Download pdf
Are you in the process of developing or deploying an ML-based risk analytics engine to prevent identity theft and abuse? Want to better understand what specific ML models do for such use-cases, associated benefits and challenges? Come learn how to define and approach technical and operational requirements based on lessons learned through enterprise experience.

Pre-Requisites: Basic understanding of IAM specific technical controls, identity specific attacks and risk analytics.
Presenters