SESSION + Live Q&A
Real-Time Fraud Detection with Graphs
Finance is awash with data, but much of it is discrete items locked up in silos waiting to be joined up to provide insights. Graph data is different: it's joined by default and oozes domain-specific insight.
In this talk we'll discuss several kinds of fraud common in financial services and see how each naturally decomposes into a straightforward graph use-case. To demonstrate the power of connected data, we'll explore use-cases using Neo4j and the (now open standard) Cypher query language to showcase just how performant, pleasant and powerful graphs can be, and how the fraudsters need to beware!
Speaker
Jim Webber
Chief Scientist @Neo4j
Dr. Jim Webber is Chief Scientist with Neo Technology the company behind the popular open source graph database Neo4j, where he where he works on R&D for highly scalable graph databases and writes open source software. Jim has written two books on integration and distributed systems:...
Read moreFind Jim Webber at:
From the same track
Building a Modern Security Engineering Team
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering: Practical advice for building and scaling modern application and infrastructure security...
Zane Lackey
Founder & CSO @SignalSciences, Previously @Etsy
Bitcoin Security: 1/10th cent to a billion dollars
Bitcoin allows for new applications that utilize programmatic nanopayments smaller than a penny. Alternatively, bitcoin also allows millions of dollars to be stored on a flash drive, on a piece on paper, or in a passphrase. These disparate ways of using the same underlying bitcoin protocol...
Olaf Carlson-Wee
Head of Special Projects @Coinbase
Nihilist’s Guide to Wrecking Humans and Systems
The fault of the computer system is that it can only follow instructions. The fault of the human is that it can only make judgement calls. When we think about this in relation to information security, it presents an interesting opportunity to destructively combine the two and use it for evil. We...
Christina Camilleri
Security Solutions Specialist @@riotgames
Shubham Shah
Security Analyst @BishopFox
Automating Security at Slack
Monitoring for potentially malicious activity in an environment and handling the resulting alerts is vital to the success of a defensive security program. Powerful centralized logging is accessible to all of us, but it is only useful if we understand and take action on the data collected. How do...
Ryan Huber
Security at Slack Technologies, Inc
Security Open Space
Richard Kasperowski
Author of The Core Protocols: A Guide to Greatness