Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Data Driven Security

Data Driven Security

Jay Jacobs & Bob Rudis

A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
bookmark
Share icon

All episodes

Best episodes

Top 10 Data Driven Security Episodes

Goodpods has curated a list of the 10 best Data Driven Security episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Data Driven Security for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Data Driven Security episode by adding your comments to the episode page.

Data Driven Security - Data Driven Security - Episode 26
play

02/22/16 • 46 min

Episode 26

In this episode, Bob sits down with co-workers on the data science team at Rapid 7. They explore the future of security data science, Heisenberg and Project Sonar.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 24
play

01/12/16 • 39 min

Episode 24

In this episode, Bob & Jay talk to Charles Givre who has been doing training sessions for professionals trying to learn data science and recently did a training at a recent BlackHat event.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 1
play

01/13/14 • 70 min

Episode 1

In this episode, Bob & Jay invite Alex Pinto (@alexcpsec), Michael Roytman (@mroytman) & Russ Thomas (@mrmeritology) on to the show to discuss what makes up "security data science". They delve into the tools of the trade, posit on future of the intersection of security and data science and relate their own personal & professional experiences trying to introduce "data science" into infosec. Bob & Jay also talk about recent blog posts and do a mini-review of the recently published book "Data Smart".

Watch along "live" with the un-edited "director's" cut.

Topic/resources mentioned in this episode:

Russ Thomas

https://twitter.com/mrmeritology
- http://exploringpossibilityspace.blogspot.com/

Alex Pinto

https://twitter.com/alexcpsec

Michael Roytman

https://twitter.com/mroytman
- http://about.me/michaelroytman

MLSec Project

https://mlsecproject.org

KDD - Knowledge Discovery and Data Mining Conference

http://www.kdd.org/

The (in)famous KDD’99 dataset

http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Alex's version of the Data Science Venn Diagram

http://l.rud.is/1af3MLS

Alex's xkcd shirt

http://store-xkcd-com.myshopify.com/collections/apparel/products/self-reference

Measuring vs Modeling

https://www.usenix.org/system/files/login/articles/14_geer-online_0.pdf

VCDB: Top 10 Actions by Industry

http://datadrivensecurity.info/blog/posts/2014/Jan/top10-threat-actions/

Wizard Pro

http://www.wizardmac.com/

Julia

http://julialang.org/

The Data Science Venn Diagram

http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram

Data Smart

http://www.amazon.com/Data-Smart-Science-Transform-Information/dp/111866146X

Risk I/O

https://www.risk.io/

Make sure to bookmark Data Driven Security blog and podcast and check out the upcoming book.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 10
play

10/24/14 • 57 min

Episode 10

In this episode, Jay & Bob have a community discussion with John Langton & Alex Baker about their security data analysis & visualization startup: VisiTrend, and take a look at what's made the headlines in the data science community since last show.

Resources / people featured in the show:

Link Insights from VisiTrend

VERIS/VCDB general vis - we have a tree map version of the actors, actions, assets, and attributes breakdown which better shows the distribution of events (description on snapshot).
Snapshot - can be posted and viewed without logging in
Actual analysis and data you can load after signing up and logging in

VERIS/VCDB clustering - each square is an event in the data set. Squares are first grouped based on # of employees (e.g. companies with 1k employees will be grouped together), and then based on industry. Squares are colored based on clustering output - we found 7 clusters. We will provide more detail on what defines these clusters in a blog post. It’s interesting to see that particular industries do have particular attack types according to clustering, shown by blocks of similar color.
Snapshot - Actual analysis and data

Honeypot overview - this is really cool (I think). Black, square nodes are the honey pots. Node size is based on the # of packets they’re sending. Computers use more different ports are colored red (big red guy doing massive port scan drowns out the others). The force directed layout clusters nodes if they hit the same honeypots. For instance, click a node in an “outer ring” twice to highlight the honeypot it’s hitting, and it will be one. All other nodes in that ring hit the same one. Double click one of the center nodes and you’ll se they’re hitting all of the honeypots. Treemap groups nodes according to subnet addressing. The timeline view shows time-based histogram of packets coming in colored by destination port. The red guy is selected in the snapshot, so you can see that he blasts all the honey pots at relatively same time.
Snapshot - Actual analysis and data

Honeypot port highlighting - Square nodes are attackers, and circle nodes are ports. Size of the port is how many times packets were sent to that port. Mouse over big purple circle and you see port 1433 is the most popular. You could double click it to see all machines hitting that port. There are two color layers for the node-link graph, you can toggle between them. They both show a version of variability over time (more red = more variable port usage). Treemap shows subnet addressing again but colors a green heat map based on # of diff ports each machine uses. Size based on # of packets they send.
Snapshot - Actual analysis and data

Finally, a great mentor and visionary pioneer of InfoVis named Matt Ward passed away last weekend. He wrote the most recent, comprehensive infovis book with some other really big guys in the field including Keim and Grinnel. Link to the book.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 28
play

04/18/16 • 56 min

Episode 28

In this episode, Jay sat down with Doug Hubbard and Richard Seiersen to talk about their upcoming book "How to Measure Anything in Cybersecurity Risk". Bob talks about the rOpenSci unconference and the two talk about 2 recent publications.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 27
play

03/08/16 • 34 min

Episode 27

In this post-RSA conference episode, Jay participated with StoryCorps along with Wade Baker and the two reflected on their time working together on the Verizon Data Breach Investigations Report.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 25
play

01/28/16 • 29 min

Episode 25

In this episode, Bob & Jay talk amongst themselves. First they cover some recent work from Jay looking at Peer-to-Peer traffic and then they transition into conferences in 2016 with some element of being Data-Driven.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 21
play

10/30/15 • 58 min

Episode 21

In this episode, Bob & Jay talk data-driven security conferences with Lane Harrison, an assistant professor in Computer Science at Worcester Polytechnic Institute.

bookmark
plus icon
share episode
Data Driven Security - Data Driven Security - Episode 30
play

06/07/16 • 58 min

Episode 30

In this episode, Jay and Bob talk about the 2016 Verizon Data Breach Investigations Report (DBIR). But rather than talk about the insights and data analysis they focus in on the data visualizations. They are joined by Lane Harrison from Worcester Polytechnic Institute (WPI) and Ana Antanasoff and Gabrial Bassett from Verizon's Security Research Team.

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Data Driven Security have?

Data Driven Security currently has 31 episodes available.

What topics does Data Driven Security cover?

The podcast is about Information Security, Security, Infosec, How To, Podcasts, Technology, Education, Cyber Security, Data Science, Python, Cybersecurity and Network.

What is the most popular episode on Data Driven Security?

The episode title 'Data Driven Security - Episode 29' is the most popular.

What is the average episode length on Data Driven Security?

The average episode length on Data Driven Security is 50 minutes.

How often are episodes of Data Driven Security released?

Episodes of Data Driven Security are typically released every 27 days, 6 hours.

When was the first episode of Data Driven Security?

The first episode of Data Driven Security was released on Jan 2, 2014.

Show more FAQ

Toggle view more icon

Comments