Does is make sense, in a mathematical and practical senes, to
look for 'probability of exploit'?
How does 'game theory' apply here?
How do intelligent adversaries figure into these mathematical
Is probabilistic risk analysis compatible with a game theory
Discussing how adaptive adversaries figure into our
mathematical models of predictability...
How do we use any of this to figure out path priorities in the
An interesting analogy to the credit scoring systems we all use
An interesting discussion of 'unknowns' and 'black swans'
Fantastic *practical* advice for getting this
data-science-backed analysis to work for YOUR organization
Lisa Leet - Lisa is a wife of 17 years, a
mother of 5 years to boy/girl twins, and an employee of 7 years on
the Information Security team at a Minneapolis-based financial
services firm. She is also an intern at Stamford Risk Analytics
(Stamford, CT), pursuing studies at Stanford University, prepping
for her CISSP Exam on July 15th, taking MOOCs, and reading at least
twelve books concurrently including a 1600-pager on Python. In her
free time she volunteers on the Board of Directors for SIRA
(Society of Information Risk Analysts) and participates in awesome
podcasts like DtR.
Russell Thomas ( @MrMeritology ) - Russell is a
Security Data Scientist in financial services, and a PhD student in
Computational Social Sciences. His focus is on the
intersection of information security and business and economic
decision making. He’s “MrMeritology” on Twitter, and blogs at
“Exploring Possibility Space”
Bob Blakley - Bob has been in the
security industry for more than 35 years. He's led the OMG
CORBAsecurity, SAML, and OATH standardization efforts, and
currently chairs the NSTIC Identity Ecosystem Steering Group.
He's in the drama department at a large multinational
Security. Some assembly required.
Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk.
This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise.
Read the blog > http://hp.com/go/white-rabbit
Follow along on Twitter > http://twitter.com/wh1t3rabbit