Artwork

Content provided by Jay Jacobs and Bob Rudis. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jay Jacobs and Bob Rudis or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Data Driven Security - Episode 6

1:11:50
 
Share
 

Manage episode 48625571 series 50115
Content provided by Jay Jacobs and Bob Rudis. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jay Jacobs and Bob Rudis or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Episode 6

In this episode, Jay & Bob have a late-night chat with Stephen Boyer, CTO of BitSight about discerning information about the security health of an organization solely through what can be publicly observed and the tools & infrastructure such an undertaking requires. You'll also hear Stephen's thoughts on reproducible security research, what he looks for in a data scientist and how to communicate results clearly & effectively.

Resources / people featured in the episode:

  continue reading

31 episodes

Artwork

Data Driven Security - Episode 6

Data Driven Security

149 subscribers

published

iconShare
 
Manage episode 48625571 series 50115
Content provided by Jay Jacobs and Bob Rudis. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jay Jacobs and Bob Rudis or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Episode 6

In this episode, Jay & Bob have a late-night chat with Stephen Boyer, CTO of BitSight about discerning information about the security health of an organization solely through what can be publicly observed and the tools & infrastructure such an undertaking requires. You'll also hear Stephen's thoughts on reproducible security research, what he looks for in a data scientist and how to communicate results clearly & effectively.

Resources / people featured in the episode:

  continue reading

31 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide