|HRSS, Product Manager - Technical - Amazon.com - Seattle, WA Cache Translate This Page||With Amazon Connect you can leverage the power of Artificial Intelligence and the large ecosystem of AWS services such as Amazon Lex, Amazon Polly, AWS Lambda,...|
From Amazon.com - Mon, 23 Jul 2018 07:39:31 GMT - View all Seattle, WA jobs
|Senior Software Development Engineer - Amazon.com - Seattle, WA Cache Translate This Page||With Amazon Connect you can leverage the power of Artificial Intelligence and the large ecosystem of AWS services such as Amazon Lex, Amazon Polly, AWS Lambda,...|
From Amazon.com - Fri, 15 Jun 2018 01:20:13 GMT - View all Seattle, WA jobs
|D66 calls for more investment, guidelines for AI Cache Translate This Page||(Telecompaper) The D66 political party has called for the Dutch government to invest EUR 25 million in artificial intelligence in order to realise greater benefits for society...|
|Senior Manager, Software Engineering - DELL - Austin, TX Cache Translate This Page||Experience with machine learning and artificial intelligence. Learn more about Diversity and Inclusion at Dell here....|
From Dell - Wed, 18 Jul 2018 11:23:18 GMT - View all Austin, TX jobs
|Director, Software Engineering - DELL - Austin, TX Cache Translate This Page||Experience with machine learning and artificial intelligence. Learn more about Diversity and Inclusion at Dell here....|
From Dell - Sat, 07 Jul 2018 11:22:08 GMT - View all Austin, TX jobs
|BAE Systems developing "wearable cockpit" for fighter pilots Cache Translate This Page|
BAE Systems seeks to make the jet fighter cockpit of tomorrow a much simpler place by replacing conventional instruments and controls with a virtual reality system. Called a "wearable cockpit," the new system uses artificial intelligence and eye-tracking technology to allow pilots to control their aircraft simply by looking and gesturing... Continue Reading BAE Systems developing "wearable cockpit" for fighter pilots
|Microsoft, Amazon, Google join fight to prevent famine Cache Translate This Page|
Tech giants Microsoft, Amazon and Google are joining forces with international organizations to help identify and head off famines in developing nations using data analysis and artificial intelligence, a new initiative unveiled Sunday. Rather than waiting to respond to a famine after many lives already have been lost, the tech firms "will use the predictive power of data to trigger funding" to take action before it becomes a crisis, the World Bank and United Nations announced in a joint statement.
|Instructor (Data Science, Artificial Intelligence, Machine Learning) - Cortechma Inc. - Thornhill, ON Cache Translate This Page||Cortechma Academy team is looking for professors, instructors and engineers with both academically and professionally strong background specializing in one of...|
From Indeed - Wed, 01 Aug 2018 16:56:17 GMT - View all Thornhill, ON jobs
|CME 500: Artificial Intelligence (AI) in Real Life Seminar Series Cache Translate This Page||
Date: Monday, September 24, 2018. 4:30 PM.
Location: HEWLETT TEACHING CENTER, ROOM 200
How will artificial intelligence change the way you live, work and learn? What skill sets will you need in the future?
On September 24, we kick off a new series of seminars, which we are calling "AI in Real Life." The first session will be introduced by Gianluca Iaccarino, Director of the Institute for Computational and Mathematical Engineering (ICME) and Professor of Mechanical Engineering at Stanford University and feature a conversation with:
Each week the series will feature leaders from industry and academia who will share insights into the world of artificial intelligence and:
These experts and influencers who are shaping our AI future will share their vision and will address audience questions. Students of all academic backgrounds and interests are encouraged to register for this 1-unit course (CME 500). No prerequisites required. Register early. The series is open to Stanford faculty, staff, and ICME partners, space permitting.
|IASIS and BigMedilytics: Towards personalized medicine in Europe. (arXiv:1809.07784v1 [cs.CY]) Cache Translate This Page|
Authors: Ernestina Menasalvas Ruiz, Alejandro Rodríguez-González, Consuelo Gonzalo Martín, Massimiliano Zanin, Juan Manuel Tuñas, Mariano Provencio, Maria Torrente, Fabio Franco, Virginia Calvo, Beatriz Nuñez
One field of application of Big Data and Artificial Intelligence that is receiving increasing attention is the biomedical domain. The huge volume of data that is customary generated by hospitals and pharmaceutical companies all over the world could potentially enable a plethora of new applications. Yet, due to the complexity of such data, this comes at a high cost. We here review the activities of the research group composed by people of the Universidad Polit\'ecnica de Madrid and the Hospital Universitario Puerta de Hierro de Majadahonda, Spain; discuss their activities within two European projects, IASIS and BigMedilytics; and present some initial results.
|Bias Amplification in Artificial Intelligence Systems. (arXiv:1809.07842v1 [cs.AI]) Cache Translate This Page|
Authors: Kirsten Lloyd
As Artificial Intelligence (AI) technologies proliferate, concern has centered around the long-term dangers of job loss or threats of machines causing harm to humans. All of this concern, however, detracts from the more pertinent and already existing threats posed by AI today: its ability to amplify bias found in training datasets, and swiftly impact marginalized populations at scale. Government and public sector institutions have a responsibility to citizens to establish a dialogue with technology developers and release thoughtful policy around data standards to ensure diverse representation in datasets to prevent bias amplification and ensure that AI systems are built with inclusion in mind.
|Uncertainty Aware AI ML: Why and How. (arXiv:1809.07882v1 [cs.AI]) Cache Translate This Page|
This paper argues the need for research to realize uncertainty-aware artificial intelligence and machine learning (AI\&ML) systems for decision support by describing a number of motivating scenarios. Furthermore, the paper defines uncertainty-awareness and lays out the challenges along with surveying some promising research directions. A theoretical demonstration illustrates how two emerging uncertainty-aware ML and AI technologies could be integrated and be of value for a route planning operation.
|Answering the "why" in Answer Set Programming - A Survey of Explanation Approaches. (arXiv:1809.08034v1 [cs.AI]) Cache Translate This Page|
Artificial Intelligence (AI) approaches to problem-solving and decision-making are becoming more and more complex, leading to a decrease in the understandability of solutions. The European Union's new General Data Protection Regulation tries to tackle this problem by stipulating a "right to explanation" for decisions made by AI systems. One of the AI paradigms that may be affected by this new regulation is Answer Set Programming (ASP). Thanks to the emergence of efficient solvers, ASP has recently been used for problem-solving in a variety of domains, including medicine, cryptography, and biology. To ensure the successful application of ASP as a problem-solving paradigm in the future, explanations of ASP solutions are crucial. In this survey, we give an overview of approaches that provide an answer to the question of why an answer set is a solution to a given problem, notably off-line justifications, causal graphs, argumentative explanations and why-not provenance, and highlight their similarities and differences. Moreover, we review methods explaining why a set of literals is not an answer set or why no solution exists at all.
|UI5 (Senior) Developer Specialist (f/m) SAP Innovative Business Solutions - SAP - Sankt Leon-Rot Cache Translate This Page||We make innovation real by using the latest technologies around the Internet of Things, blockchain, artificial intelligence / machine learning, and big data and...|
Gefunden bei SAP - Fri, 21 Sep 2018 05:42:09 GMT - Zeige alle Sankt Leon-Rot Jobs
|Development Architect SAP S/4 HANA Finance - Treasury (f/m) SAP Innovative Business Solutions - SAP - Sankt Leon-Rot Cache Translate This Page||We make innovation real by using the latest technologies around the Internet of Things, blockchain, artificial intelligence / machine learning, and big data and...|
Gefunden bei SAP - Fri, 21 Sep 2018 05:42:09 GMT - Zeige alle Sankt Leon-Rot Jobs
|Developer Associate/Specialist SAP S/4 HANA (f/m) for SAP Innovative Business Solutions - SAP - Sankt Leon-Rot Cache Translate This Page||We make innovation real by using the latest technologies around the Internet of Things, blockchain, artificial intelligence / machine learning, and big data and...|
Gefunden bei SAP - Fri, 21 Sep 2018 05:42:09 GMT - Zeige alle Sankt Leon-Rot Jobs
|Developer Specialist / Associate - SAP - Sankt Leon-Rot Cache Translate This Page||We make innovation real by using the latest technologies around the Internet of Things, blockchain, artificial intelligence / machine learning, and big data and...|
Gefunden bei SAP - Fri, 21 Sep 2018 05:35:27 GMT - Zeige alle Sankt Leon-Rot Jobs
|Answerer in Questioner's Mind: Information Theoretic Approach to Goal-Oriented Visual Dialog. (arXiv:1802.03881v2 [cs.CV] UPDATED) Cache Translate This Page|
Goal-oriented dialog has been given attention due to its numerous applications in artificial intelligence. Goal-oriented dialogue tasks occur when a questioner asks an action-oriented question and an answerer responds with the intent of letting the questioner know a correct action to take. To ask the adequate question, deep learning and reinforcement learning have been recently applied. However, these approaches struggle to find a competent recurrent neural questioner, owing to the complexity of learning a series of sentences. Motivated by theory of mind, we propose "Answerer in Questioner's Mind" (AQM), a novel algorithm for goal-oriented dialog. With AQM, a questioner asks and infers based on an approximated probabilistic model of the answerer. The questioner figures out the answerer's intention via selecting a plausible question by explicitly calculating the information gain of the candidate intentions and possible answers to each question. We test our framework on two goal-oriented visual dialog tasks: "MNIST Counting Dialog" and "GuessWhat?!." In our experiments, AQM outperforms comparative algorithms by a large margin.
|The Security Talent Gap is Misunderstood and AI Changes it All Cache Translate This Page|
Despite headlines now at least a couple years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent and the growing skills gap.
The community is apt to quote and brandish the dire figures, but unless you’re actually a hiring manager striving to fill low to mid-level security positions, you’re not feeling the pain in fact there’s a high probability many see problem as a net positive in terms of their own employment potential and compensation.
I see today’s Artificial Intelligence (AI) and the AI-based technologies that’ll be commercialized over the next 2-3 years as exacerbating the problem but also offering up a silver-lining.
I’ve been vocal for decades that much of the professional security industry is and should be methodology based. And, by being methodology based, be reliably repeatable; whether that be bug hunting, vulnerability assessment, threat hunting, or even incident response. If a reliable methodology exists, and the results can be consistently verified correct, then the process can be reliably automated. Nowadays, that automation lies firmly in the realm of AI and the capabilities of these newly emerged AI security platforms are already reliably out-performing tier-one (e.g. 0-2 years experience) security professionals.
In some security professions (such as auditing & compliance, penetration testing, and threat hunting) AI-based systems are already capable of performing at tier-two (i.e. 2-8 years experience) levels for 80%+ of the daily tasks.
On one hand, these AI systems alleviate much of the problem related to shortage and global availability of security skills at the lower end of the security professional ladder. So perhaps the much touted and repeated shortage numbers don’t matter and extrapolation of current shortages in future open positions is overestimated.
However, if AI solutions consume the security roles and daily tasks equivalency of 8-year industry veterans, have we also created an insurmountable chasm for resent graduates and those who wish to transition and join the InfoSec professional ladder?
While AI is advancing the boundaries of defense and, frankly, an organizations ability to detect and mitigate threats has never been better (and will be even better tomorrow), there are still large swathes of the security landscape that AI has yet to solve. In fact many of these new swathes have only opened up to security professionals because AI has made them available.
What I see in our AI Security future is more of a symbiotic relationship.
AI’s will continue to speed up the discovery and mitigation of threats, and get better and more accurate along the way. It is inevitable that tier-two security roles will succumb and eventually be replaced by AI. What will also happen is that security professional roles will change from the application of tools and techniques into business risk advisers and supervisors. Understanding the business, communicating with colleagues in other operational facets, and prioritizing risk response, are the intangibles that AI systems will struggle with.
In a symbiotic relationship, security professionals will guide and communicate these operations in terms of business needs and risk. Just as Internet search engines have replaced the voluminous Encyclopedia Britannica and Encarta, and the Dewey Decimal system, Security AI is evolving to answer any question a business may raise about defending their organization assuming you ask the right question, and know how to interpret the answer.
With regards to the skills shortage of today I truly believe that AI will be the vehicle to close that gap. But I also think we’re in for a paradigm change in who we’ll be welcoming in to our organizations and employing in the future because of it.
I think that the primary beneficiaries of these next generation AI-powered security professional roles will not be recent graduates. With a newly level playing field, I anticipate that more weathered and “life experienced” people will assume more of these roles.
For example, given the choice between a 19 year-old freshly minted graduate in computer science, versus a 47 year-old woman with 25 years of applied mechanical engineering experience in the “rust belt” of the US,… those life skills will inevitably be more applicable to making risk calls and communicating them to the business.
In some ways the silver-lining may be the middle-America that has suffered and languished as technology has moved on from coal mining and phone-book printing. It’s quite probable that it will become the hot-spot for newly minted security professionals leveraging their past (non security) professional experiences, along with decades of people or business management and communication skills and closing the missing security skills gap using AI.
|Building a Security Awareness Program on an Organizational Level Cache Translate This Page||Introduction: A Case Study
Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and that all the financial reports had been completed and sent on time, the last thing she expected was an email from Mr. Evans, her company’s CEO.
During the two years since she had been appointed head of the accounting department, Liz had had little contact with Mr. Evans, who limited himself to praising the effectiveness with which she led the department. However, the message she received was not a complete surprise; after all, it was public knowledge that there were undergoing negotiations for acquiring yet another startup.
“Dear Liz,” said Mr. Evans’ email, “I need your help on a sensitive subject that requires the utmost urgency. We have just finished negotiating the startup deal. However, in order to guarantee the business, it is still necessary to pay $ 180,000.00 in advance. Could you please make the transaction as soon as possible and keep me informed? Also, until everything becomes official, I rely on your usual discretion to handle this matter with complete confidentiality. Here is the bank account for the transfer.”
It was only after hearing the mouse click confirming the transfer, that another click happened within Liz’s mind. She started to notice the small inconsistencies in the message. Mr. Evans was extremely polite, but he had never used ‘Dear Liz’ before. Also, although his signature was correct, there was something odd about the email address. Was that a typo? After a few moments of hesitation, a quick call confirmed that the long-awaited weekend would not be relaxing at all.
Mr. Evans had no idea what this email was about, and no, he never asked for or authorized the transaction.Hacking Humans
Fortunately, Liz Raymond and her 180-million-dollar mix-up never existed. But this story, which is much closer to reality than fiction, points us to a hard truth: cybercriminals will never hesitate to use the human factor in order to achieve their goals. There is often no need for advanced malware, and it is not necessary to bypass a state-of-the-art firewall. Instead, with just a touch of malice, some understanding of human psychology and a little emotional manipulation, it’s quite possible to hack a person instead of a machine. There are many employees who, like Liz, do an exceptional job in their daily tasks but become an easy prey for those who master the art of social engineering.
Of course, some attacks can be prevented with the usual controls, but is that enough? Unfortunately, the answer is no. The tactics employed by attackers are constantly evolving, and more often than we like to admit, they can evade even the most advanced protection technologies based on machine learning, AI or whatever the current buzzword is.
As you can see from this scenario, where a single successful attack caused an unacceptable level of impact, it is essential more than ever to understand that your last line of defense sits between the chair and the keyboard. And that’s where raising awareness comes in. After all, if the technology for patching humans and making them resilient against the latest threats is still a few decades away, right now it’s perfectly feasible to educate people so they become true cybersecurity heroes.
Deploying a Security Awareness Program on an Organizational Level: The Human-Centric Approach
To create a good security awareness program on an organizational level, it is first necessary to understand that the challenges are quite different from, for example, implementing a new technology such as a next-gen firewall, a SIEM, or even using artificial intelligence against advanced malware. People usually like to stay in their comfort zones. This is not to say that they do not experience an intense pressure to perform their work activities quickly and effectively, but they become accustomed to routines that can be hard to shake them out of. Most of the time security is not included in daily activities.
The truth is that during a typical day of work, an employee who is not connected directly to the security team hardly ever thinks that he or she could already be the target of the next cyberattack that will expose the company’s corporate data. The fact is that information security is still not an integral part of most people’s daily lives, much less corporate culture. And that is exactly what our awareness program should focus on.
Here are some tips that will help your efforts to ensure that the human factor becomes one of the strongest allies of cyberdefense.Understand the Corporate Context
As a rule, security works much better in context: that is, when it is properly aligned with the organization’s reality and strategy. There are several factors that can influence how your company deals with security aspects, from the industry segment to corporate culture, standards and policies, down to contractual aspects and laws.
During your program’s first steps, it is always a good strategy to try to create an overview of the corporate context. This includes factors that can serve as enablers for security awareness, such as the occurrence of security incidents, new customer requirements or new regulations, such as GDPR.Upper-Management Support
This is also a common starting point for most security initiatives. It’s difficult to create significant organizational change without executive-level support.
If you followed step 1 and mapped out the corporate context, you should be able to identify at least one person at the executive level who is willing to help cybersecurity efforts. In fact, with the new laws on data privacy, this has become a reasonably simple task nowadays.
It’s all a matter of knowing how to present your proposal for an awareness program in the appropriate way: that is, in business terms. Just try to avoid a too-technical approach and focus on how the organization can be impacted by a severe security incident. There is no shortage of recent examples!Understand the Current Security Awareness Level
Once you’ve gotten the blessing of top management for your awareness program, it’s time to take the first practical actions.
A key point is understanding the current level of cybersecurity awareness that your employees already have. It’s possible, for example, to select a few people and apply a blind test. Just be careful to ensure that test participants understand that ― for the time being ― they are not expected to have and advanced awareness level. The idea is simply to measure the general cybersecurity maturity level.Define Short, Medium and Long-Term Goals
Ensuring the effectiveness of your awareness program requires defining clear and feasible goals. It is simply unrealistic to expect that, in just a few weeks, your employees will become experts in a subject as complex as cybersecurity; on the contrary, real change in corporate culture will take time.
Now that’s different from saying that you can’t achieve improvement in the short term. For example, based on blind test results, it’s possible to define specific subjects that should have priority or which company departments are most susceptible to a social engineering attack. This will allow you to take specific actions and use quick wins as a way to give momentum to the awareness program.Awareness Pieces
There are countless possibilities for awareness actions that can be taken as a part of a cybersecurity awareness program. The most common include lectures, seminars, face-to-face training and online education.
A good option is using solutions that bring awareness and education actions into the context of your company, such as phishing attack simulators. If Liz Raymond already had firsthand experience with fake emails, it’s far more likely that she would be able to recognize the threat and avoid the attack.
If possible, customize each awareness action for the target audience. Some awareness tools allow you to create training kits specific to positions or business areas within the organization. Remember: When security is handled in a contextual way, it is much easier to ensure alignment with the reality of the organization. This helps your employees more easily understand and absorb the lessons of the training.Use Practical Psychology
In terms of awareness, optimism is far more powerful than facts. Many awareness campaigns lose their strength by focusing only on negative examples. Of course, using notorious cases like the WannaCry ransomware as an example of a threat can be helpful and it should be part of your campaign, but you have to understand that the appeal of fear only works when people already believe that the threat is real.
One way to create effective messages is using social proofing techniques. For example, many hotels were trying to encourage their guests to reuse towels in order to save water: Rather than “simply explaining” that this is the ecologically correct attitude they focused on actions such as “most of our guests reuse towels, saving energy and helping to protect the environment. Would you do the same?”
You can try to do something similar for cybersecurity, and instead of using messages such as “pay attention before opening an attachment from an unknown source,” how about using “most of the company’s employees confirm that the email is valid before opening attachments or clicking in links. Would you do the same?”
Creating the right message will require both effective communication and an adequate understanding of human psychology, skills not always found in cybersecurity professionals. Consider getting help from specialists if necessary. Remember, with the right message, your awareness efforts will be significantly more effective.Define Metrics and Measure the Results
As Peter Drucker used to say: “If You Can’t Measure It, You Can’t Improve It.” Well-defined awareness metrics are essential to understand if the program objectives have been met.
Your metrics may include simple points such as the percentage of employees who participated in awareness actions, or how a group of employees from a blind test had improved after a retest.
Depending on the awareness tools you are using, it’s possible to have a more detailed view. For example, phishing awareness tools usually let you understand which users or even departments are most vulnerable by having statistics on who opened fake emails and what links were clicked.
In general, the idea is to have a basis for understanding whether your awareness program has really achieved its goals or whether improvements and further awareness actions are necessary to ensure that employees are aware of cybersecurity risks.Make It Fun
It’s obvious that cybersecurity is an extremely serious issue, but that doesn’t mean your awareness program actions should be boring.
People learn a lot better when they are relaxed and entertained, so an interesting idea is to include fun elements as a part of your awareness program. Again, there are numerous options available: From good-humored theatrical performances to quizzes, raffles or a friendly team competition. It’s all about remembering that you want to introduce cybersecurity in a positive way and make employees part of that context.Treat Learning as Something Continuous
As previously mentioned, meaningful awareness change will not happen overnight. Thus, employee cybersecurity awareness should never be treated as a project (something with a beginning and an end), but as a program with continuous improvement cycles.
Of course, actions such as creating a “cybersecurity week” are a very interesting idea but leaving your education efforts concentrated in a short period of time will hardly bring the best results.
A great approach is combining focused events with multiple small actions divided throughout the year, so that your employees will have constant contact with the cybersecurity subject, and they will always be up-to-date with the latest threats.Conclusion
As a general rule, it’s unrealistic to expect people to change their attitude overnight, even on such a relevant subject as corporate data protection. Awareness actions should be a constant, addressing relevant issues, using the right message and making sure people feel part of a larger effort.
An excellent idea is to focus on positive aspects, demonstrating that the organization completely trusts the capabilities of its employees and is ready to help them become resilient to the most advanced cyberthreats.
Using this human-centric approach for cybersecurity awareness is a sure way of turning the much-criticized human factor from a vulnerability into one of the most effective defenses against cybercriminals.