Data Driven Security
Jay Jacobs & Bob Rudis
All episodes
Best episodes
Top 10 Data Driven Security Episodes
Goodpods has curated a list of the 10 best Data Driven Security episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Data Driven Security for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Data Driven Security episode by adding your comments to the episode page.
Data Driven Security - Episode 26
Data Driven Security
02/22/16 • 46 min
Episode 26
In this episode, Bob sits down with co-workers on the data science team at Rapid 7. They explore the future of security data science, Heisenberg and Project Sonar.
- Keep on top of Heisenberg developments at http://community.rapid7.com/
- Find out more about Project Sonar at http://sonar.labs.rapid7.com/ and http://scans.io/
- Get tools to work with both at http://github.com/rapid7
Data Driven Security - Episode 24
Data Driven Security
01/12/16 • 39 min
Episode 24
In this episode, Bob & Jay talk to Charles Givre who has been doing training sessions for professionals trying to learn data science and recently did a training at a recent BlackHat event.
Data Driven Security - Episode 11
Data Driven Security
11/03/14 • 54 min
Episode 11
In this episode, Jay & Bob talk Squirrels, Pigs & Maps with Preeminent Data Scientist Jason Trost from ThreatStream, and take a look at what's made the headlines in the data science community since last show.
- Watch the UNEDITED BLOOPER REEL!
- Jason Trost
- covert.io blog
- ThreatStream
- Clairvoyant Squirrel: Large Scale Malicious Domain Classification
- Binary Pig
- Binary Pig github repo
- Modern Honey Network
- Roll Your Own IP Attack Graphs with IPew
- Map or Don't Map
- DAVIX 2014 Released
- Lynn Cherny "roundup of recent text analytics & vis work"
- How a fraud detection algorithm consipred to ruin my recent trip
- Collecting all IPv4 WHOIS records in Python
- Linked Small Multiples
Data Driven Security - Episode 1
Data Driven Security
01/13/14 • 70 min
Episode 1
In this episode, Bob & Jay invite Alex Pinto (@alexcpsec), Michael Roytman (@mroytman) & Russ Thomas (@mrmeritology) on to the show to discuss what makes up "security data science". They delve into the tools of the trade, posit on future of the intersection of security and data science and relate their own personal & professional experiences trying to introduce "data science" into infosec. Bob & Jay also talk about recent blog posts and do a mini-review of the recently published book "Data Smart".
Watch along "live" with the un-edited "director's" cut.
Topic/resources mentioned in this episode:
Russ Thomas
https://twitter.com/mrmeritology
- http://exploringpossibilityspace.blogspot.com/
Alex Pinto
Michael Roytman
https://twitter.com/mroytman
- http://about.me/michaelroytman
MLSec Project
KDD - Knowledge Discovery and Data Mining Conference
The (in)famous KDD’99 dataset
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Alex's version of the Data Science Venn Diagram
Alex's xkcd shirt
http://store-xkcd-com.myshopify.com/collections/apparel/products/self-reference
Measuring vs Modeling
https://www.usenix.org/system/files/login/articles/14_geer-online_0.pdf
VCDB: Top 10 Actions by Industry
http://datadrivensecurity.info/blog/posts/2014/Jan/top10-threat-actions/
Wizard Pro
Julia
The Data Science Venn Diagram
http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram
Data Smart
http://www.amazon.com/Data-Smart-Science-Transform-Information/dp/111866146X
Risk I/O
Make sure to bookmark Data Driven Security blog and podcast and check out the upcoming book.
Data Driven Security - Episode 10
Data Driven Security
10/24/14 • 57 min
Episode 10
In this episode, Jay & Bob have a community discussion with John Langton & Alex Baker about their security data analysis & visualization startup: VisiTrend, and take a look at what's made the headlines in the data science community since last show.
Resources / people featured in the show:
- VisiTrend - visitrend (twitter)
- Data science can't be point and click
- In-depth introduction to machine learning in 15 hours of expert videos
- Data Playlists
- Running RStudio via Docker in the Cloud
- Building a DGA Classsifier (in R) - Part 1
- Building a DGA Classsifier (in R) - Part 2
- Building a DGA Classsifier (in R) - Part 3
Link Insights from VisiTrend
VERIS/VCDB general vis - we have a tree map version of the actors, actions, assets, and attributes breakdown which better shows the distribution of events (description on snapshot).
Snapshot - can be posted and viewed without logging in
Actual analysis and data you can load after signing up and logging in
VERIS/VCDB clustering - each square is an event in the data set. Squares are first grouped based on # of employees (e.g. companies with 1k employees will be grouped together), and then based on industry. Squares are colored based on clustering output - we found 7 clusters. We will provide more detail on what defines these clusters in a blog post. It’s interesting to see that particular industries do have particular attack types according to clustering, shown by blocks of similar color.
Snapshot - Actual analysis and data
Honeypot overview - this is really cool (I think). Black, square nodes are the honey pots. Node size is based on the # of packets they’re sending. Computers use more different ports are colored red (big red guy doing massive port scan drowns out the others). The force directed layout clusters nodes if they hit the same honeypots. For instance, click a node in an “outer ring” twice to highlight the honeypot it’s hitting, and it will be one. All other nodes in that ring hit the same one. Double click one of the center nodes and you’ll se they’re hitting all of the honeypots. Treemap groups nodes according to subnet addressing. The timeline view shows time-based histogram of packets coming in colored by destination port. The red guy is selected in the snapshot, so you can see that he blasts all the honey pots at relatively same time.
Snapshot - Actual analysis and data
Honeypot port highlighting - Square nodes are attackers, and circle nodes are ports. Size of the port is how many times packets were sent to that port. Mouse over big purple circle and you see port 1433 is the most popular. You could double click it to see all machines hitting that port. There are two color layers for the node-link graph, you can toggle between them. They both show a version of variability over time (more red = more variable port usage). Treemap shows subnet addressing again but colors a green heat map based on # of diff ports each machine uses. Size based on # of packets they send.
Snapshot - Actual analysis and data
Finally, a great mentor and visionary pioneer of InfoVis named Matt Ward passed away last weekend. He wrote the most recent, comprehensive infovis book with some other really big guys in the field including Keim and Grinnel. Link to the book.
Data Driven Security - Episode 28
Data Driven Security
04/18/16 • 56 min
Episode 28
In this episode, Jay sat down with Doug Hubbard and Richard Seiersen to talk about their upcoming book "How to Measure Anything in Cybersecurity Risk". Bob talks about the rOpenSci unconference and the two talk about 2 recent publications.
Data Driven Security - Episode 27
Data Driven Security
03/08/16 • 34 min
Episode 27
In this post-RSA conference episode, Jay participated with StoryCorps along with Wade Baker and the two reflected on their time working together on the Verizon Data Breach Investigations Report.
- Find out more about StoryCorps at https://storycorps.org/
Data Driven Security - Episode 25
Data Driven Security
01/28/16 • 29 min
Episode 25
In this episode, Bob & Jay talk amongst themselves. First they cover some recent work from Jay looking at Peer-to-Peer traffic and then they transition into conferences in 2016 with some element of being Data-Driven.
- FloCon 2016 (you just missed it!)
January 9–12, 2017 in San Diego, CA
http://www.cert.org/flocon/ - ShmooCon 2016
http://shmoocon.org/
January 15-17, 2016 in Washington, D.C. - 2016 Cyber Risk Insights Conference
http://www.advisenltd.com/events/conferences/09/02/2016-cyber-risk-insights-conference-london/
February 9, 2016 in London - Network and Distributed System Security (NDSS) Symposium
February 21-24, 2016 in San Diego, California - RSA Conference 2016
http://www.rsaconference.com/events/us16
February 29 - March 4, 2016 in San Francisco, CA - 1st IEEE European Sumposium on Security & Privacy
http://www.ieee-security.org/TC/EuroSP2016/
March 21-24, 2016 in Saarbrücken, GERMANY - 37th IEEE Symposium on Security & Privacy
http://www.ieee-security.org/TC/EuroSP2016/
May 23-25, 2016 in San Jose, CA - 11th Annual Cyber and Information Security Research (CISR) Conference
http://www.cisr.ornl.gov/cisrc16/
April 5-7, 2016 in Oak Ridge, TN - 15th Annual Workshop on the Economics of Information Security (WEIS)
http://weis2016.econinfosec.org/
June 13-14, 2016 in Berkeley, CA USA - International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016)
http://c-mric.org/csa2016
June 13-14, 2016 in London - 25th USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity16
August 10–12, 2016, in Austin, TX. - SIRAcon
http://societyinforisk.org/
October-ish 2016 (TBA) - The Fifth International Conference on Informatics and Applications (ICIA2016)
http://sdiwc.net/conferences/fifth-international-conference-informatics-applications/
November 14-16, 2016 in Takamatsu, Japan - 2015 Annual Computer Security Applications Conference
http://www.acsac.org/2015/
December 5-9, 2016 in Los Angeles, CA - Data-Driven Security: The Blog
- Data-Driven Security: The Book
Data Driven Security - Episode 30
Data Driven Security
06/07/16 • 58 min
Episode 30
In this episode, Jay and Bob talk about the 2016 Verizon Data Breach Investigations Report (DBIR). But rather than talk about the insights and data analysis they focus in on the data visualizations. They are joined by Lane Harrison from Worcester Polytechnic Institute (WPI) and Ana Antanasoff and Gabrial Bassett from Verizon's Security Research Team.
Show more best episodes
Show more best episodes
FAQ
How many episodes does Data Driven Security have?
Data Driven Security currently has 31 episodes available.
What topics does Data Driven Security cover?
The podcast is about Information Security, Security, Infosec, How To, Podcasts, Technology, Education, Cyber Security, Data Science, Python, Cybersecurity and Network.
What is the most popular episode on Data Driven Security?
The episode title 'Data Driven Security - Episode 29' is the most popular.
What is the average episode length on Data Driven Security?
The average episode length on Data Driven Security is 50 minutes.
How often are episodes of Data Driven Security released?
Episodes of Data Driven Security are typically released every 27 days, 6 hours.
When was the first episode of Data Driven Security?
The first episode of Data Driven Security was released on Jan 2, 2014.
Show more FAQ
Show more FAQ