Data Driven Security-logo

Data Driven Security

Technology Podcasts >

In this bi-weekly podcast, Bob & Jay delve into the dark art of security data science and talk with security practitioners who are pioneering the data-driven security movement. They cover everything from introductory analysis & visualization to cutting edge topics in security data science.

In this bi-weekly podcast, Bob & Jay delve into the dark art of security data science and talk with security practitioners who are pioneering the data-driven security movement. They cover everything from introductory analysis & visualization to cutting edge topics in security data science.
More Information

Location:

United States

Description:

In this bi-weekly podcast, Bob & Jay delve into the dark art of security data science and talk with security practitioners who are pioneering the data-driven security movement. They cover everything from introductory analysis & visualization to cutting edge topics in security data science.

Language:

English


Episodes

Data Driven Security - Episode 30

6/6/2016
More
Episode 30 In this episode, Jay and Bob talk about the 2016 Verizon Data Breach Investigations Report (DBIR). But rather than talk about the insights and data analysis they focus in on the data visualizations. They are joined by Lane Harrison from Worcester Polytechnic Institute (WPI) and Ana Antanasoff and Gabrial Bassett from Verizon's Security Research Team. Verizon DBIR

Duration:00:58:12

Data Driven Security - Episode 29

5/10/2016
More
Episode 29 In this episode, Jay and Bob talk about power laws and their application in cyber security. First, they talk with Marshall Kuypers, a PhD candidate in Management Science and Engineering at Stanford University and discuss power laws in general. Second, they sit down with Michael Roytman, Data Scientist and Kenna Security to talk about power laws in cyber security. Power LawsProbability Distributions

Duration:00:45:55

Data Driven Security - Episode 28

4/18/2016
More
Episode 28 In this episode, Jay sat down with Doug Hubbard and Richard Seiersen to talk about their upcoming book "How to Measure Anything in Cybersecurity Risk". Bob talks about the rOpenSci unconference and the two talk about 2 recent publications. rOpenScirNOAAWhen-ish is my Bus (pdf)Dell Secureworks Underground Hacker Marketplace ReportHow to Measure Anything in Cybersecurity Risk

Duration:00:56:04

Data Driven Security - Episode 27

3/8/2016
More
Episode 27 In this post-RSA conference episode, Jay participated with StoryCorps along with Wade Baker and the two reflected on their time working together on the Verizon Data Breach Investigations Report. https://storycorps.org/

Duration:00:34:17

Data Driven Security - Episode 26

2/22/2016
More
Episode 26 In this episode, Bob sits down with co-workers on the data science team at Rapid 7. They explore the future of security data science, Heisenberg and Project Sonar. http://community.rapid7.com/http://sonar.labs.rapid7.com/http://scans.io/http://github.com/rapid7

Duration:00:46:10

Data Driven Security - Episode 25

1/27/2016
More
Episode 25 In this episode, Bob & Jay talk amongst themselves. First they cover some recent work from Jay looking at Peer-to-Peer traffic and then they transition into conferences in 2016 with some element of being...

Duration:00:29:45

Data Driven Security - Episode 24

1/12/2016
More
Episode 24 In this episode, Bob & Jay talk to Charles Givre who has been doing training sessions for professionals trying to learn data science and recently did a training at a recent BlackHat event. Data-Driven Security: The BlogData-Driven Security: The Book

Duration:00:39:16

Data Driven Security - Episode 23

12/21/2015
More
Episode 23 In this episode, Bob & Jay talk tools (other than R and Python) for working with data: Excel, Tableau and AWS cloud services. Quick Look pluginsTableau023.m4a EC2 Official FeedQuick Look pluginsData-Driven Security: The BlogData-Driven Security: The Book

Duration:00:47:27

Data Driven Security - Episode 22

11/3/2015
More
Episode 22 In this episode, Bob & Jay dissect the looming corpse of security data science with special guest Allison Miller. Data mining firewall logs : Principal Component AnalysisMachine Learning Is Cybersecurity's Latest Pipe DreamData-Driven Security: The BlogData-Driven Security: The Book

Duration:00:47:27

Data Driven Security - Episode 21

10/30/2015
More
Episode 21 In this episode, Bob & Jay talk data-driven security conferences with Lane Harrison, an assistant professor in Computer Science at Worcester Polytechnic Institute. SIRAConVizSec

Duration:00:58:14

Data Driven Security - Episode 20

10/20/2015
More
Episode 20 In this episode, Bob & Jay talk security research with Ben Edwards, a security researcher with the University of New Mexico. Ben's List of Research PapersThe Complex Science of Cyber DefenseHype and Heavy Tails: A Closer Look at Data Breaches (pdf)

Duration:00:57:25

Data Driven Security - Episode 19

9/5/2015
More
Episode 19 In this episode, Bob & Jay talk #rstats with Oliver Keyes from the Wikimedia Foundation. Wikimedia foundation - https://wikimediafoundation.org/wiki/HomeOliver on Twitter - https://twitter.com/quominusOliver on GitHub - https://github.com/ironholdsR Talk Podcast - http://rtalk.org/*Not* Oliver's #rstats podcast: http://www.r-podcast.org/EARL 2015 Boston - http://www.earl-conference.com/boston/rOpenSec - https://github.com/rOpenSec

Duration:00:39:54

Data Driven Security - Episode 18

7/2/2015
More
Episode 18 In this episode, Bob & Jay have a heated discussion about visualization and security with Brandon Dixon of PassiveTotal Brandon's primary research involves data analysis, tool development and devising strategies to counter threats earlier in their decision cycle. Brandon maintains a blog at http://blog.9bplus.com where he reports on targeted attacks, open source threat data and analysis tools. His research on various security topics has gained accolades from many major...

Duration:00:36:00

Data Driven Security - Episode 17

5/14/2015
More
Episode 17 In this episode, Bob & Jay continue to get schooled on their 2015 DBIR data visualizations by Lane Harrison

Duration:00:54:23

Data Driven Security - Episode 16

5/14/2015
More
Episode 16 In this episode, Bob & Jay get schooled on their 2015 DBIR data visualizations by Lane Harrison

Duration:00:40:41

Data Driven Security - Episode 15

4/8/2015
More
Episode 15 In this episode, Bob & Jay provide your data-driven guide to BSides SF & RSA 2015

Duration:00:29:16

Data Driven Security - Episode 14

1/24/2015
More
Episode 14 In this episode, Jay & Bob get a data-driven conference review from Mike Sconzo & Jason Trost Jason TrostMike SconzoFlocon 2015 ProceedingsShmooCon 2015MC2 Workshop on Data-Driven Approaches to Security and Privacy This podcast is a companion to Data-Driven Security (the book) & Data-Driven Security (the blog). You can find us on Twitter at @ddsecblog / @ddsecpodcast & directly at @hrbrmstr / @jayjacobs.

Duration:00:49:56

Data Driven Security - Episode 13

12/9/2014
More
Episode 13 In this episode, Jay & Bob deconstruct VizSec 13 with Lane Harrison & Sophie Engle Sophie EngleLane Harrison@VizSecWebsite: VizSec.orgVizSec papers site (from @f2cx)VizSec 2014 Videos

Duration:01:02:44

Data Driven Security - Episode 12

12/1/2014
More
Episode 12 In this episode, Jay & Bob put the “Myths of Security Data Science” to the test with three denizens of the SDS Rogues Gallery (Alex Pinto, Michael Roytman & David Severski) + answer listener questions and give a shout out to Seaborn UNEDITED BLOOPER REEL Alex Pinto@mlsecproject Michael Roytman@riskio David SeverskiDavid's Blog SeabornData-Driven Security 30% off!

Duration:01:18:25

Data Driven Security - Episode 11

11/2/2014
More
Episode 11 In this episode, Jay & Bob talk Squirrels, Pigs & Maps with Preeminent Data Scientist Jason Trost from ThreatStream, and take a look at what's made the headlines in the data science community since last show. Watch the UNEDITED BLOOPER REEL!Jason Trostcovert.io blogThreatStreamClairvoyant Squirrel: Large Scale Malicious Domain ClassificationBinary PigBinary Pig github repoModern Honey NetworkRoll Your Own IP Attack Graphs with IPewMap or Don't MapDAVIX 2014 ReleasedLynn Cherny...

Duration:00:54:10