Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

PCM Vision 2019 Keynote: Jeff Crume


Published on

AI: What is it Really? | Jeff Crume - IBM Distinguished Engineer and Master Inventor

Published in: Technology
  • Be the first to comment

  • Be the first to like this

PCM Vision 2019 Keynote: Jeff Crume

  2. 2. AI – What is it really? Jeff Crume, CISSP-ISSAP Nov 2018 Distinguished Engineer IBM Master Inventor INTERNAL USE ONLY – DO NOT DISTRIBUTE
  5. 5. 5 IBM Security • Webster - “a branch of computer science dealing with the simulation of intelligent behavior in computers.” [1] • OED - “the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.” [2] • OK, but what does that mean in plain English? AI essentially involves making computers more able to match or exceed human intelligence in its various forms by mimicking the human ability to discover, infer and reason. AI Defined [1] [2] INTERNAL USE ONLY – DO NOT DISTRIBUTE
  6. 6. 6 IBM Security AI Technologies  Reasoning, problem solving  Knowledge representation  Planning  Learning  Natural language processing  Perception  Motion and manipulation  Social intelligence  Creativity  General intelligence INTERNAL USE ONLY – DO NOT DISTRIBUTE
  7. 7. 7 IBM Security Artificial Intelligence and Sub Categories Artificial Intelligence Cognitive Machine Learning Deep Learning o Machine learning is a subfield of AI and computer science that has its roots in statistics and mathematical optimization. Machine learning covers techniques in supervised and unsupervised learning for applications in prediction, analytics, and data mining.* o Deep learning isn't an algorithm, per se, but rather a family of algorithms that implement deep networks with unsupervised learning.* * “A beginner's guide to artificial intelligence, machine learning, and cognitive computing” INTERNAL USE ONLY – DO NOT DISTRIBUTE
  8. 8. 8 IBM Security Introduction to Machine Learning A subfield of computer science that enables computers to learn without being explictly programmed - Arthur Samuel in 1959 Supervised Learning Inferring a general rule or mathematical function from labeled training data to be applied to other data Primary Use Cases • Regression Analysis o Deriving correlation relationships between variables and estimating the strength of those relationships o Widely used for prediction and forecasting • Classification: o Produces a model from a training set that can assign unseen inputs into different categories Unsupervised Learning Detecting the presence of patterns or models from unlabeled data Primary Use Cases • Clustering o Data is divided into different groups based on one or more attributes • Dimensionality Reduction o process of reducing the number of random variables under consideration, via obtaining a set of principal variables o Feature Selection: finding subset of the original variables o Feature Extraction: transform high- dimensional space to a space of fewer dimensions INTERNAL USE ONLY – DO NOT DISTRIBUTE
  9. 9. 9 IBM Security Cognitive computing enables systems to process and act on data, like humans They understand  Intent, tone, personality  Submissions, contracts, claims  Legal & regulatory obligations, guidelines  News, market data… like humans do They can  Identify similar risks and claims  Assess risk  Check for compliance  Spot new sales opportunities, … infer and extract ideas With abilities to see, talk and hear they can support  Clients, agents & broker  Contact center agents  Underwriter  Claims handler and many others in a natural way They learn from every interaction and  Extract and improve best practices  Digest new regulatory requirements, guidelines… and never stop learning ReasonUnderstand Interact Learn INTERNAL USE ONLY – DO NOT DISTRIBUTE
  10. 10. 10 IBM Security Cognitive Solutions Reason and Present their Reasoning Process Grep Grep Search Pattern Matching Correlation and rules Behavioral Analytics Cognition Increasing data volumes, variety and complexity Increasingattackandthreatsophistication Reasoning about threats and risks Helping security teams not only detect where the threat is but also resolving the what, how, why, when and who to improve the overall incident response timeline Recognition of threats and risks Cognitive Traits: • language comprehension • deductive reasoning and • self-learning INTERNAL USE ONLY – DO NOT DISTRIBUTE
  11. 11. 11 IBM Security Smart but not cognitive INTERNAL USE ONLY – DO NOT DISTRIBUTE
  12. 12. AI in the Real World INTERNAL USE ONLY – DO NOT DISTRIBUTE
  13. 13. 13 IBM Security 13 Watson answers a grand challenge Can we design a computing system that rivals a human’s ability to answer questions posed in natural language, interpreting meaning and context and retrieving, analyzing and understanding vast amounts of information in real-time? INTERNAL USE ONLY – DO NOT DISTRIBUTE
  14. 14. 14 IBM Security 3 Min 58 Sec 4 Min 35 Sec Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  15. 15. 15 IBM Security From Jeopardy! To Cancer • 60 Minutes profile Oct 2016  IBM and UNC Lineberger Cancer Center • 8,000 new medical research papers published per day • Studied 1,000 patients • Watson recommendations matched Tumor Board experts 99% of the time • Watson found additional treatment options in 30% of cases Transcript at INTERNAL USE ONLY – DO NOT DISTRIBUTE
  17. 17. © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. @ibmsecurity youtube/user/ibmsecuritysolutions FOLLOW US ON: THANK YOU INTERNAL USE ONLY – DO NOT DISTRIBUTE