Machine Learning Failures

Machine Learning Failures

CISO | Security Vendor Relationship Series

Garbage In, Garbage Out is Not Why Machine Learning Fails

Garbage In, Garbage Out is NOT Why Machine Learning Fails

At the RSA 2019 Conference I spoke with Davi Ottenheimer, product security at MongoDB, about where and why machine learning falls short. One might assume garbage in, garbage out, but who determines what's garbage and what's not can greatly change the accuracy and prejudice of a machine learning system. Make sure you also listen to the podcast episode of Defense in Depth (see below).

SPONSOR THE PODCASTS

Speak directly to our passionate community of listeners and contributors. On CISO Series we've got a variety of sponsorship programs for the podcasts and other programs. 

REPLY to this newsletter to contact me, David Spark, directly or go to our contact page.

Taylor Lehmann, CISO, Wellforce on safe experiences

This week's episode of Defense in Depth

Machine Learning Failures

Defense in Depth: Machine Learning Failures

 On this episode of Defense in Depth:

Co-host Allan Alford, CISO of Mitel, and our guest Davi Ottenheimer, product security at MongoDB, discuss the following:

  • Don't fall victim to believing that success and failure of machine learning is isolated to just garbage in/garbage out. It's far more nuanced than that. Some human actually has to determine what is considered garbage and what is not.

  • It only takes a very small amount of data to completely corrupt and ruin machine learning data.

  • A small infection of data can spread and corrupt all of the data. Those with political and economic motivations can do just that.

  • We have failures in human intervention. Machine learning can just magnify that at rapid rates.

  • While there are many warning signs that machine learning can fail, and we have the examples to back it up, many argue that competitive environments don't allow us to ignore it. We're in a use it or lose it scenario. Even when you're aware of the pitfalls, you may have no choice but to utilize machine learning to accelerate development and/or innovation.

Special thanks to this week's Defense in Depth podcast sponsor, Remediant.

Remediant - Privileged Access Management (PAM)

Eighty one percent of cyberattacks utilize stolen administrative credentials. Yet, legacy enterprise password vaults solve only a fraction of the problem and are difficult to rollout. Remediant's SecureONE takes a new approach to privileged access management: offering agent-less, vault-less, continuous detection and just-in-time-administration. Learn what Remediant can do in a half-day POC deployment.

Allan Alford, CISO of Mitel, on what software can do to us physically

SUBSCRIBE TO BOTH PODCASTS

Go ahead and click on any of these links to subscribe to the podcast feed of your favorite podcast catcher.

If you're already a subscriber, THANK YOU! If you like either or both shows, please tell all your friends on social media and write a review on iTunes.