Machine Learning: Snake Oil or the Next Big Idea in Cybersecurity?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Those defending against cyber-attacks are overwhelmed by the sheer volume of incidents to respond to. It is so bad that it has been said that there may be as many as 1 million unfilled cybersecurity jobs in order to deal with them.

One way to deal with this problem is machine learning and automation, which is heralded as the way to deal with so many incidents, with the press of a button. While there is much promise in machine learning, there are also many perils that need to be considered.

In this webinar we will look at the trend of machine learning, ask how businesses are using this technology and look at what benefits it can bring.

Key takeaways from this webinar: 

  • Understand what machine learning is, and how it works
  • Look at how new and old technologies are being boosted by machine learning
  • How the concept of machine learning works, and how it can better defend your organization and deal with a shortage of resources


John Bambenek

Manager of Threat Systems, Fidelis Cybersecurity

Rik Turner

Principal Analyst, Ovum

    Dominic Vogel

    Chief Security Strategist, Cyber.SC

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.