(mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success

Presented by

Nik Whitfield, CEO, Panaseer

About this talk

Data-driven security and security data science are the ‘new hotness’. CISOs and their operations teams know they need critical insights from their data to measure success, prioritise resources for best result, and disrupt attacker ROI efficiently. But today, most data-driven security efforts see expensive talent spend their time wading through sewage rather than panning for gold. This wastes time, money and resources. This session will: * Quickly tour through problems past and present in gaining high value security insights from data * Explain what these problems show about how we need to engineer data-driven security approaches to meet use-case needs at best cost * Give practical examples of how you can use security data science effectively by boiling the kettle, rather than trying to boil the ocean

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (443)
Subscribers (13408)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more