The AI evolution into security and risk has been evolving. Initially referred to as Artificial Intelligence, AI is now better referred to as Augmented Intelligence. This session will briefly review where AI and Machine Learning have made their most significant impact on cybersecurity, aspects of election security, cost statistics from a recent Ponemon institute study, the future of AI, and how its growing pains are being addressed in bias and trust.
Michael Melore, CISSP
Senior CyberSecurity Advisor
IBM’s Security Ambassador, Senior Cyber Security Advisor, Certified Information Systems Security Professional, Founder/Moderator for www.SecRT.us, regional CISO/Security Leader Round Table chapters across the US (1400+ Security Executive Members).
Author, a frequent National public speaker, and moderator, FBI InfraGard committeeman, serving on advisory boards and committees for NASCIO, IJIS, ATARC, and others, recognized subject matter expert in Security and Threat Intelligence, Identity Access Governance, and Authorization. Past Consulting roles include Lead architect for many of the world’s largest authentication and authorization infrastructures, including two of the 1st Billion user authentication infrastructures.
Champion of regularly scheduled cybersecurity threat simulation exercises, training, and education.
Date: Tuesday, November 8th, 2022
Time: 5:00 PM – 6:30 PM PDT
CPE: 1 CPE
|Members||Non-Members||Full-Time Students & Faculty|
|Rate|| Regular Rate
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. All applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited