About
I started in the trenches, running Information Risk Management for Barclays Private Bank…
Articles by Chris
Activity
-
Noise is the thief of founders’ time. 👀 That was my realization over the last 2 months and especially during a 2-day fundraising intensive led by…
Noise is the thief of founders’ time. 👀 That was my realization over the last 2 months and especially during a 2-day fundraising intensive led by…
Liked by Chris Gomes Muffat
-
📅 𝑹𝒆𝒏𝒅𝒆𝒛-𝒗𝒐𝒖𝒔 𝒍𝒆 8 𝒂𝒗𝒓𝒊𝒍 𝒑𝒐𝒖𝒓 𝒍𝒂 𝒔𝒐𝒊𝒓𝒆́𝒆 𝑲𝒏𝒐𝒘𝒍𝒅𝒚. J’aime ces soirées. Avant tout parce que ce sont des moments…
📅 𝑹𝒆𝒏𝒅𝒆𝒛-𝒗𝒐𝒖𝒔 𝒍𝒆 8 𝒂𝒗𝒓𝒊𝒍 𝒑𝒐𝒖𝒓 𝒍𝒂 𝒔𝒐𝒊𝒓𝒆́𝒆 𝑲𝒏𝒐𝒘𝒍𝒅𝒚. J’aime ces soirées. Avant tout parce que ce sont des moments…
Liked by Chris Gomes Muffat
-
The longer we build Odyssea, the more interesting things we have to share. 🎤 💥 This time, I’m very grateful to Nicholas TWF and Wendy Yanan Wang…
The longer we build Odyssea, the more interesting things we have to share. 🎤 💥 This time, I’m very grateful to Nicholas TWF and Wendy Yanan Wang…
Liked by Chris Gomes Muffat
Experience
Education
-
Conservatoire National des Arts et Métiers
-
-
Programme d'ingénieur Cnam (HTT) spécialité Informatique - Systèmes d'information (ISI)
IT Engineering, Information system and knowledge management -
-
-
-
-
-
Licenses & Certifications
-
CISM
ISACA
IssuedCredential ID 1322970
Volunteer Experience
Publications
-
Data Loss Prevention - Novaminds Conference
Novaminds
Les système DLP ont souvent tendance à générer un certain nombre de fausses alertes (faux-positif), ce qui à pour conséquence d’augmenter les interventions humaines et donc le cout du controle. Le compromis est souvent trouvé en assouplissant les règles DLP et la plupart des entreprises utilisent leur plateforme en mode détectif uniquement, échouant à l’intention première de prévenir la fuite d’information.
Les accès et la manipulation des données non-structurées (hors applicatif, base…Les système DLP ont souvent tendance à générer un certain nombre de fausses alertes (faux-positif), ce qui à pour conséquence d’augmenter les interventions humaines et donc le cout du controle. Le compromis est souvent trouvé en assouplissant les règles DLP et la plupart des entreprises utilisent leur plateforme en mode détectif uniquement, échouant à l’intention première de prévenir la fuite d’information.
Les accès et la manipulation des données non-structurées (hors applicatif, base de données) comme les emails, documents Word, PDF, Excel, etc. sont difficiles à contrôler et représentent l’un des vecteurs de risque le plus important de la fuite d’information. Cette présentation aborde donc principalement le challenge que représente les données non-structurées.
DLP n’est pas un outil « out of the box » – L’ implémentation d’un système DLP passe par un apprentissage et analyse continue des données et de son écosystème. Cet apprentissage peut être structuré et modélisé en amont du déploiement:
Méthodologie d’identification et classification des données, reconnaissance des metadata, écosystème et organisation
Développer un référentiel liant le type de données, les applications, département, rôles et procédures métiers associés
Définir les zones de couvertures DLP en fonction des méta-données et risque associés
Inclure l’analyse DLP dans le cycle de vie du développement d’application (Change Management, Agile, SDLC)
Inclure l’évaluation du contrôle DLP de les revues régulières (Risk and Control Assessement, MSA, etc…)
Mise en place de Service DLP à la demande -
Information Security Training and Awareness Strategy
Cyber Security Summit 2013 - UAE
Information Security Training and Awareness Strategy - Addressing a multi-faceted challenge
For IT employees, IT Security policies and best practices might sometime seemed unaligned with the main business objectives, usually asking for cost reduction and faster delivery.
Business employees don’t feel concerned about IT, most of them use information’s system by necessity only.
The perception on how IT Security could enable and add value to the business is not always…Information Security Training and Awareness Strategy - Addressing a multi-faceted challenge
For IT employees, IT Security policies and best practices might sometime seemed unaligned with the main business objectives, usually asking for cost reduction and faster delivery.
Business employees don’t feel concerned about IT, most of them use information’s system by necessity only.
The perception on how IT Security could enable and add value to the business is not always obvious.
Does people really understand what does IT Security?
-
IT Risk Management
See publicationEnterprises are dependent on IT and need to cross IT silos for consistent risk management
-
Data Leakage Prevention Leveraging Data Mining
-
Data Leakage Prevention and Data Mining - How to automatically define DLP policies based on data mining and machine learning.
-
Machine learning for unstructured data risk management
-
Presentation on how we can develop a scalable and cost-efficient framework to classify and label unstructured data such as Word, Excel, Powerpoint, PDF.
Patents
-
Systems and methods for subset selection and optimization for balanced sampled dataset generation
Issued US11675926B2
Methods and systems for data management of documents in one or more data repositories in a computer network or cloud infrastructure are provided. The method includes sampling the documents in the one or more data repositories and formulating representative subsets of the sampled documents. The method further includes generating sampled data sets of the sampled documents and balancing the sampled data sets for further processing of the sampled documents. The formulation of the representative…
Methods and systems for data management of documents in one or more data repositories in a computer network or cloud infrastructure are provided. The method includes sampling the documents in the one or more data repositories and formulating representative subsets of the sampled documents. The method further includes generating sampled data sets of the sampled documents and balancing the sampled data sets for further processing of the sampled documents. The formulation of the representative subsets is performed for identification of some of the representative subsets for initial processing.
Other inventorsSee patent -
Optical character recognition systems and methods for personal data extraction
Issued US20220398399A1
Methods and systems for extracting personal data from a sensitive document are provided. The system includes a document prediction module, a cropping module, a denoising module, and an optical character recognition (OCR) module. The document prediction module predicts type of document of the sensitive document using a keypoint matching-based approach and the cropping module extracts document shape and extracts one or more fields comprising text or pictures from the sensitive document. The…
Methods and systems for extracting personal data from a sensitive document are provided. The system includes a document prediction module, a cropping module, a denoising module, and an optical character recognition (OCR) module. The document prediction module predicts type of document of the sensitive document using a keypoint matching-based approach and the cropping module extracts document shape and extracts one or more fields comprising text or pictures from the sensitive document. The denoising module prepares the one or more fields for optical character recognition, and the OCR module performs optical character recognition on the denoised one or more fields to detect characters in the one or more fields.
Other inventorsSee patent -
Methods and text summarization systems for data loss prevention and autolabelling
Issued US20200226154A1
Methods and systems for data loss prevention and autolabelling of business categories and confidentiality based on text summarization are provided. The method for data loss prevention includes entering a combination of keywords and/or keyphrases and offline unsupervised mapping of a path of transfer of specific groups of documents. The offline unsupervised mapping includes keyword/keyphrase extraction from the specific groups of documents and normalization of candidates. The method further…
Methods and systems for data loss prevention and autolabelling of business categories and confidentiality based on text summarization are provided. The method for data loss prevention includes entering a combination of keywords and/or keyphrases and offline unsupervised mapping of a path of transfer of specific groups of documents. The offline unsupervised mapping includes keyword/keyphrase extraction from the specific groups of documents and normalization of candidates. The method further includes vectorization of the extracted keywords/keyphrases from the specific groups of documents and quantitative performance measurement of the keyword/keyphrase extraction to derive keywords and/or keyphrases suitable for data loss prevention.
Other inventorsSee patent -
Fully Explainable Document Classification Method And System
Issued US20210374533A1
Methods, systems and computer readable medium for explainable artificial intelligence are provided. The method for explainable artificial intelligence includes receiving a document and pre-processing the document to prepare information in the document for processing. The method further includes processing the information by an artificial neural network for one or more tasks. In addition, the method includes providing explanations and visualization of the processing by the artificial neural…
Methods, systems and computer readable medium for explainable artificial intelligence are provided. The method for explainable artificial intelligence includes receiving a document and pre-processing the document to prepare information in the document for processing. The method further includes processing the information by an artificial neural network for one or more tasks. In addition, the method includes providing explanations and visualization of the processing by the artificial neural network to a user during processing of the information by the artificial neural network.
Other inventorsSee patent -
Deep learning engine and methods for content and context aware data classification
Issued US20200279105A1
Methods, systems and deep learning engines for content and context aware data classification by business category and confidentiality level are provided. The deep learning engine includes a feature extraction module and a classification and labelling module. The feature extraction module extracts both context features and document features from documents and the classification and labelling module is configured for content and context aware data classification of the documents by business…
Methods, systems and deep learning engines for content and context aware data classification by business category and confidentiality level are provided. The deep learning engine includes a feature extraction module and a classification and labelling module. The feature extraction module extracts both context features and document features from documents and the classification and labelling module is configured for content and context aware data classification of the documents by business category and confidentiality level using neural networks.
Other inventorsSee patent -
Methods, personal data analysis system for sensitive personal information detection, linking and purposes of personal data usage prediction
Issued US20200250139A1
Systems and methods for personal data classification, linkage and purpose of processing prediction are provided. The system for personal data classification includes an entity extraction module for extracting personal data from one or more data repositories in a computer network or cloud infrastructure, a linkage module coupled to the entity extraction module, a linkage module coupled to the entity extraction module and a processing prediction module. The entity extraction module performs…
Systems and methods for personal data classification, linkage and purpose of processing prediction are provided. The system for personal data classification includes an entity extraction module for extracting personal data from one or more data repositories in a computer network or cloud infrastructure, a linkage module coupled to the entity extraction module, a linkage module coupled to the entity extraction module and a processing prediction module. The entity extraction module performs entity recognition from the structured, semi-structured and unstructured records in the one or more data repositories. The linkage module uses graph-based methodology to link the personal data to one or more individuals. And the purpose prediction module includes a feature extraction module a purpose of processing prediction module, wherein the feature extraction module extracts both context features and record's features from records in the one or more data repositories, and the purpose of processing prediction module predicts a unique or multiple purpose of processing of the personal data.
Other inventorsSee patent -
Methods, machine learning engines and file management platform systems for content and context aware data classification and security anomaly detection
Issued US WO2019035765A1
See patentSystems, methods and computer readable medium are provided for perform a method for content and context aware data classification or a method for content and context aware data security anomaly detection. The method for content and context aware data confidentiality classification includes scanning one or more documents in one or more network data repositories of a computer network and extracting content features and context features of the one or more documents into one or more term frequency-…
Systems, methods and computer readable medium are provided for perform a method for content and context aware data classification or a method for content and context aware data security anomaly detection. The method for content and context aware data confidentiality classification includes scanning one or more documents in one or more network data repositories of a computer network and extracting content features and context features of the one or more documents into one or more term frequency- inverse document frequency (TF-IDF) vectors and one or more latent semantic indexing (LSI) vectors. The method further includes classifying the one or more documents into a number of category classifications by machine learning the extracted content features and context features of the one or more documents at a file management platform of the computer network, each of the category classifications being associated with one or more confidentiality classifications.
Languages
-
English
-
-
French
-
Recommendations received
4 people have recommended Chris
Join now to viewMore activity by Chris
-
Get attention at RSA they said... #RSAC2026
Get attention at RSA they said... #RSAC2026
Liked by Chris Gomes Muffat
-
Was told we need to do more guerilla marketing at #RSAC2026. Snap a pic of our logo on this building before they clean it up today and we will…
Was told we need to do more guerilla marketing at #RSAC2026. Snap a pic of our logo on this building before they clean it up today and we will…
Liked by Chris Gomes Muffat
-
Yesterday we launched Surf AI; now let’s talk about how it actually works… Getting context and action to work together is what Surf is built around…
Yesterday we launched Surf AI; now let’s talk about how it actually works… Getting context and action to work together is what Surf is built around…
Liked by Chris Gomes Muffat
-
we solved agent-to-agent. we solved agent-to-tool. nobody solved agent-to-human. that's the gap AG-UI fills. right now the agentic protocol stack…
we solved agent-to-agent. we solved agent-to-tool. nobody solved agent-to-human. that's the gap AG-UI fills. right now the agentic protocol stack…
Liked by Chris Gomes Muffat
-
Someone should build a truly multi-model agent that switches between hundreds of different specialized models for different tasks (including even…
Someone should build a truly multi-model agent that switches between hundreds of different specialized models for different tasks (including even…
Liked by Chris Gomes Muffat
-
So proud to have supported WhatsApp (Meta) for their incredible event ❤️ Thank you Think Award for this great partnership. I love the…
So proud to have supported WhatsApp (Meta) for their incredible event ❤️ Thank you Think Award for this great partnership. I love the…
Liked by Chris Gomes Muffat
-
𝘋𝑎𝘯𝑠 "𝘓𝑒𝘴 𝘌𝑐𝘩𝑜𝘴", 𝑜𝘯 𝘦𝑥𝘢𝑚𝘪𝑛𝘦 𝘭'𝘪𝑚𝘱𝑎𝘤𝑡 𝑑𝘦 𝘭'𝘐𝐴 𝑠𝘶𝑟 𝑙𝘢 𝘱𝑟𝘰𝑔𝘳𝑎𝘮𝑚𝘢𝑡𝘪𝑜𝘯. 𝑨𝒗𝒆𝒄 𝒍'𝑰𝑨, 𝒍𝒂…
𝘋𝑎𝘯𝑠 "𝘓𝑒𝘴 𝘌𝑐𝘩𝑜𝘴", 𝑜𝘯 𝘦𝑥𝘢𝑚𝘪𝑛𝘦 𝘭'𝘪𝑚𝘱𝑎𝘤𝑡 𝑑𝘦 𝘭'𝘐𝐴 𝑠𝘶𝑟 𝑙𝘢 𝘱𝑟𝘰𝑔𝘳𝑎𝘮𝑚𝘢𝑡𝘪𝑜𝘯. 𝑨𝒗𝒆𝒄 𝒍'𝑰𝑨, 𝒍𝒂…
Liked by Chris Gomes Muffat
-
"Il n'y a aucune raison de dire qu'une œuvre générée par IA n'est pas une œuvre, ni que ce n'est pas de l'art (en revanche, l'IA n'est pas une…
"Il n'y a aucune raison de dire qu'une œuvre générée par IA n'est pas une œuvre, ni que ce n'est pas de l'art (en revanche, l'IA n'est pas une…
Liked by Chris Gomes Muffat
-
Discours fondateur du Président de la République à l'Île Longue annonçant un durcissement de notre posture de dissuasion nucléaire, qui demeurera…
Discours fondateur du Président de la République à l'Île Longue annonçant un durcissement de notre posture de dissuasion nucléaire, qui demeurera…
Liked by Chris Gomes Muffat
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content