2. AI – What is it really?
Jeff Crume, CISSP-ISSAP
Nov 2018
Distinguished Engineer
IBM Master Inventor
crume@us.ibm.com
INTERNAL USE ONLY – DO NOT DISTRIBUTE
5. 5 IBM Security
• Webster - “a branch of computer science dealing with the simulation of intelligent
behavior in computers.” [1]
• OED - “the theory and development of computer systems able to perform tasks normally
requiring human intelligence, such as visual perception, speech recognition,
decision-making, and translation between languages.” [2]
• OK, but what does that mean in plain English?
AI essentially involves making computers more able to match or exceed human
intelligence in its various forms by mimicking the human ability to discover, infer and
reason.
AI Defined
[1] https://www.merriam-webster.com/dictionary/artificial%20intelligence
[2] https://en.oxforddictionaries.com/definition/artificial_intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
6. 6 IBM Security
AI Technologies
Reasoning, problem solving
Knowledge representation
Planning
Learning
Natural language processing
Perception
Motion and manipulation
Social intelligence
Creativity
General intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
7. 7 IBM Security
Artificial Intelligence and Sub Categories
Artificial Intelligence
Cognitive
Machine Learning
Deep Learning
o Machine learning is a subfield of AI and
computer science that has its roots in
statistics and mathematical optimization.
Machine learning covers techniques in
supervised and unsupervised learning for
applications in prediction, analytics, and
data mining.*
o Deep learning isn't an algorithm, per se,
but rather a family of algorithms that
implement deep networks with
unsupervised learning.*
* “A beginner's guide to artificial intelligence, machine learning, and cognitive computing”
https://www.ibm.com/developerworks/library/cc-beginner-guide-machine-learning-ai-cognitive/index.html
INTERNAL USE ONLY – DO NOT DISTRIBUTE
8. 8 IBM Security
Introduction to Machine Learning
A subfield of computer science that enables computers to learn without being explictly
programmed
- Arthur Samuel in 1959
Supervised Learning
Inferring a general rule or mathematical
function from labeled training data to be
applied to other data
Primary Use Cases
• Regression Analysis
o Deriving correlation relationships
between variables and estimating the
strength of those relationships
o Widely used for prediction and
forecasting
• Classification:
o Produces a model from a training set
that can assign unseen inputs into
different categories
Unsupervised Learning
Detecting the presence of patterns or models
from unlabeled data
Primary Use Cases
• Clustering
o Data is divided into different groups
based on one or more attributes
• Dimensionality Reduction
o process of reducing the number of
random variables under consideration,
via obtaining a set of principal variables
o Feature Selection: finding subset of the
original variables
o Feature Extraction: transform high-
dimensional space to a space of fewer
dimensions
INTERNAL USE ONLY – DO NOT DISTRIBUTE
9. 9 IBM Security
Cognitive computing enables systems to process and act on data,
like humans
They understand
Intent, tone, personality
Submissions, contracts,
claims
Legal & regulatory
obligations, guidelines
News, market data…
like humans do
They can
Identify similar risks and
claims
Assess risk
Check for compliance
Spot new sales
opportunities, …
infer and extract ideas
With abilities to see, talk
and hear they can support
Clients, agents & broker
Contact center agents
Underwriter
Claims handler
and many others
in a natural way
They learn from every
interaction and
Extract and improve
best practices
Digest new regulatory
requirements,
guidelines…
and never stop learning
ReasonUnderstand Interact Learn
INTERNAL USE ONLY – DO NOT DISTRIBUTE
10. 10 IBM Security
Cognitive Solutions Reason and Present their Reasoning Process
Grep
Grep
Search
Pattern
Matching
Correlation
and rules
Behavioral
Analytics
Cognition
Increasing data volumes, variety and complexity
Increasingattackandthreatsophistication
Reasoning about
threats and risks
Helping security teams not only detect where the threat is but also resolving the
what, how, why, when and who to improve the overall incident response timeline
Recognition of threats and
risks
Cognitive Traits:
• language
comprehension
• deductive reasoning
and
• self-learning
INTERNAL USE ONLY – DO NOT DISTRIBUTE
12. AI in the Real World
INTERNAL USE ONLY – DO NOT DISTRIBUTE
13. 13 IBM Security
13
Watson answers a grand challenge
Can we design a computing system that rivals a human’s ability to answer
questions posed in natural language, interpreting meaning and context and
retrieving, analyzing and understanding vast amounts of information in real-time?
INTERNAL USE ONLY – DO NOT DISTRIBUTE
14. 14 IBM Security
3 Min 58 Sec 4 Min 35 Sec
Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147
INTERNAL USE ONLY – DO NOT DISTRIBUTE
15. 15 IBM Security
From Jeopardy! To Cancer
• 60 Minutes profile Oct 2016
IBM and UNC Lineberger Cancer Center
• 8,000 new medical research papers
published per day
• Studied 1,000 patients
• Watson recommendations matched
Tumor Board experts 99% of the
time
• Watson found additional treatment
options in 30% of cases
Transcript at https://www.cbsnews.com/amp/news/60-minutes-artificial-intelligence-charlie-rose-robot-sophia
INTERNAL USE ONLY – DO NOT DISTRIBUTE