What does it mean and how does it work? Deep learning and machine learning are terms which are being used a lot these days, but what’s the difference and what do they actually mean?
More About the Speaker
With 15+ years in the IT security space as a software developer, architect and product manager, Karl has a passion for security and a deep commitment to drive the criminal syndicates and nation state actors off our networks and out of our devices. Over the years Karl has collaborated with organizations from small businesses to national defense agencies, both to understand the threats these organizations face and to design and build the software used to defend them from adversaries. With an engineering background, Karl has patents ranging from cryptographic methods for authentication to attribute correlation for device detection. Karl is currently employed at Sophos as a senior product manager for endpoint protection.
News of another major breach or Cyber incident at a big company seem to hit the headlines on a daily basis. The New York Times alone devoted over 700 articles to “breaches” last year. Most executives have reached “alert fatigue” and have simply tuned out. Yet, according to FBI statistics, 97% of the actual financial losses related to Cybercrime are occurring in small and mid-market organizations. The “CEO Email” Cyber scam alone cost US companies over $1.3 billion dollars and incidents are up 270% over last year.
These losses can have business ending impacts. Statistics inidcate that 60% of companies that have a major cyber incident will go out of business in 6 months. That number rises to 80% failure rate 18 months after the incident. Why? One major contributor is the fundamental misunderstanding of CyberSecurity in the mid-market C-Suite. In a recent survey, 82% of mid-market executives surveyed, stated that they don’t believe they are a target, said they don’t have anything a hacker would want, or asserted that CyberSecurity is exclusively a large organization problem. Clearly this perception is not matching reality.
This forces the question, how do you accurately quantify your organization’s Cyber risk? How much should you budget? Where should you spend? For those not conversant in the nomenclature of the information security professional, quantifying your organization’s overall Cyber Security posture can be a frustrating exercise. In this session Ken will outline the “Notorious Nine” risk factors using common business & financial metrics. More specifically, from the perspective of customer segments, revenue streams, the balance sheet and the importance of your company’s brand. If you have ever struggled to determine how much and where you should be spending on your cyber security program, this session is for you.
More About the Speaker
Ken has amassed over 25 years of experience as a CEO and IT Executive. He served as a CIO by age 35, and in his over 20,000 hours of consulting, Ken has helped companies of all sizes, design, host, and defend private, public, and hybrid cloud environments. His business philosophy is distringuished by a passion for excellence and his approach to technology is governed by an unrelenting drive to simplicity, value, and mission success.