Managing flows of security related events requires working with a lot of data. Data collection, enrichment, detection of potentially dangerous or malicious activity requires orchestrating many data workflows. During this talk we will see how the Dataiku product can be used for security purposes.
talk-data.com
Topic
Dataiku
data_science
machine_learning
analytics
2
tagged
Activity Trend
4
peak/qtr
2020-Q1
2026-Q1
Top Events
Data + AI Summit 2025
3
Big Data LDN 2024
2
Databricks DATA + AI Summit 2023
2
[POSTPONED] From Recon to Detection, Real Hacker Tactics and AI Defenses
2
Exhibitors' Events - Auto created
2
Data Expo NL 2025
2
Google Cloud Next '24
1
Data Engineering Podcast
1
gartner-data-analytics-uk-2025
1
The Analytics Power Hour
1
Filtering by:
[POSTPONED] From Recon to Detection, Real Hacker Tactics and AI Defenses
×
Before launching an attack, cybercriminals exploit OSINT to map your digital and physical world. From crafting convincing spear phishing emails to enabling real-world intrusion, they turn public data into powerful weapons.