Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

How to Effectively Use AI and ML in Security

Group-IB's Aleksandr Lazarenko on Overcoming the Challenges
Aleksandr Lazarenko, head of R&D, Group-IB.
Aleksandr Lazarenko, head of R&D department, Group-IB

It's difficult to build a reliable security system based on artificial intelligence and machine learning, says Aleksandr Lazarenko of Group-IB, who offers insights on how to make the most of these technologies.

See Also: Live Webinar | Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level

"There are a lot of problems in implementing these systems because it is pretty hard to build a system which will protect customers," Lazarenko says.

In a video interview with Information Security Media Group at the recent RSA Conference 2019 in Singapore Lazarenko discusses:

  • Specific uses for AI and ML in security;
  • How to effectively implement AI and ML;
  • The biggest AI challenges.

Lazarenko is head of the R&D department at Group-IB. He is responsible for scientific research and development of new products. The author of numerous papers on anonymity issues, Lazarenko has invented patented technologies and solutions.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.