SlideShare una empresa de Scribd logo
1 de 17
1 IBM Security
LEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI – What is it really?
Jeff Crume, CISSP-ISSAP
Nov 2018
Distinguished Engineer
IBM Master Inventor
crume@us.ibm.com
INTERNAL USE ONLY – DO NOT DISTRIBUTE
3 IBM Security INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI Primer
INTERNAL USE ONLY – DO NOT DISTRIBUTE
5 IBM Security
• Webster - “a branch of computer science dealing with the simulation of intelligent
behavior in computers.” [1]
• OED - “the theory and development of computer systems able to perform tasks normally
requiring human intelligence, such as visual perception, speech recognition,
decision-making, and translation between languages.” [2]
• OK, but what does that mean in plain English?
AI essentially involves making computers more able to match or exceed human
intelligence in its various forms by mimicking the human ability to discover, infer and
reason.
AI Defined
[1] https://www.merriam-webster.com/dictionary/artificial%20intelligence
[2] https://en.oxforddictionaries.com/definition/artificial_intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
6 IBM Security
AI Technologies
 Reasoning, problem solving
 Knowledge representation
 Planning
 Learning
 Natural language processing
 Perception
 Motion and manipulation
 Social intelligence
 Creativity
 General intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
7 IBM Security
Artificial Intelligence and Sub Categories
Artificial Intelligence
Cognitive
Machine Learning
Deep Learning
o Machine learning is a subfield of AI and
computer science that has its roots in
statistics and mathematical optimization.
Machine learning covers techniques in
supervised and unsupervised learning for
applications in prediction, analytics, and
data mining.*
o Deep learning isn't an algorithm, per se,
but rather a family of algorithms that
implement deep networks with
unsupervised learning.*
* “A beginner's guide to artificial intelligence, machine learning, and cognitive computing”
https://www.ibm.com/developerworks/library/cc-beginner-guide-machine-learning-ai-cognitive/index.html
INTERNAL USE ONLY – DO NOT DISTRIBUTE
8 IBM Security
Introduction to Machine Learning
A subfield of computer science that enables computers to learn without being explictly
programmed
- Arthur Samuel in 1959
Supervised Learning
Inferring a general rule or mathematical
function from labeled training data to be
applied to other data
Primary Use Cases
• Regression Analysis
o Deriving correlation relationships
between variables and estimating the
strength of those relationships
o Widely used for prediction and
forecasting
• Classification:
o Produces a model from a training set
that can assign unseen inputs into
different categories
Unsupervised Learning
Detecting the presence of patterns or models
from unlabeled data
Primary Use Cases
• Clustering
o Data is divided into different groups
based on one or more attributes
• Dimensionality Reduction
o process of reducing the number of
random variables under consideration,
via obtaining a set of principal variables
o Feature Selection: finding subset of the
original variables
o Feature Extraction: transform high-
dimensional space to a space of fewer
dimensions
INTERNAL USE ONLY – DO NOT DISTRIBUTE
9 IBM Security
Cognitive computing enables systems to process and act on data,
like humans
They understand
 Intent, tone, personality
 Submissions, contracts,
claims
 Legal & regulatory
obligations, guidelines
 News, market data…
like humans do
They can
 Identify similar risks and
claims
 Assess risk
 Check for compliance
 Spot new sales
opportunities, …
infer and extract ideas
With abilities to see, talk
and hear they can support
 Clients, agents & broker
 Contact center agents
 Underwriter
 Claims handler
and many others
in a natural way
They learn from every
interaction and
 Extract and improve
best practices
 Digest new regulatory
requirements,
guidelines…
and never stop learning
ReasonUnderstand Interact Learn
INTERNAL USE ONLY – DO NOT DISTRIBUTE
10 IBM Security
Cognitive Solutions Reason and Present their Reasoning Process
Grep
Grep
Search
Pattern
Matching
Correlation
and rules
Behavioral
Analytics
Cognition
Increasing data volumes, variety and complexity
Increasingattackandthreatsophistication
Reasoning about
threats and risks
Helping security teams not only detect where the threat is but also resolving the
what, how, why, when and who to improve the overall incident response timeline
Recognition of threats and
risks
Cognitive Traits:
• language
comprehension
• deductive reasoning
and
• self-learning
INTERNAL USE ONLY – DO NOT DISTRIBUTE
11 IBM Security
Smart but not cognitive
INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI in the Real World
INTERNAL USE ONLY – DO NOT DISTRIBUTE
13 IBM Security
13
Watson answers a grand challenge
Can we design a computing system that rivals a human’s ability to answer
questions posed in natural language, interpreting meaning and context and
retrieving, analyzing and understanding vast amounts of information in real-time?
INTERNAL USE ONLY – DO NOT DISTRIBUTE
14 IBM Security
3 Min 58 Sec 4 Min 35 Sec
Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147
INTERNAL USE ONLY – DO NOT DISTRIBUTE
15 IBM Security
From Jeopardy! To Cancer
• 60 Minutes profile Oct 2016
 IBM and UNC Lineberger Cancer Center
• 8,000 new medical research papers
published per day
• Studied 1,000 patients
• Watson recommendations matched
Tumor Board experts 99% of the
time
• Watson found additional treatment
options in 30% of cases
Transcript at https://www.cbsnews.com/amp/news/60-minutes-artificial-intelligence-charlie-rose-robot-sophia
INTERNAL USE ONLY – DO NOT DISTRIBUTE
16 IBM Security
www.ibm.com/security/artificial-intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
THANK YOU
INTERNAL USE ONLY – DO NOT DISTRIBUTE

Más contenido relacionado

La actualidad más candente

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityClaus Cramon Houmann
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 

La actualidad más candente (9)

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Hci activity#2
Hci activity#2Hci activity#2
Hci activity#2
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 

Similar a PCM Vision 2019 Keynote: Jeff Crume

PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Securityscoopnewsgroup
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEMThomas Springer
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityGerard McNamee
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptxEmanAzam
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOsMorten Bjørklund
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everEC-Council
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTrupti Shiralkar, CISSP
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?HelpSystems
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 

Similar a PCM Vision 2019 Keynote: Jeff Crume (20)

PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 

Más de PCM

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel UnitePCM
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud SolutionsPCM
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVityPCM
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation SlidesPCM
 

Más de PCM (18)

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPI
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: Cisco
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd Pekats
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: Veritas
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot Baretz
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest Software
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: Samsung
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: Symantec
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

PCM Vision 2019 Keynote: Jeff Crume

  • 1. 1 IBM Security LEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 2. AI – What is it really? Jeff Crume, CISSP-ISSAP Nov 2018 Distinguished Engineer IBM Master Inventor crume@us.ibm.com INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 3. 3 IBM Security INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 4. AI Primer INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 5. 5 IBM Security • Webster - “a branch of computer science dealing with the simulation of intelligent behavior in computers.” [1] • OED - “the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.” [2] • OK, but what does that mean in plain English? AI essentially involves making computers more able to match or exceed human intelligence in its various forms by mimicking the human ability to discover, infer and reason. AI Defined [1] https://www.merriam-webster.com/dictionary/artificial%20intelligence [2] https://en.oxforddictionaries.com/definition/artificial_intelligence INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 6. 6 IBM Security AI Technologies  Reasoning, problem solving  Knowledge representation  Planning  Learning  Natural language processing  Perception  Motion and manipulation  Social intelligence  Creativity  General intelligence INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 7. 7 IBM Security Artificial Intelligence and Sub Categories Artificial Intelligence Cognitive Machine Learning Deep Learning o Machine learning is a subfield of AI and computer science that has its roots in statistics and mathematical optimization. Machine learning covers techniques in supervised and unsupervised learning for applications in prediction, analytics, and data mining.* o Deep learning isn't an algorithm, per se, but rather a family of algorithms that implement deep networks with unsupervised learning.* * “A beginner's guide to artificial intelligence, machine learning, and cognitive computing” https://www.ibm.com/developerworks/library/cc-beginner-guide-machine-learning-ai-cognitive/index.html INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 8. 8 IBM Security Introduction to Machine Learning A subfield of computer science that enables computers to learn without being explictly programmed - Arthur Samuel in 1959 Supervised Learning Inferring a general rule or mathematical function from labeled training data to be applied to other data Primary Use Cases • Regression Analysis o Deriving correlation relationships between variables and estimating the strength of those relationships o Widely used for prediction and forecasting • Classification: o Produces a model from a training set that can assign unseen inputs into different categories Unsupervised Learning Detecting the presence of patterns or models from unlabeled data Primary Use Cases • Clustering o Data is divided into different groups based on one or more attributes • Dimensionality Reduction o process of reducing the number of random variables under consideration, via obtaining a set of principal variables o Feature Selection: finding subset of the original variables o Feature Extraction: transform high- dimensional space to a space of fewer dimensions INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 9. 9 IBM Security Cognitive computing enables systems to process and act on data, like humans They understand  Intent, tone, personality  Submissions, contracts, claims  Legal & regulatory obligations, guidelines  News, market data… like humans do They can  Identify similar risks and claims  Assess risk  Check for compliance  Spot new sales opportunities, … infer and extract ideas With abilities to see, talk and hear they can support  Clients, agents & broker  Contact center agents  Underwriter  Claims handler and many others in a natural way They learn from every interaction and  Extract and improve best practices  Digest new regulatory requirements, guidelines… and never stop learning ReasonUnderstand Interact Learn INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 10. 10 IBM Security Cognitive Solutions Reason and Present their Reasoning Process Grep Grep Search Pattern Matching Correlation and rules Behavioral Analytics Cognition Increasing data volumes, variety and complexity Increasingattackandthreatsophistication Reasoning about threats and risks Helping security teams not only detect where the threat is but also resolving the what, how, why, when and who to improve the overall incident response timeline Recognition of threats and risks Cognitive Traits: • language comprehension • deductive reasoning and • self-learning INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 11. 11 IBM Security Smart but not cognitive INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 12. AI in the Real World INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 13. 13 IBM Security 13 Watson answers a grand challenge Can we design a computing system that rivals a human’s ability to answer questions posed in natural language, interpreting meaning and context and retrieving, analyzing and understanding vast amounts of information in real-time? INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 14. 14 IBM Security 3 Min 58 Sec 4 Min 35 Sec Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 15. 15 IBM Security From Jeopardy! To Cancer • 60 Minutes profile Oct 2016  IBM and UNC Lineberger Cancer Center • 8,000 new medical research papers published per day • Studied 1,000 patients • Watson recommendations matched Tumor Board experts 99% of the time • Watson found additional treatment options in 30% of cases Transcript at https://www.cbsnews.com/amp/news/60-minutes-artificial-intelligence-charlie-rose-robot-sophia INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 17. © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions FOLLOW US ON: THANK YOU INTERNAL USE ONLY – DO NOT DISTRIBUTE