online Event on
AI & Security
October 8, 2020
Agenda times are on EEST (Romanian time, UTC+3)
09:15 – 09:30
Welcome & intro
09:30 – 10:15
Cash flow prediction using Machine Learning, especially during exceptional times
Predicting Balance Sheet items and Cash Flow is a major challenge for today’s CFOs around the world, and it became exceptionally important during a cataclysmic event like the Coronavirus pandemic. They have been struggling with such topics for years, and most of the implementations we’ve seen are ranging from either something very naïve like extrapolating on past data to something a bit more scientific like extrapolating and including some external variables while applying some functions on that data.
All such approaches fail to rigorously apply the right relative “weights” of those external variables. In this session I will show how to find the external variables which actually determine the end result, calculating the coefficient of determination, embed that into the Machine Learning model, and then be able to predict better results.
Avaelgo General Manager, Microsoft Regional Director, Azure MVP
10:15 – 11:00
Legal challenges in ethical AI
Law and ethics are linked and for AI systems a number of legal and ethical issues arise. Although AI technology has raised many concerns, it is a great innovation and can bring many benefits to humankind. In the 4.0 society, the ethical implications of AI shall be properly managed to ensure the trustworthiness and responsible development of AI solutions.
The session will address the challenges of balancing ethical principles and a legal framework, that AI solutions shall reflect for a sustainable information society.
Partner, KPMG Legal
11:00 – 11:45
Over the Edge; Migration, Optimization and Intelligence for IoT devices with Microsoft Azure
What does a mature IoT Solution look like? Is it enough to just connect up to the cloud and go? What about my devices that can’t speak Cloudy? How do I understand and control what this costs me? What about the promised AI that lives in the Cloud??
In this session, Andy introduces and explores the role of Edge devices in a modern IoT architecture and can be made intelligent.
There will be demos using Azure IoT tools, code, Cloud resources and simulated IoT Edge devices.
Elastacloud Director, Microsoft Regional Director, Azure MVP, AI Entrepreneur
13:30 – 14:15
IT security in a post-COVID world
For a long time, IT Security has been a secondary topic for a lot of companies. More often than not, it only came to mind after an actual data breach or security incident, and was often overlooked otherwise. Over the years, things like WannaCry/Petya or GDPR compliance helped raise awareness a little bit, but those soon faded out as well.
However, the new “Low Touch Economy” emerging as a result of the COVID-19 pandemic could provide the jolt that IT Security needed for a long time. With a lot more people working remotely, the need to secure devices (laptops, phones, etc.), communication channels, as well as on-prem & Cloud infrastructure is now higher than ever before.
The global pressure on innovation and developing new business models to adapt to these changes is high. This session aims to address some of the major shifts and impacts of remote work by providing some ways to balance innovation and IT Security, while also touching on some of the ever-growing gaps in security incident detection and response.
Microsoft Cloud & Datacenter Management MVP, Certified Ethical Hacker
14:15 – 15:00
AI and Machine Learning in Cyber Security – a beginner’s guide
In the era of extremely large amount of data and cyber-security talent shortage, ML seems to be an only solution. But whats behind the buzzword? Which scenarios can machine learning aid in solving the most common tasks including regression, prediction, or classification?
This session is an introduction to give a practical technical understanding of the current advances and future directions of ML research applied to cyber-security. Based on real-world scenarios we will have a look into Microsoft solutions, will discuss how they behave and where they get their intelligence from.
Lead Security Analyst, Enterprise Security MVP
15:00 – 15:45
Mapping the Cyber Kill Chain: Anatomy of a Hack
The network perimeter as you once knew it is history, and your sensitive information must be protected from wherever it is accessed. The stakes can add up to tens of millions in losses. In this one-of-a-kind session, we will examine a high-profile security breach of a political giant, examining how the attack could have been thwarted at each step with the Microsoft cybersecurity stack.
Prepare for a session filled with drama, intrigue, scapegoats…and demos!
Herding cats toward cloud automation & security