost Bipartite Ranking

08/05/2020
Views 23
0
algorithm, car, experiment, facebook, hypothesis, learning, research, risk, solution, texas, air pollution, bomb, child, earth, exponentiation, function (mathematics), likelihood function, mcdonald's, ratio, sample size determination, summation, triangle, inner product space, concentration, constitution of texas
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Symbolic Querying of Vector Spaces: Probabilistic Databases Meets Relational Embeddings

08/04/2020
Views 37
0
data, database, dimension, facebook, learning, machine learning, prediction, probability, reason, relational database, research, space, steve jobs, directed graph, embedding, expected value, fax, function (mathematics), information retrieval, knowledge graph, knowledge base, probability distribution, random variable, relational model, finitary relation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Finite-Memory Near-Optimal Learning for Markov Decision Processes with Long-Run Average Reward

08/05/2020
Views 12
0
energy, finance, information, knowledge, language, learning, mathematics, memory, probability, property, reinforcement learning, research, technology, texas, bribery, function (mathematics), goal, mathematical optimization, maxima and minima, mole (unit), password, reinforcement, tradition, use case, almost surely
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Who Stole My 100,000 Dollars’ Worth Bitcoin Wallets - Story of HoneyTokens

05/20/2021
Views 51
0
backup, bitcoin, computer security, cryptocurrency, mind, operating system, pdf, research, belief, computer file, credit card, cyberwarfare, desktop metaphor, directory (computing), domain name system, firefox, gps tracking unit, http 404, honeypot (computing), hypertext transfer protocol, icon (computing), thought, user agent, web server, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Weak Links in Cloud IAM - Never Trust. Always Verify!

05/20/2021
Views 51
0
authentication, best practice, cloud computing, cryptocurrency, database, education, encryption, icloud, identity management, kubernetes , research, risk, amazon elastic compute cloud, cloud computing security, credential, firewall (computing), image scanner, login, multi-factor authentication, password, principle of least privilege, rsa security, superuser, user (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Metrics Development for Board and Risk Committee Reporting

05/20/2021
Views 68
0
computer security, cybersecurity, governance, information security, leadership, machine, pain, policy, property, research, risk, team, audit, bank, board of directors, consensus decision-making, curiosity, decision-making, evidence, penetration test, regulatory compliance, risk assessment, strategic planning, truth, vulnerability (computing), public utility
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Your Metrics Suck! 5 SecOps Metrics That Are Better Than MTTR

05/20/2021
Views 73
0
automation, business, insurance, intelligence, investment, knowledge, language, learning, mindset, research, resource, shopping, utility, attention, bit, book, covid-19 pandemic, firewall (computing), lottery, mission statement, truth, use case, self-efficacy, 5 secops metrics, next-generation firewall
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

MITRE ATT&CK® as a Framework for Cloud Threat Investigation

05/20/2021
Views 78
0
best practice, cloud computing, community, computer security, computing, internet, interoperability, interview, operating system, outsourcing, research, retail, risk, spotify, system, virtualization, cloud computing security, computer network, penetration test, server (computing), system on a chip, thread (computing), threat model, storage area network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Are Pentests Relevant with Bug Bounties

05/20/2021
Views 87
0
automation, cloud computing, computer programming, computer security, kubernetes , motivation, open source, open-source software, outsourcing, research, simulation, application software, buffer overflow, bug bounty program, cross-site scripting, crowdsourcing, dropbox (service), exploit (computer security), hackerone, image scanner, metasploit project, password, penetration test, temporary work, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: What (Actually, Measurably) Makes a Security Program More Successful?

05/20/2021
Views 65
0
automation, bias, cloud computing, computer hardware, computer security, governance, hypothesis, information, language, mind, nothing, organization, probability, research, security, space, statistics, attention, correlation and dependence, error, matrix (mathematics), regulatory compliance, sampling (statistics), statistical significance, understanding
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Beyond Public Buckets: Lessons Learned on Attack Detection in the Cloud

05/19/2021
Views 134
0
cloud computing, devops, entrepreneurship, identity management, information security, infrastructure as code, law, mind, money, nothing, privacy, reason, research, security, simulation, technology, antivirus software, control plane, evil eye, goal, ice, patch (computing), proxy server, skype, vulnerability (computing), detection in the cloud
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

A Case Study of the Capital One Data Breach

05/17/2021
Views 201
0
capital one, case study, computer security, data breach, internet, leadership, personal data, research, risk, computer network, emergence, general data protection regulation, information privacy, internet protocol, office of the comptroller of the currency, payment card industry data security standard, regulatory compliance, replication (computing), tor (anonymity network), turnover (employment), virtual private network, vulnerability (computing), web application firewall, world wide web, cyber-security regulation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The New CISO: What Got You Here, Won’t Get You There

09/17/2020
Views 65
0
community, conversation, google, language, organization, war, analogy, darpa, definition, macintosh, strategic management, telecommuting, business acumen, sperm donation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Your Application is Mostly Written by Strangers

09/17/2020
Views 70
0
authentication, cryptocurrency, cybersecurity, information, infosec, internet, java (programming language), javascript, malware, open source, open-source software, programmer, research, rsa, rsac, rsaconference, security, software , software development, source code, apache maven, application software, distributed version control, free software, library (computing), multi-factor authentication, npm (software), password, social engineering (security), software bug, vbscript, rubygems
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How Protocol Gateways May Introduce More Problems than They Solve

09/17/2020
Views 77
0
open-source software, video, academic publishing, computer data storage, ethernet, firewall (computing), internet protocol, login, modbus, telephone, translation, transmission control protocol, secure shell protocol, rs-485
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Don’t Worry, Be API: Addressing AppSec’s Newest Challenge

09/16/2020
Views 117
0
api, application security, authentication, cloud computing, cybersecurity, database, design, html, information, infosec, knowledge, reason, research, rsa, rsac, rsaconference, security, software , technology, web application, access control, application software, client (computing), communication protocol, computer network, denial-of-service attack, interface (computing), server (computing), single-page application, user (computing), web browser, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Beyond Penetration Testing: Developing a Defensive Cyber-Workforce

09/16/2020
Views 138
0
expert, knowledge, organizational culture, chief information officer, evaluation, proactive cyber defence, shame
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Implementing Critical Cybersecurity Controls in a DevOps Environment

09/16/2020
Views 155
0
continuous integration, cryptocurrency, governance, outsourcing, platform as a service, supply chain, audit, benchmarking, information system, privacy by design, provisioning (telecommunications)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hack Your Cybersecurity Career: Your Role in the Ecosystem

09/16/2020
Views 170
0
application security, automation, brand, computer, conversation, engineering, internet, mind, music, research, science, software development, agile software development, business process, insight, penetration test, reputation, university of california, los angeles, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Breaking Bad (Passwords)

09/15/2020
Views 275
0
siri, active directory, breaking bad, cryptographic hash function, letter case, minimum wage, number, passport, password policy, payment card industry data security standard, primary care, tiger, domain controller (windows), 2013 united states federal government shutdown
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hacking People’s Mind: When Threat Actors Master Social Engineering

09/15/2020
Views 649
0
cybersecurity, digital transformation, engineering, information, infosec, insurance, machine, money, news, research, rsa, rsac, rsaconference, security, sms, statistics, united kingdom, brainstorming, covid-19 pandemic, child, cybercrime, jewellery, lease, radar, severe acute respiratory syndrome coronavirus 2, social engineering (security), text messaging, virus, help desk, prudential financial, relief
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 76