- 註冊時間
- 2024-3-14
- 最後登錄
- 2024-3-14
- 閱讀權限
- 10
- 積分
- 5
- 精華
- 0
- 帖子
- 1
該用戶從未簽到
|
Finally, the importance of not only implementing these security measures, but also of maintaining constant monitoring to ensure their effectiveness over time was highlighted. Cybersecurity and Artificial Intelligence In the presentation "The role of Artificial Intelligence in cybersecurity," by Alejandro Casas, Senior Manager at Oracle , he delved into the historical and contemporary impact of Artificial Intelligence (AI) in the field of cybersecurity. Casas began by contextualizing the evolution of AI, from its beginnings in the s to its current relevance, highlighting how it has gone from being a futuristic vision to an integral tool in the business world.
He highlighted the growing adoption of AI solutions ID Number List in organizations, noting that more than of them have Artificial Intelligence implementations in production. The role of AI was emphasized as a strategic complement to increase productivity and generate value in the market, overcoming the initial perception of being an inaccessible technology. He spoke about the diversity of approaches in the field of AI, covering everything from supervised and unsupervised learning to the fascinating world of Deep Learning. of companies understanding these differences when implementing AI solutions, recognizing that not all applications require the same type of algorithm.
One of the highlights of this presentation was the impact of generative networks in recent years. These networks, according to Casas, have revolutionized AI's ability to generate creative content, automate processes and offer innovative solutions in crucial sectors such as health and finance . Cybersecurity as a priority how to convince senior management In the round table titled "Cybersecurity as a priority how to convince senior management and where to start", two experts, Betsabé Arjona ( Innovation Project Manager at Cámara Valencia ) and Xavier Ruiz ( COO at Ackcent Cybersecurity ) , debated the importance criticism of cybersecurity in the business environment .
|
|