{"id":20982,"date":"2017-02-28T10:00:00","date_gmt":"2017-02-28T07:00:00","guid":{"rendered":"https:\/\/www.altoros.com\/blog\/?post_type=tribe_events&#038;p=20982"},"modified":"2021-09-09T18:26:27","modified_gmt":"2021-09-09T15:26:27","slug":"deep-learning-for-cyber-security","status":"publish","type":"tribe_events","link":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/","title":{"rendered":"Deep Learning for Cyber Security"},"content":{"rendered":"<p><strong>Are you willing to learn about Deep Learning for Cyber Security?<\/strong> <strong><a href=\"#get_record\"><br \/>\nJoin the webinar<\/a><\/strong> to learn more!<\/p>\n<p>\nIn this webinar, <em><strong><a rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/in\/huttsteven\/\">Steven Hutt<\/a><\/strong><\/em>, Consultant in Deep Learning and Financial Risk, will provide an overview of network anomaly detection.<\/p>\n<p>\n<strong>Agenda:<\/strong><\/p>\n<ul>\n<li> Searching for anomalous network flows is a challenging task due to the wide statistical variety of network behavior<\/li>\n<li> Overview of past applications of Machine Learning to network anomaly detection<\/li>\n<li> The advantages and challenges of a Deep Learning approach<\/li>\n<li> Handling categorical data in Deep Learning<\/li>\n<\/ul>\n<p><strong>Who should attend:<\/strong><\/p>\n<p>This webinar will be of interest to Data Scientists, Software Engineers and Entrepreneurs in the areas of Connected Cars, Internet of Things\/Industrial Internet, Medical Devices, Financial Technology (blockchain) and predictive apps\/APIs of all sorts.<\/p>\n<p>\n<strong>About the presenter:<\/strong><\/p>\n<p>\n<em><strong><a rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/in\/huttsteven\/\">Steven Hutt<\/a><\/strong><\/em> is a consultant in Deep Learning and Financial Risk, currently working in Cyber Security and Algorithmic Trading. He has previously been head quant for credit at UBS and Morgan Stanley, and before that a mathematician doing stuff in an obscure branch of topology.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Join the webinar to learn how to handle categorical data in Deep Learning models<\/p>\n","protected":false},"author":28,"featured_media":21037,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":"","_links_to":"","_links_to_target":""},"tags":[1036,748,749],"tribe_events_cat":[582],"class_list":["post-20982","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tag-deep-learning","tag-machine-learning","tag-tensorflow","tribe_events_cat-webinars","cat_webinars"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deep Learning for Cyber Security<\/title>\n<meta name=\"description\" content=\".\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Learning for Cyber Security\" \/>\n<meta property=\"og:description\" content=\"Join the webinar to learn how to handle categorical data in Deep Learning models\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Altoros\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-09T15:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/\",\"name\":\"Deep Learning for Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg\",\"datePublished\":\"2017-02-28T07:00:00+00:00\",\"dateModified\":\"2021-09-09T15:26:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg\",\"width\":960,\"height\":540,\"caption\":\"TensorFlow webinar\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.altoros.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/www.altoros.com\/blog\/cfevents\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Deep Learning for Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\",\"url\":\"https:\/\/www.altoros.com\/blog\/\",\"name\":\"Altoros\",\"description\":\"Insight\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.altoros.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Learning for Cyber Security","description":".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Deep Learning for Cyber Security","og_description":"Join the webinar to learn how to handle categorical data in Deep Learning models","og_url":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/","og_site_name":"Altoros","article_modified_time":"2021-09-09T15:26:27+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg","type":"image\/jpeg"}],"twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/","url":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/","name":"Deep Learning for Cyber Security","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg","datePublished":"2017-02-28T07:00:00+00:00","dateModified":"2021-09-09T15:26:27+00:00","breadcrumb":{"@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#primaryimage","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Webinar-Feb-28th_Presentation_Tensorflow_Steven_Hutt-2.jpg","width":960,"height":540,"caption":"TensorFlow webinar"},{"@type":"BreadcrumbList","@id":"https:\/\/www.altoros.com\/blog\/deep-learning-for-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.altoros.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/www.altoros.com\/blog\/cfevents\/"},{"@type":"ListItem","position":3,"name":"Deep Learning for Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.altoros.com\/blog\/#website","url":"https:\/\/www.altoros.com\/blog\/","name":"Altoros","description":"Insight","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.altoros.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tribe_events\/20982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/comments?post=20982"}],"version-history":[{"count":3,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tribe_events\/20982\/revisions"}],"predecessor-version":[{"id":41917,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tribe_events\/20982\/revisions\/41917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media\/21037"}],"wp:attachment":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media?parent=20982"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tags?post=20982"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tribe_events_cat?post=20982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}