Chris Gomes Muffat

Chris Gomes Muffat

United States
9K followers 500+ connections

About

I started in the trenches, running Information Risk Management for Barclays Private Bank…

Articles by Chris

Activity

Join now to see all activity

Experience

  • AMI - Advanced Machine Intelligence Graphic
  • -

    New York, United States

  • -

    New York City Metropolitan Area

  • -

  • -

  • -

    New York City Metropolitan Area

  • -

    New York City Metropolitan Area

  • -

    Singapore

  • -

    Singapore

  • -

    Geneva, Switzerland

  • -

    Dubai, United Arab Emirates

  • -

    Dubai, UAE

  • -

    Geneva, Switzerland

  • -

  • -

    Paris Area, France

Education

  • Conservatoire national des arts et métiers - Cnam Graphic

    Conservatoire National des Arts et Métiers

    -

    -

    Programme d'ingénieur Cnam (HTT) spécialité Informatique - Systèmes d'information (ISI)
    IT Engineering, Information system and knowledge management

  • -

    -

  • -

    -

Licenses & Certifications

  • CISM

    ISACA

    Issued
    Credential ID 1322970

Volunteer Experience

Publications

  • Data Loss Prevention - Novaminds Conference

    Novaminds

    Les système DLP ont souvent tendance à générer un certain nombre de fausses alertes (faux-positif), ce qui à pour conséquence d’augmenter les interventions humaines et donc le cout du controle. Le compromis est souvent trouvé en assouplissant les règles DLP et la plupart des entreprises utilisent leur plateforme en mode détectif uniquement, échouant à l’intention première de prévenir la fuite d’information.

    Les accès et la manipulation des données non-structurées (hors applicatif, base…

    Les système DLP ont souvent tendance à générer un certain nombre de fausses alertes (faux-positif), ce qui à pour conséquence d’augmenter les interventions humaines et donc le cout du controle. Le compromis est souvent trouvé en assouplissant les règles DLP et la plupart des entreprises utilisent leur plateforme en mode détectif uniquement, échouant à l’intention première de prévenir la fuite d’information.

    Les accès et la manipulation des données non-structurées (hors applicatif, base de données) comme les emails, documents Word, PDF, Excel, etc. sont difficiles à contrôler et représentent l’un des vecteurs de risque le plus important de la fuite d’information. Cette présentation aborde donc principalement le challenge que représente les données non-structurées.

    DLP n’est pas un outil « out of the box » – L’ implémentation d’un système DLP passe par un apprentissage et analyse continue des données et de son écosystème. Cet apprentissage peut être structuré et modélisé en amont du déploiement:

    Méthodologie d’identification et classification des données, reconnaissance des metadata, écosystème et organisation
    Développer un référentiel liant le type de données, les applications, département, rôles et procédures métiers associés
    Définir les zones de couvertures DLP en fonction des méta-données et risque associés
    Inclure l’analyse DLP dans le cycle de vie du développement d’application (Change Management, Agile, SDLC)
    Inclure l’évaluation du contrôle DLP de les revues régulières (Risk and Control Assessement, MSA, etc…)
    Mise en place de Service DLP à la demande

  • Information Security Training and Awareness Strategy

    Cyber Security Summit 2013 - UAE

    Information Security Training and Awareness Strategy - Addressing a multi-faceted challenge

    For IT employees, IT Security policies and best practices might sometime seemed unaligned with the main business objectives, usually asking for cost reduction and faster delivery.

    Business employees don’t feel concerned about IT, most of them use information’s system by necessity only.

    The perception on how IT Security could enable and add value to the business is not always…

    Information Security Training and Awareness Strategy - Addressing a multi-faceted challenge

    For IT employees, IT Security policies and best practices might sometime seemed unaligned with the main business objectives, usually asking for cost reduction and faster delivery.

    Business employees don’t feel concerned about IT, most of them use information’s system by necessity only.

    The perception on how IT Security could enable and add value to the business is not always obvious.

    Does people really understand what does IT Security?

  • Safety-critical-system and cyber-security risk

    Emirates - dnata

    Other authors
  • IT Risk Management

    Enterprises are dependent on IT and need to cross IT silos for consistent risk management

    See publication
  • Data Leakage Prevention Leveraging Data Mining

    -

    Data Leakage Prevention and Data Mining - How to automatically define DLP policies based on data mining and machine learning.

  • Machine learning for unstructured data risk management

    -

    Presentation on how we can develop a scalable and cost-efficient framework to classify and label unstructured data such as Word, Excel, Powerpoint, PDF.

Patents

  • Systems and methods for subset selection and optimization for balanced sampled dataset generation

    Issued US11675926B2

    Methods and systems for data management of documents in one or more data repositories in a computer network or cloud infrastructure are provided. The method includes sampling the documents in the one or more data repositories and formulating representative subsets of the sampled documents. The method further includes generating sampled data sets of the sampled documents and balancing the sampled data sets for further processing of the sampled documents. The formulation of the representative…

    Methods and systems for data management of documents in one or more data repositories in a computer network or cloud infrastructure are provided. The method includes sampling the documents in the one or more data repositories and formulating representative subsets of the sampled documents. The method further includes generating sampled data sets of the sampled documents and balancing the sampled data sets for further processing of the sampled documents. The formulation of the representative subsets is performed for identification of some of the representative subsets for initial processing.

    Other inventors
    See patent
  • Optical character recognition systems and methods for personal data extraction

    Issued US20220398399A1

    Methods and systems for extracting personal data from a sensitive document are provided. The system includes a document prediction module, a cropping module, a denoising module, and an optical character recognition (OCR) module. The document prediction module predicts type of document of the sensitive document using a keypoint matching-based approach and the cropping module extracts document shape and extracts one or more fields comprising text or pictures from the sensitive document. The…

    Methods and systems for extracting personal data from a sensitive document are provided. The system includes a document prediction module, a cropping module, a denoising module, and an optical character recognition (OCR) module. The document prediction module predicts type of document of the sensitive document using a keypoint matching-based approach and the cropping module extracts document shape and extracts one or more fields comprising text or pictures from the sensitive document. The denoising module prepares the one or more fields for optical character recognition, and the OCR module performs optical character recognition on the denoised one or more fields to detect characters in the one or more fields.

    Other inventors
    See patent
  • Methods and text summarization systems for data loss prevention and autolabelling

    Issued US20200226154A1

    Methods and systems for data loss prevention and autolabelling of business categories and confidentiality based on text summarization are provided. The method for data loss prevention includes entering a combination of keywords and/or keyphrases and offline unsupervised mapping of a path of transfer of specific groups of documents. The offline unsupervised mapping includes keyword/keyphrase extraction from the specific groups of documents and normalization of candidates. The method further…

    Methods and systems for data loss prevention and autolabelling of business categories and confidentiality based on text summarization are provided. The method for data loss prevention includes entering a combination of keywords and/or keyphrases and offline unsupervised mapping of a path of transfer of specific groups of documents. The offline unsupervised mapping includes keyword/keyphrase extraction from the specific groups of documents and normalization of candidates. The method further includes vectorization of the extracted keywords/keyphrases from the specific groups of documents and quantitative performance measurement of the keyword/keyphrase extraction to derive keywords and/or keyphrases suitable for data loss prevention.

    Other inventors
    See patent
  • Fully Explainable Document Classification Method And System

    Issued US20210374533A1

    Methods, systems and computer readable medium for explainable artificial intelligence are provided. The method for explainable artificial intelligence includes receiving a document and pre-processing the document to prepare information in the document for processing. The method further includes processing the information by an artificial neural network for one or more tasks. In addition, the method includes providing explanations and visualization of the processing by the artificial neural…

    Methods, systems and computer readable medium for explainable artificial intelligence are provided. The method for explainable artificial intelligence includes receiving a document and pre-processing the document to prepare information in the document for processing. The method further includes processing the information by an artificial neural network for one or more tasks. In addition, the method includes providing explanations and visualization of the processing by the artificial neural network to a user during processing of the information by the artificial neural network.

    Other inventors
    See patent
  • Deep learning engine and methods for content and context aware data classification

    Issued US20200279105A1

    Methods, systems and deep learning engines for content and context aware data classification by business category and confidentiality level are provided. The deep learning engine includes a feature extraction module and a classification and labelling module. The feature extraction module extracts both context features and document features from documents and the classification and labelling module is configured for content and context aware data classification of the documents by business…

    Methods, systems and deep learning engines for content and context aware data classification by business category and confidentiality level are provided. The deep learning engine includes a feature extraction module and a classification and labelling module. The feature extraction module extracts both context features and document features from documents and the classification and labelling module is configured for content and context aware data classification of the documents by business category and confidentiality level using neural networks.

    Other inventors
    See patent
  • Methods, personal data analysis system for sensitive personal information detection, linking and purposes of personal data usage prediction

    Issued US20200250139A1

    Systems and methods for personal data classification, linkage and purpose of processing prediction are provided. The system for personal data classification includes an entity extraction module for extracting personal data from one or more data repositories in a computer network or cloud infrastructure, a linkage module coupled to the entity extraction module, a linkage module coupled to the entity extraction module and a processing prediction module. The entity extraction module performs…

    Systems and methods for personal data classification, linkage and purpose of processing prediction are provided. The system for personal data classification includes an entity extraction module for extracting personal data from one or more data repositories in a computer network or cloud infrastructure, a linkage module coupled to the entity extraction module, a linkage module coupled to the entity extraction module and a processing prediction module. The entity extraction module performs entity recognition from the structured, semi-structured and unstructured records in the one or more data repositories. The linkage module uses graph-based methodology to link the personal data to one or more individuals. And the purpose prediction module includes a feature extraction module a purpose of processing prediction module, wherein the feature extraction module extracts both context features and record's features from records in the one or more data repositories, and the purpose of processing prediction module predicts a unique or multiple purpose of processing of the personal data.

    Other inventors
    See patent
  • Methods, machine learning engines and file management platform systems for content and context aware data classification and security anomaly detection

    Issued US WO2019035765A1

    Systems, methods and computer readable medium are provided for perform a method for content and context aware data classification or a method for content and context aware data security anomaly detection. The method for content and context aware data confidentiality classification includes scanning one or more documents in one or more network data repositories of a computer network and extracting content features and context features of the one or more documents into one or more term frequency-…

    Systems, methods and computer readable medium are provided for perform a method for content and context aware data classification or a method for content and context aware data security anomaly detection. The method for content and context aware data confidentiality classification includes scanning one or more documents in one or more network data repositories of a computer network and extracting content features and context features of the one or more documents into one or more term frequency- inverse document frequency (TF-IDF) vectors and one or more latent semantic indexing (LSI) vectors. The method further includes classifying the one or more documents into a number of category classifications by machine learning the extracted content features and context features of the one or more documents at a file management platform of the computer network, each of the category classifications being associated with one or more confidentiality classifications.

    See patent

Languages

  • English

    -

  • French

    -

Recommendations received

4 people have recommended Chris

Join now to view

More activity by Chris

View Chris’ full profile

  • See who you know in common
  • Get introduced
  • Contact Chris directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses