Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

AI: 'We're Having the Wrong Conversation'

Chris Calvert of Respond Software on the Proper Roles for Machines
Chris Calvert, co-founder, vice president of product strategy, Respond Software

Just by using the term “artificial intelligence,” we’re already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having? Calvert discusses the proper balance of humans and machines.

See Also: What is the Future of AI in IT and Security?

In a video interview at Information Security Media Group's recent Fraud and Breach Summit in Washington, Calvert discusses:

  • What’s misunderstood about AI;
  • Proper security roles for humans vs. machines;
  • How enterprises need to organize cybersecurity differently.

Calvert is co-founder and vice president of product strategy at Respond Software. He led the build for eight Fortune-50 SOCs and created the blueprint deployed by the ArcSight solutions team at over 45 security operations centers. He formerly served as HP's worldwide director of solutions innovation, CEO of Laconic Security, director of services for Cybertrust and manager of security intelligence and operations for IBM's MSS. Before serving in those roles, he spent 14 years in the national defense and intelligence community in information operations, supporting agencies such as the DoD Joint Staff, Land Information Warfare Activity and Space Warfare Center. He served for 10 years in the U.S. Army in military intelligence and special forces.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.