The Conference for Machine Learning Innovation

Why Security is Important in ML and How to Secure your ML-based Solutions

Session
Join the ML Revolution!
Register until October 20:
✓ Save up to $233
✓ Team discount
✓ Extra Specials for Freelancers
Register Now
Join the ML Revolution!
Register until October 20:
✓ Save up to $233
✓ Team discount
✓ Extra Specials for Freelancers
Register Now
Join the ML Revolution!
Register until November 03:
✓ Save up to €494
✓ 10% Team Discount
✓ Special discount for freelancers
Register Now
Join the ML Revolution!
Register until November 03:
✓ Save up to €494
✓ 10% Team Discount
✓ Special discount for freelancers
Register Now
Join the ML Revolution!
Until the Conference starts:
✓ Group discount
✓ Special discount for freelancers
Register Now
Join the ML Revolution!
Until the Conference starts:
✓ Group discount
✓ Special discount for freelancers
Register Now

When enterprises adopt new technologies, security is often on the back burner. It can seem more important to get new products or services to customers and internal users as quickly as possible and at the lowest cost.

AI and ML offer all the same opportunities for vulnerabilities and misconfigurations as earlier technological advances, but they also have unique risks. As enterprises embark on major AI-powered digital transformations, those risks may become greater. AI and ML require more data, and more complex data, than other technologies. The algorithms developed by mathematicians and data scientists come out of research projects. The volume and processing requirements mean that cloud platforms often handle workloads, adding another level of complexity and vulnerability. 

It’s no surprise that cybersecurity is the most worrisome risk for AI adopters. Machine learning is software, after all. That’s why in this presentation, I will focus on secure coding best practices and discuss security pitfalls of the Python programming language. Both adversarial machine learning and core secure coding topics with some hands-on labs and stories from real life. The examples will explain techniques that provide a strong engagement to security and substantially improve code hygiene.

This Session belongs to the Diese Session gehört zum Programm vom MunichMunich program. Take me to the program of . Hier geht es zum Programm von Singapore Singapore .

This Session belongs to the Diese Session gehört zum Programm vom MunichMunich program. Take me to the program of . Hier geht es zum Programm von Berlin Berlin .

Take me to the full program of Zum vollständigen Programm von Munich Munich .

This Session Diese Session belongs to the gehört zum Programm von MunichMunich program. Take me to the current program of . Hier geht es zum aktuellen Programm von Singapore Singapore , Berlin Berlin or oder Munich Munich .

Behind the Tracks