CEC / IEEE Joint Meeting at Chatt State
CHATTANOOGA ENGINEERS CLUB
joint lunch meeting with
IEEE - CHATTANOOGA SECTION
Presentation:
Machine Learning & Cyber Security: How Smart Can It Be?
Shayne Champion will evaluate Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI) as used within cyber security. He will explore the difference between ML, DL, and AI, and show how these technologies work - as well as their shortcomings. He will also discuss how these tools could work to help reduce risk and how to apply them in the workplace security environment.
Location: Chattanooga State Community College, Hennen Center in Center for Business, Industry & Health (CBIH)
See link to campus map - https://www.pointsmap.com/chattstatecampus/
Best access to CBIH is to use the West Entrance to Chattanooga State. West Entrance is also the driveway for Wacker Institute and STEM High School. Please park in lot P18. (parking passes will be emailed after receiving registration!)
PDH will be available for this presentation.
Pizza and drink will be available for $5 per person, with RSVP!
RSVP via CEC event link - https://chattanoogaengineersclub.org/event-3285378
Chattanooga Section : https://webinabox.vtools.ieee.org/wibp_home/index/R30711
Date and Time
Location
Hosts
Registration
- Date: 11 Mar 2019
- Time: 12:00 PM to 02:00 PM
- All times are (GMT-05:00) US/Eastern
- Add Event to Calendar
- Chattanooga State Community College
- Chattanooga, Tennessee
- United States
- Building: Hennen Center in Center for Business, Industry & Health (CBIH)
Speakers
Shayne Champion, Chief Information Security Officer, Conversant Group of Chief Information Security Officer, Conversant Group
Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI) as used within cyber security
Shayne Champion will evaluate Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI) as used within cyber security. He will explore the difference between ML, DL, and AI, and show how these technologies work - as well as their shortcomings. He will also discuss how these tools could work to help reduce risk and how to apply them in the workplace security environment.
Biography:
Chief Information Security Officer, Conversant Group