In this episode of the award winning teissTalk, Jenny and her guests consider:
- How can InfoSec teams test and recognise AI bias?
- What can you do to prevent biased AI models missing unknown threats?
- How can you avoid creating biased algorithms?
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
Library › Mapping AI to Your Security Posture and Avoiding Overlooked Threats
In this episode of the award winning teissTalk, Jenny and her guests consider:
Click "Submit” to watch this webinar now.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |