Session Level: Intermediate
CIO-Only Track Delegates
IOT Security and Risks. How Machine Learning Can Mitigate: Discuss a number of challenges that exist in identifying compromises in IoT environments. We will then discuss in detail the AI and ML-based analytics and deployment methodologies that can be used to identify compromises in this area. We will show several examples of compromises and how they were identified with AI and Machine Learning algorithms..
About Pete Nicoletti: Pete has 31 years of progressive responsibility in the deployment, marketing, sales, product development, engineering design, project implementation and operation of information technology, IaaS/SaaS/PaaS, cloud, data center operations, the entire spectrum of security technologies, compliance frameworks, Global Security Deployments and operations and Managed Security Service Provider services and operations.Presenter: Pete Nicoletti - Cloud Security Rainmaker (CISO, Board Member and Advisor)
Pete is the former CISO of Hertz global, Virtustream (a Dell company) and VP of Security engineering at Terremark/Verizon. Pete has been a local S. Florida trailblazer with a wireless ISP, a network engineering company and a CRM telephony company. Pete has 31 years of progressive responsibility in ... Read More