NTXISSA – April Lunch and Learn
InfoSec Conference Summary
The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.
There is a current trend from “trapping” to “hunting”. Inorder to fully understand the impact of a breach, the detection of malware threats needs to be complemented by the proactive exploration of anomalous network behavior and inter-artifact relationships. This activity is supported by machine learning techniques, which can be leveraged to aggregate and classify events at an unprecedented scale. This presentation highlights how machine learning and artificial intelligence can support a human operator in assessing a sophisticated threat that has breached a target network.