ºÝºÝߣshows by User: Interset / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Interset / Wed, 03 Oct 2018 00:44:33 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Interset IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight] /slideshow/ians-forum-dc-operationalizing-big-data-security-tech-spotlight/117876287 ianstechnologysessionscharlottemh0918181-181003004433
At IANS Forum DC, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and an open-source, big data architecture to find hidden threats fast. Learn more at Interset.AI]]>

At IANS Forum DC, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and an open-source, big data architecture to find hidden threats fast. Learn more at Interset.AI]]>
Wed, 03 Oct 2018 00:44:33 GMT /slideshow/ians-forum-dc-operationalizing-big-data-security-tech-spotlight/117876287 Interset@slideshare.net(Interset) IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight] Interset At IANS Forum DC, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and an open-source, big data architecture to find hidden threats fast. Learn more at Interset.AI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181003004433-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At IANS Forum DC, Interset VP Mario Daigle took a deep dive into the math behind Interset&#39;s security analytics platform, which allows security teams to leverage behavioral analytics and an open-source, big data architecture to find hidden threats fast. Learn more at Interset.AI
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight] from Interset
]]>
366 2 https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181003004433-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity /slideshow/ians-forum-dc-everything-is-a-nail-machine-learning-in-cybersecurity/117876166 intersetkeynoteianscharlotte1-181003004254
Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At the IANS InfoSec Forum in DC, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI]]>

Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At the IANS InfoSec Forum in DC, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI]]>
Wed, 03 Oct 2018 00:42:54 GMT /slideshow/ians-forum-dc-everything-is-a-nail-machine-learning-in-cybersecurity/117876166 Interset@slideshare.net(Interset) IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity Interset Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At the IANS InfoSec Forum in DC, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersetkeynoteianscharlotte1-181003004254-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At the IANS InfoSec Forum in DC, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity from Interset
]]>
391 3 https://cdn.slidesharecdn.com/ss_thumbnails/intersetkeynoteianscharlotte1-181003004254-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight] /Interset/ians-forum-charlotte-operationalizing-big-data-security-tech-spotlight ianstechnologysessionscharlottemh0918181-181001215101
At IANS Forum Charlotte, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and a open-source, big data architecture to find hidden threats fast. ]]>

At IANS Forum Charlotte, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and a open-source, big data architecture to find hidden threats fast. ]]>
Mon, 01 Oct 2018 21:51:01 GMT /Interset/ians-forum-charlotte-operationalizing-big-data-security-tech-spotlight Interset@slideshare.net(Interset) IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight] Interset At IANS Forum Charlotte, Interset VP Mario Daigle took a deep dive into the math behind Interset's security analytics platform, which allows security teams to leverage behavioral analytics and a open-source, big data architecture to find hidden threats fast. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181001215101-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At IANS Forum Charlotte, Interset VP Mario Daigle took a deep dive into the math behind Interset&#39;s security analytics platform, which allows security teams to leverage behavioral analytics and a open-source, big data architecture to find hidden threats fast.
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight] from Interset
]]>
146 4 https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181001215101-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity /slideshow/ians-forum-charlotte-everything-is-a-nail-machine-learning-in-cybersecurity/117666303 intersetkeynoteianscharlotte1-181001214532
Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At IANS Forum Charlotte, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI]]>

Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At IANS Forum Charlotte, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI]]>
Mon, 01 Oct 2018 21:45:32 GMT /slideshow/ians-forum-charlotte-everything-is-a-nail-machine-learning-in-cybersecurity/117666303 Interset@slideshare.net(Interset) IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity Interset Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At IANS Forum Charlotte, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/intersetkeynoteianscharlotte1-181001214532-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Machine Learning is today’s must-have cybersecurity technology, but there are different kinds of machine learning and one size does not fit all. Understanding the problem you’re trying to solve is critical to selecting a solution and producing a successful outcome. At IANS Forum Charlotte, Mario Daigle, Interset VP of Product, shared the strengths and weaknesses of supervised and unsupervised machine learning for solving the problems that matter to you. Learn more at Interset.AI
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity from Interset
]]>
72 1 https://cdn.slidesharecdn.com/ss_thumbnails/intersetkeynoteianscharlotte1-181001214532-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[Webinar] Supercharging Security with Behavioral Analytics /slideshow/webinar-supercharging-security-with-behavioral-analytics/116334720 sept19forresterintersetwebinarfinal1-180924190339
In this presentation, special guest Joseph Blankenship, principal analyst at Forrester, joined Interset CTO Stephan Jou and Security Strategist Paul Reid for a discussion on how to practically and effectively boost the IQ of your security arsenal with behavioral analytics so you can find threats faster than ever. Learn more at Interset.AI ]]>

In this presentation, special guest Joseph Blankenship, principal analyst at Forrester, joined Interset CTO Stephan Jou and Security Strategist Paul Reid for a discussion on how to practically and effectively boost the IQ of your security arsenal with behavioral analytics so you can find threats faster than ever. Learn more at Interset.AI ]]>
Mon, 24 Sep 2018 19:03:38 GMT /slideshow/webinar-supercharging-security-with-behavioral-analytics/116334720 Interset@slideshare.net(Interset) [Webinar] Supercharging Security with Behavioral Analytics Interset In this presentation, special guest Joseph Blankenship, principal analyst at Forrester, joined Interset CTO Stephan Jou and Security Strategist Paul Reid for a discussion on how to practically and effectively boost the IQ of your security arsenal with behavioral analytics so you can find threats faster than ever. Learn more at Interset.AI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sept19forresterintersetwebinarfinal1-180924190339-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation, special guest Joseph Blankenship, principal analyst at Forrester, joined Interset CTO Stephan Jou and Security Strategist Paul Reid for a discussion on how to practically and effectively boost the IQ of your security arsenal with behavioral analytics so you can find threats faster than ever. Learn more at Interset.AI
[Webinar] Supercharging Security with Behavioral Analytics from Interset
]]>
187 2 https://cdn.slidesharecdn.com/ss_thumbnails/sept19forresterintersetwebinarfinal1-180924190339-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DataWorks 2018: How Big Data and AI Saved the Day /slideshow/dataworks-2018-how-big-data-and-ai-saved-the-day/102727514 roydataworksjune2018-180620170851
In this presentation titled "How Big Data and AI Saved the Day: Critical IP Almost Walked Out the Door," Interset Field Data Scientist Roy Wilds discussed real-world examples of how businesses can expand their threat analysis using security analytics powered by artificial intelligence in a big data environment. This was presented at DataWorks Summit 2018. ]]>

In this presentation titled "How Big Data and AI Saved the Day: Critical IP Almost Walked Out the Door," Interset Field Data Scientist Roy Wilds discussed real-world examples of how businesses can expand their threat analysis using security analytics powered by artificial intelligence in a big data environment. This was presented at DataWorks Summit 2018. ]]>
Wed, 20 Jun 2018 17:08:51 GMT /slideshow/dataworks-2018-how-big-data-and-ai-saved-the-day/102727514 Interset@slideshare.net(Interset) DataWorks 2018: How Big Data and AI Saved the Day Interset In this presentation titled "How Big Data and AI Saved the Day: Critical IP Almost Walked Out the Door," Interset Field Data Scientist Roy Wilds discussed real-world examples of how businesses can expand their threat analysis using security analytics powered by artificial intelligence in a big data environment. This was presented at DataWorks Summit 2018. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/roydataworksjune2018-180620170851-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation titled &quot;How Big Data and AI Saved the Day: Critical IP Almost Walked Out the Door,&quot; Interset Field Data Scientist Roy Wilds discussed real-world examples of how businesses can expand their threat analysis using security analytics powered by artificial intelligence in a big data environment. This was presented at DataWorks Summit 2018.
DataWorks 2018: How Big Data and AI Saved the Day from Interset
]]>
383 3 https://cdn.slidesharecdn.com/ss_thumbnails/roydataworksjune2018-180620170851-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity /slideshow/ians-forum-seattle-everything-is-a-nail-machine-learning-in-cybersecurity-102664878/102664878 iansseattlepresentationfinalv-180619164907
In this keynote presentation, Interset Director of Field Ops Jay Lillie discussed the different kinds of machine learning and their most suitable cybersecurity use cases. ]]>

In this keynote presentation, Interset Director of Field Ops Jay Lillie discussed the different kinds of machine learning and their most suitable cybersecurity use cases. ]]>
Tue, 19 Jun 2018 16:49:07 GMT /slideshow/ians-forum-seattle-everything-is-a-nail-machine-learning-in-cybersecurity-102664878/102664878 Interset@slideshare.net(Interset) IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity Interset In this keynote presentation, Interset Director of Field Ops Jay Lillie discussed the different kinds of machine learning and their most suitable cybersecurity use cases. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iansseattlepresentationfinalv-180619164907-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this keynote presentation, Interset Director of Field Ops Jay Lillie discussed the different kinds of machine learning and their most suitable cybersecurity use cases.
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity from Interset
]]>
321 5 https://cdn.slidesharecdn.com/ss_thumbnails/iansseattlepresentationfinalv-180619164907-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum Seattle Technology Spotlight: Looking for� and Finding �the Insider Threat /slideshow/ians-forum-seattle-technology-spotlight-looking-for-and-finding-the-insider-threat/102366747 iansseattletechsessionnoanimation-180613221937
At IANS Forum Seattle, Interset Director of Field Ops, Jay Lillie, took a close look at how user and entity behavioral analytics (UEBA) can help to identify insider threats before data is stolen. To learn more, contact Interset at securityai@interset.com. ]]>

At IANS Forum Seattle, Interset Director of Field Ops, Jay Lillie, took a close look at how user and entity behavioral analytics (UEBA) can help to identify insider threats before data is stolen. To learn more, contact Interset at securityai@interset.com. ]]>
Wed, 13 Jun 2018 22:19:37 GMT /slideshow/ians-forum-seattle-technology-spotlight-looking-for-and-finding-the-insider-threat/102366747 Interset@slideshare.net(Interset) IANS Forum Seattle Technology Spotlight: Looking for� and Finding �the Insider Threat Interset At IANS Forum Seattle, Interset Director of Field Ops, Jay Lillie, took a close look at how user and entity behavioral analytics (UEBA) can help to identify insider threats before data is stolen. To learn more, contact Interset at securityai@interset.com. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iansseattletechsessionnoanimation-180613221937-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At IANS Forum Seattle, Interset Director of Field Ops, Jay Lillie, took a close look at how user and entity behavioral analytics (UEBA) can help to identify insider threats before data is stolen. To learn more, contact Interset at securityai@interset.com.
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Insider Threat from Interset
]]>
329 5 https://cdn.slidesharecdn.com/ss_thumbnails/iansseattletechsessionnoanimation-180613221937-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Webinar: Will the Real AI Please Stand Up? /slideshow/webinar-will-the-real-ai-please-stand-up-102191824/102191824 june12webinar-180612193322
In this webinar, Interset CTO Stephan Jou and VP of Products Mario Daigle discussed what to look for when cybersecurity vendors claim to leverage AI for UEBA. View a recording of this webinar at https://zoom.us/webinar/register/WN_0Etv6kilRN-0QuqoNn26bg. ]]>

In this webinar, Interset CTO Stephan Jou and VP of Products Mario Daigle discussed what to look for when cybersecurity vendors claim to leverage AI for UEBA. View a recording of this webinar at https://zoom.us/webinar/register/WN_0Etv6kilRN-0QuqoNn26bg. ]]>
Tue, 12 Jun 2018 19:33:22 GMT /slideshow/webinar-will-the-real-ai-please-stand-up-102191824/102191824 Interset@slideshare.net(Interset) Webinar: Will the Real AI Please Stand Up? Interset In this webinar, Interset CTO Stephan Jou and VP of Products Mario Daigle discussed what to look for when cybersecurity vendors claim to leverage AI for UEBA. View a recording of this webinar at https://zoom.us/webinar/register/WN_0Etv6kilRN-0QuqoNn26bg. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/june12webinar-180612193322-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this webinar, Interset CTO Stephan Jou and VP of Products Mario Daigle discussed what to look for when cybersecurity vendors claim to leverage AI for UEBA. View a recording of this webinar at https://zoom.us/webinar/register/WN_0Etv6kilRN-0QuqoNn26bg.
Webinar: Will the Real AI Please Stand Up? from Interset
]]>
543 4 https://cdn.slidesharecdn.com/ss_thumbnails/june12webinar-180612193322-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Connectors San Antonio Cybersecurity Conference 2018 /slideshow/data-connectors-san-antonio-cybersecurity-conference-2018/99827993 roykeynotedataconnectorsmay3120181-180531230555
In this presentation, Interset Principal Data Scientist Roy Wilds dives into examples of how companies have successfully deployed security analytics. He also addresses how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results.]]>

In this presentation, Interset Principal Data Scientist Roy Wilds dives into examples of how companies have successfully deployed security analytics. He also addresses how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results.]]>
Thu, 31 May 2018 23:05:54 GMT /slideshow/data-connectors-san-antonio-cybersecurity-conference-2018/99827993 Interset@slideshare.net(Interset) Data Connectors San Antonio Cybersecurity Conference 2018 Interset In this presentation, Interset Principal Data Scientist Roy Wilds dives into examples of how companies have successfully deployed security analytics. He also addresses how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/roykeynotedataconnectorsmay3120181-180531230555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation, Interset Principal Data Scientist Roy Wilds dives into examples of how companies have successfully deployed security analytics. He also addresses how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results.
Data Connectors San Antonio Cybersecurity Conference 2018 from Interset
]]>
201 4 https://cdn.slidesharecdn.com/ss_thumbnails/roykeynotedataconnectorsmay3120181-180531230555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IANS Forum Dallas - Technology Spotlight Session /slideshow/ians-forum-dallas-technology-spotlight-session/95742877 ianstechnologyspotlightsessions2018dallas04-180502190512
Take a deep dive into the Interset AI-enabled, security analytics platform to learn how to cut through the noise and identify the high-quality threat leads that matter the most - before your data is stolen.]]>

Take a deep dive into the Interset AI-enabled, security analytics platform to learn how to cut through the noise and identify the high-quality threat leads that matter the most - before your data is stolen.]]>
Wed, 02 May 2018 19:05:12 GMT /slideshow/ians-forum-dallas-technology-spotlight-session/95742877 Interset@slideshare.net(Interset) IANS Forum Dallas - Technology Spotlight Session Interset Take a deep dive into the Interset AI-enabled, security analytics platform to learn how to cut through the noise and identify the high-quality threat leads that matter the most - before your data is stolen. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologyspotlightsessions2018dallas04-180502190512-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Take a deep dive into the Interset AI-enabled, security analytics platform to learn how to cut through the noise and identify the high-quality threat leads that matter the most - before your data is stolen.
IANS Forum Dallas - Technology Spotlight Session from Interset
]]>
97 2 https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologyspotlightsessions2018dallas04-180502190512-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Operationalizing Big Data Security Analytics - IANS Forum Dallas /slideshow/operationalizing-big-data-security-analytics-ians-forum-dallas/95735016 stephanskeynoteiansmay2018-final-180502180610
At IANS Forum Dallas, Interset CTO Stephan Jou discussed how Interset's AI-enabled security analytics platform can connect organizations' fragmented security ecosystems and distill billions of events from across the enterprise into a handful of prioritized, high-quality security leads that security teams can focus on.]]>

At IANS Forum Dallas, Interset CTO Stephan Jou discussed how Interset's AI-enabled security analytics platform can connect organizations' fragmented security ecosystems and distill billions of events from across the enterprise into a handful of prioritized, high-quality security leads that security teams can focus on.]]>
Wed, 02 May 2018 18:06:10 GMT /slideshow/operationalizing-big-data-security-analytics-ians-forum-dallas/95735016 Interset@slideshare.net(Interset) Operationalizing Big Data Security Analytics - IANS Forum Dallas Interset At IANS Forum Dallas, Interset CTO Stephan Jou discussed how Interset's AI-enabled security analytics platform can connect organizations' fragmented security ecosystems and distill billions of events from across the enterprise into a handful of prioritized, high-quality security leads that security teams can focus on. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stephanskeynoteiansmay2018-final-180502180610-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At IANS Forum Dallas, Interset CTO Stephan Jou discussed how Interset&#39;s AI-enabled security analytics platform can connect organizations&#39; fragmented security ecosystems and distill billions of events from across the enterprise into a handful of prioritized, high-quality security leads that security teams can focus on.
Operationalizing Big Data Security Analytics - IANS Forum Dallas from Interset
]]>
134 2 https://cdn.slidesharecdn.com/ss_thumbnails/stephanskeynoteiansmay2018-final-180502180610-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum] /slideshow/innovation-in-cybersecurity-montreal-2018-criaq-rdv-forum/94792261 interset-innovatingincybersecurity-180423194815
At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats. ]]>

At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats. ]]>
Mon, 23 Apr 2018 19:48:15 GMT /slideshow/innovation-in-cybersecurity-montreal-2018-criaq-rdv-forum/94792261 Interset@slideshare.net(Interset) Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum] Interset At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/interset-innovatingincybersecurity-180423194815-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset&#39;s mission to apply principled math and data science to cybersecurity in order to detect insider threats.
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum] from Interset
]]>
411 4 https://cdn.slidesharecdn.com/ss_thumbnails/interset-innovatingincybersecurity-180423194815-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote /slideshow/operationalizing-big-data-security-analytics-ians-forum-toronto-keynote/93720693 stephanskeynoteiansmay2018-updated-180412211200
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. ]]>

Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. ]]>
Thu, 12 Apr 2018 21:12:00 GMT /slideshow/operationalizing-big-data-security-analytics-ians-forum-toronto-keynote/93720693 Interset@slideshare.net(Interset) Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote Interset Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stephanskeynoteiansmay2018-updated-180412211200-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset&#39;s threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote from Interset
]]>
397 8 https://cdn.slidesharecdn.com/ss_thumbnails/stephanskeynoteiansmay2018-updated-180412211200-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Operationalize Big Data Security Analytics - Technology Spotlight at IANS Forum NYC 2018 /slideshow/how-to-operationalize-big-data-security-analytics-91351071/91351071 ianstechnologyspotlight2018v7forslideshare-180320221401
At IANS Forum NYC 2018, Interset Technology Architect Bob Patten discussed how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. ]]>

At IANS Forum NYC 2018, Interset Technology Architect Bob Patten discussed how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. ]]>
Tue, 20 Mar 2018 22:14:01 GMT /slideshow/how-to-operationalize-big-data-security-analytics-91351071/91351071 Interset@slideshare.net(Interset) How to Operationalize Big Data Security Analytics - Technology Spotlight at IANS Forum NYC 2018 Interset At IANS Forum NYC 2018, Interset Technology Architect Bob Patten discussed how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologyspotlight2018v7forslideshare-180320221401-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At IANS Forum NYC 2018, Interset Technology Architect Bob Patten discussed how companies can operationalize security analytics with Interset&#39;s threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
How to Operationalize Big Data Security Analytics - Technology Spotlight at IANS Forum NYC 2018 from Interset
]]>
424 3 https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologyspotlight2018v7forslideshare-180320221401-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats /slideshow/webinar-how-to-use-artificial-intelligence-to-prevent-insider-threats/86931141 aiinsiderthreatwebinarinterset-180130185249
Interset CTO Stephan Jou joins Holger Schulze, CEO at Cybersecurity Insiders, to discuss the impact of insider attacks and how AI can be used to mitigate these threats. To watch the webinar recording, click here: https://register.gotowebinar.com/register/2916777136713869315 Want to learn more about the risks of insider threats? Check out highlights from the 2018 Insider Threat Report: /Interset/2018-insider-threat-report-infographic ]]>

Interset CTO Stephan Jou joins Holger Schulze, CEO at Cybersecurity Insiders, to discuss the impact of insider attacks and how AI can be used to mitigate these threats. To watch the webinar recording, click here: https://register.gotowebinar.com/register/2916777136713869315 Want to learn more about the risks of insider threats? Check out highlights from the 2018 Insider Threat Report: /Interset/2018-insider-threat-report-infographic ]]>
Tue, 30 Jan 2018 18:52:49 GMT /slideshow/webinar-how-to-use-artificial-intelligence-to-prevent-insider-threats/86931141 Interset@slideshare.net(Interset) WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats Interset Interset CTO Stephan Jou joins Holger Schulze, CEO at Cybersecurity Insiders, to discuss the impact of insider attacks and how AI can be used to mitigate these threats. To watch the webinar recording, click here: https://register.gotowebinar.com/register/2916777136713869315 Want to learn more about the risks of insider threats? Check out highlights from the 2018 Insider Threat Report: /Interset/2018-insider-threat-report-infographic <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aiinsiderthreatwebinarinterset-180130185249-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Interset CTO Stephan Jou joins Holger Schulze, CEO at Cybersecurity Insiders, to discuss the impact of insider attacks and how AI can be used to mitigate these threats. To watch the webinar recording, click here: https://register.gotowebinar.com/register/2916777136713869315 Want to learn more about the risks of insider threats? Check out highlights from the 2018 Insider Threat Report: /Interset/2018-insider-threat-report-infographic
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats from Interset
]]>
2761 7 https://cdn.slidesharecdn.com/ss_thumbnails/aiinsiderthreatwebinarinterset-180130185249-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Machine Learning + AI for Accelerated Threat-Hunting /slideshow/machine-learning-ai-for-accelerated-threathunting/83015176 mpowereuropeintersetnov2017slideshare-171130002249
How quickly can your enterprise find the cyberthreats that matter? In case you missed our talk at #MPOWER17, this is how the new Interset-McAfee security ecosystem helps security teams find them faster.]]>

How quickly can your enterprise find the cyberthreats that matter? In case you missed our talk at #MPOWER17, this is how the new Interset-McAfee security ecosystem helps security teams find them faster.]]>
Thu, 30 Nov 2017 00:22:49 GMT /slideshow/machine-learning-ai-for-accelerated-threathunting/83015176 Interset@slideshare.net(Interset) Machine Learning + AI for Accelerated Threat-Hunting Interset How quickly can your enterprise find the cyberthreats that matter? In case you missed our talk at #MPOWER17, this is how the new Interset-McAfee security ecosystem helps security teams find them faster. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mpowereuropeintersetnov2017slideshare-171130002249-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How quickly can your enterprise find the cyberthreats that matter? In case you missed our talk at #MPOWER17, this is how the new Interset-McAfee security ecosystem helps security teams find them faster.
Machine Learning + AI for Accelerated Threat-Hunting from Interset
]]>
538 2 https://cdn.slidesharecdn.com/ss_thumbnails/mpowereuropeintersetnov2017slideshare-171130002249-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Infographic: Inside Data Breaches /slideshow/infographic-inside-data-breaches/83010351 interset-inside-data-breaches-infographic2-171129222047
How to evaluate the cost of a data breach and some of the challenges security teams face today. How machine learning and big data analytics can help. ]]>

How to evaluate the cost of a data breach and some of the challenges security teams face today. How machine learning and big data analytics can help. ]]>
Wed, 29 Nov 2017 22:20:47 GMT /slideshow/infographic-inside-data-breaches/83010351 Interset@slideshare.net(Interset) Infographic: Inside Data Breaches Interset How to evaluate the cost of a data breach and some of the challenges security teams face today. How machine learning and big data analytics can help. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/interset-inside-data-breaches-infographic2-171129222047-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to evaluate the cost of a data breach and some of the challenges security teams face today. How machine learning and big data analytics can help.
Infographic: Inside Data Breaches from Interset
]]>
419 6 https://cdn.slidesharecdn.com/ss_thumbnails/interset-inside-data-breaches-infographic2-171129222047-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
User and Entity Behavioral Analytics /slideshow/user-and-entity-behavioral-analytics/82219782 2017-11-14syneruebakeynotev2-171117151247
In security, rules and thresholds create an excess of security alerts. This slows down security teams, and buries real threats to the enterprise. Analytics, in contrast, will take billions of events and distill them into a handful of true threat leads. This presentation explains—through case studies—how to use statistical methods to validate threats and reduce false positives. ]]>

In security, rules and thresholds create an excess of security alerts. This slows down security teams, and buries real threats to the enterprise. Analytics, in contrast, will take billions of events and distill them into a handful of true threat leads. This presentation explains—through case studies—how to use statistical methods to validate threats and reduce false positives. ]]>
Fri, 17 Nov 2017 15:12:47 GMT /slideshow/user-and-entity-behavioral-analytics/82219782 Interset@slideshare.net(Interset) User and Entity Behavioral Analytics Interset In security, rules and thresholds create an excess of security alerts. This slows down security teams, and buries real threats to the enterprise. Analytics, in contrast, will take billions of events and distill them into a handful of true threat leads. This presentation explains—through case studies—how to use statistical methods to validate threats and reduce false positives. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-11-14syneruebakeynotev2-171117151247-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In security, rules and thresholds create an excess of security alerts. This slows down security teams, and buries real threats to the enterprise. Analytics, in contrast, will take billions of events and distill them into a handful of true threat leads. This presentation explains—through case studies—how to use statistical methods to validate threats and reduce false positives.
User and Entity Behavioral Analytics from Interset
]]>
1053 3 https://cdn.slidesharecdn.com/ss_thumbnails/2017-11-14syneruebakeynotev2-171117151247-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A New Approach to Threat Detection: Big Data Security Analytics /slideshow/a-new-approach-to-threat-detection-big-data-security-analytics/81711165 iansatlanta-171107144110
Learn how to distill billions of events into a handful of security leads. Security analytics powered by machine learning is proven to make your SOC more efficient. This presentation includes four case studies. ]]>

Learn how to distill billions of events into a handful of security leads. Security analytics powered by machine learning is proven to make your SOC more efficient. This presentation includes four case studies. ]]>
Tue, 07 Nov 2017 14:41:10 GMT /slideshow/a-new-approach-to-threat-detection-big-data-security-analytics/81711165 Interset@slideshare.net(Interset) A New Approach to Threat Detection: Big Data Security Analytics Interset Learn how to distill billions of events into a handful of security leads. Security analytics powered by machine learning is proven to make your SOC more efficient. This presentation includes four case studies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iansatlanta-171107144110-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how to distill billions of events into a handful of security leads. Security analytics powered by machine learning is proven to make your SOC more efficient. This presentation includes four case studies.
A New Approach to Threat Detection: Big Data Security Analytics from Interset
]]>
340 1 https://cdn.slidesharecdn.com/ss_thumbnails/iansatlanta-171107144110-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Interset-48x48.jpg?cb=1573758480 Radically accelerating #cyberthreat detection with dynamic machine learning & AI #bigdata #ML #AI #infosec #securityanalytics #UEBA #threatdetection (For more information, visit Interset.com) Interset.ai https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181003004433-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ians-forum-dc-operationalizing-big-data-security-tech-spotlight/117876287 IANS Forum DC: Operati... https://cdn.slidesharecdn.com/ss_thumbnails/intersetkeynoteianscharlotte1-181003004254-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ians-forum-dc-everything-is-a-nail-machine-learning-in-cybersecurity/117876166 IANS Forum DC: Everyth... https://cdn.slidesharecdn.com/ss_thumbnails/ianstechnologysessionscharlottemh0918181-181001215101-thumbnail.jpg?width=320&height=320&fit=bounds Interset/ians-forum-charlotte-operationalizing-big-data-security-tech-spotlight IANS Forum Charlotte: ...