Topics for discussion may include but are not limited to:
Insider threat detection
Network and endpoint forensics
Governance, compliance and exfiltration detection
Detection of script-based and malware-less attacks
Automated malware detection and classification
Vulnerability assessment
ML techniques and analytic or predictive themes might include:
Statistical analysis on large and small datasets
Unique considerations of base-rate fallacy for data science in information security
Data sources and data exploration and subsequent findings
Unique approaches to dataset visualization
Unsupervised methods and anomaly detection
Adversarial machine learning
Original or cross-domain deep learning architectures applied to information security data
Natural language processing
Reinforcement learning for automating security tasks