Application Security , Artificial Intelligence & Machine Learning , DevSecOps

Underestimated Risk & Overestimated Security: When All You Do Is React, it May Be Too Late

class='video-tag' ismg-video='filename=Web1854-Cylance&ads=both'

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.

Artificial intelligence (AI) in cyber security shows how things can be done differently - predictively and preventively. In this webcast, Jan Tietze of Cylance explains how you can stay one step ahead of attackers and protect yourself against tomorrow's threats. Watch to learn more about:

  • What makes security solutions with AI so special;
  • What the mathematical approach in security tools is all about;
  • How to detect attackers and automate your response;
  • Why your company in particular can benefit from AI security.

About the Author

Jan Tietze

Jan Tietze

Technical Director EMEA, Cylance EMEA, Munich area

Jan is an experienced cyber security professional. Before joining the Cylance EMEA team in 2016, he has served in senior technical and management roles, most recently as CTO Germany at public cloud innovator Nordcloud (Helsinki, FI), and CTO EMEA at information management specialist AvePoint (New Jersey, US). Jan also has a strong background in enterprise IT from senior field engineering roles for Microsoft and Whale Communications (Israel, acquired by Microsoft). He started his career in pen testing and consulting. In his spare time, he likes to travel, tinker with technology, and explore the world with his family.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.