Security & Privacy

Bad Things Happen with Bad Passwords

How to Address Unauthorized Broadband Sharing

  • Examining the effectiveness of methods to detect if customers are engaging in broadband sharing
  • Developing a new approach that leverages radio frequency network (RF), artificial intelligence (AI) and machine learning (ML)
  • Understanding how to mitigate, discourage and prevent broadband sharing

Serhad Doken
Chief Technology Officer

Customer Account Takeover Detection    

  • Implementing measures to monitor for suspicious activity
    • How to identify suspicious activity by ingesting multiple signals
  • Exploring how pre-defined baselines and user behavior analysis can determine if a user’s account is compromised.
  • Developing methods to respond to an account takeover

Stuart Keener
AVP Cybersecurity
Cox Communications 

Loose Bits Sink Gits: Unearthing Repository Secrets and Scanning Developer Trends          

  • Determining the effectiveness of entropy calculation and regex-based (static) scanners vs. artificial intelligence-based alternatives for authentication
  • Assessing the extent to which AI-based solutions provide a higher accuracy  structured secrets and unstructured secrets
  • Developing an understanding of how new repositories may have fewer secrets and its implications

Golam Kayas
Technical Research & Development Engineer

Topic tags

Similar Sessions​

Security & Privacy

We Are Not Immune from Attacks and Responsibility

12:50 PM
- 1:45 PM
Brian Scriber
Distinguished Technologist and VP of Security and Privacy Technologies
Shivam Gupta
Network Specialist
Mediacom Communications Corporation
Security & Privacy

Guarding the Gateway: Securing the Infrastructure

3:45 PM
- 5:00 PM
Dr. Tao Wan
Distinguished Technologist
Matt Carothers
Senior Principal Security Architect
Cox Communications
Carl Klatsky
Senior Principal Engineer