Dr Paul Lewis Chief Technology Officer

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
operational-level system. management-level system.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
EVALUATION AND SELECTION Chapter 6. Objectives Upon completion of this chapter, you should be able to: Critically understand the process of strategy evaluation.
What’s Coming  Today  Group market research presentations (45’)  Work Session with advisors- market research refinement (30’)  Commercialization options.
1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Workshop 4: Developing a one page business case
Thank you/Appreciate time Intro me- Manage channel last 2 years
Horizon 2020 Secure Societies European Info Day and Brokerage Event
2017.
Open Platform 3.0™ Overview – 3rd August 2016 Dr Christopher J Harding
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
Open KPN Marie-José van den Boomgaard
How Artificial Intelligence is Changing the Supply Chain
Segmap Solutions Mapping segments.
“Urgency in the Accounting Supply Chain – The Case of Accounting Digitization” Daniel O’Leary, University of Southern California September 8, 2017.
Monetizing IoT in India
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Industrial Food Safety Systems
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
CHAPTER 8: LEARNING OUTCOMES
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
The City National Difference
MarketsandMarkets Presents Detailed Qualitative & Quantitative Analysis on Polymerase Chain Reaction html.
MarketsandMarkets Presents The Impact of the Different Market Factors on Polymerase Chain Reaction html.
MarketsandMarkets Presents Detailed Analysis of end users of PCR instruments and their preferences in Market html.
MarketsandMarkets Presents Find out How the Value of Polymerase Chain Reaction Market has changed over Time html.
MarketsandMarkets Presents Polymerase Chain Reaction Market Share Analysis, By Key Players & Competitive Landscape html.
MarketsandMarkets Presents Polymerase Chain Reaction Usage Pattern and Replacement Trends html.
MarketsandMarkets Presents Polymerase Chain Reaction Usage Pattern and Replacement Trends, Competitive Landscape Comparative Analysis html.
MarketsandMarkets Presents Polymerase Chain Reaction Market Has Been Witnessing Accelerated Growth in Recent Years!! html.
Consulting Services for IoT
Threat Landscape for Data Security
Consulting Services for IoT
13th International Microinsurance Conference
Panel 2 Supervisory Apporaches on Insurtech and Regulatory Challenges
A Must to Know - Testing IoT
NAE Global Challenge Scholars Program Annual Meeting on October 30.
How Emerging Technology is Transforming Actuarial Science
Cognitive Search Industry Trends.
CUSTOMER RELATIONSHIP MANAGEMENT CONCEPTS AND TECHNOLOGIES
GlobAL Public Procurement Conference September 2018
CHAPTER 8: LEARNING OUTCOMES
TRANSFORMATION OF INFORMATION TECHNOLOGY IN INSURANCE BUSINESS MODELS
Artificial Intelligence in Manufacturing
Innovation at the Edge How rapid experimentation with emerging technologies is achieving results on Earth and in Space Tom Soderstrom, JPL IT Chief Technology.
Assistant Vice President and Chief Technology Officer
Integrating Deep Learning with Cyber Forensics
How to address security, cost, IT and migration concerns
Maintaining order and safety in a city is no small task
Mjunction 2ND EDITION OF GLOBAL PROCUREMENT CONFERENCE 2019
World-Leading Research with Real-World Impact!
Industrializing AI.
Experiences from testing security solutions in the railway use-case
Technology Convergence
— Business skills for a digital future
Detection Detect the breach and protect the data. By,
New Challenges in Systems Safety - Themes
KEY INITIATIVE Financial Data and Analytics
PUTTING PEOPLE AT THE CENTRE OF DIGITAL TRANSFORMATION
Session 8: Innovative Uses of Captives: Cyber and Beyond
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
Cyber Security R&D: A Personal Perspective
KEY INITIATIVE Internal Control and Technical Accounting
What is the Fourth Industrial Revolution*?
The Intelligent Enterprise and SAP Business One
OU BATTLECARD: E-Business Suite Courses and Certifications
Presentation transcript:

Dr Paul Lewis Chief Technology Officer Real World Cyber Security Use Cases for Machine Learning and Artificial Intelligence within Financial Services

CREATING CYBER SECURITY PRODUCTS TECHNOLOGY TRANSFER ARTIFICIAL INTELLIGENCE DDoS BLOCKCHAIN ENCRYPTION EARLY WARNING OF INTRUSION IoT & SMART CITIES DIGITAL FORENSICS ANALYTICS STEGANOGRAPHY CYBER RISK/THREAT ASSESSMENT COMPUTATION ON ENCRYPTED DATA SOCIAL ENGINEERING PEN TESTING CYBER HORIZON SCANNING TECHNOLOGY TRANSFER CLOSE ASSOCIATION WITH ADVANCED CYBER SECURITY RESEARCH UNIVERSITIES

The Problem Around 2-3 years ago we decided to start working on our first ML enabled cyber product (specifically Ant-DDoS) However lots of companies and organisations fall somewhere in the following categories: Know about Machine Learning and AI techniques, and are using or attempting to use them (notable examples are DWP, KPMG Deepmind, Babylon Health etc.). Heard about ML/AI techniques, but have no idea where to start. Have no idea, but watched Terminator 2 and are worried!

Why Are People Interested? Most organisations now understand the advantage in exploiting their cyber data, however are grappling with the ’four V’s’.

What Are We Doing About this? Decided to run a series of workshops to work on the ‘big’ problems in cyber security that ML techniques could be applied to. Four global organisations (Investment bank, Consumer Bank, Big 4 consultancy, Large Insurance) Three academic institutions (MIT, Imperial, Edinburgh) ….and us

Why Is Industry Interested? A recent trend that all cyber products have been dipped in, and are AI/ML enabled. Build products that are useful, relevant and actually rooted in proven ML research and techniques.

General Themes From Workshops Generic AI - This category includes ideas that should be seen as general problems in AI. They may need to be addressed as part of a solution emerging from other categories Intelligent defence - ideas that perform or assist defence activities which require a degree of automated discrimination or contextual awareness as a part of their performance. Situational awareness / decision support - aim to assist the analyst, and those with responsibility and accountability, to understand and navigate complexity in the context of risk, and operational and strategic decision-making. Fundamental design - desirable functions that might be ‘baked-in’ to the system or software to provide enhanced performance, Cyber AI context - Operational context of today’s enterprises in terms of supply chains, regulatory environments and responsibilities to staff, customers and citizens. Whole company services - links security context with the wider services to the enterprise that might be informed by the analytic processes.

Two Specifics – Standards & IP IP protection on vendors tools The idea here was to avoid being locked into a supplier of services by the provision of intellectual property to the supplier that could never be retrieved or forgotten. This could stretch to Models, Data Insight or other aspects. Porting data between vendors. Relating to the above is the requirement to be able to electronically port data between vendors. This might be a tool or a service – or both. 

Key Insights From the Workshops Companies are starting to seriously look at data and wonder what the hell am I going to do with it all. Most companies fundamentally misunderstand what Machine Learning and Artificial Intelligent techniques actually are and what they are capable of. Most companies can’t even patch out of date software, let alone use ‘advanced’ technology (See recent Equifax incident). Awareness of ML and AI is growing, and needs realistic assumptions and promises to be made. Lots of potential applications, and a real business need for them.

Challenge : Experimentation!

Thanks and Questions @XwordCTO paul.lewis@crosswordcybersecurity.com