Couverture de Dr. Z's Podcasts

Dr. Z's Podcasts

Dr. Z's Podcasts

De : Dr. Z
Écouter gratuitement

À propos de ce contenu audio

A series of podcasts to help students and everyday individuals with proper thinking and ethics. Sometimes the best decision an ethical person can make is to just stay silent, detached, and mind their own business. The podcasts include material on other courses such as security analytics, networks and security, history, government, and literature.

Nima Zahadat, Ph.D. 2026
Épisodes
  • Cybersecurity Analytics - Module 12 - The Gap Between AI Accuracy & Truth
    May 1 2026

    This podcast outlines the core components of the NIST AI Risk Management Framework, focusing on the essential functions of governance, mapping, measurement, and management. To ensure responsible AI deployment, the framework highlights the importance of establishing clear policies, identifying stakeholder interests, and evaluating performance metrics like fairness and robustness. It emphasizes organizational accountability through oversight structures and systematic risk response planning during the technology's lifecycle. Additionally, the text defines the characteristics of trustworthy AI, which include safety, security, and the active mitigation of harmful biases. By integrating these functions, organizations can maintain transparency and ensure their systems remain valid and reliable.

    Afficher plus Afficher moins
    21 min
  • Cybersecurity Analytics - Module 11 - How Behavioral Analytics Catches Insider Threats
    May 1 2026

    This podcast details the use of User and Entity Behavior Analytics (UEBA) to identify and mitigate insider threats within a digital environment. By establishing behavioral baselines for login times, file access, and network norms, organizations can detect anomalies such as sudden data hoarding or impossible travel. The system aggregates various data sources, including authentication logs and cloud activity, to flag deviations that suggest misuse of legitimate access. It illustrates how these risk scores trigger formal investigations and responses. Ultimately, the source emphasizes that while automated profiling is powerful, effective security still requires human oversight and a commitment to user privacy.

    Afficher plus Afficher moins
    22 min
  • Cybersecurity Analytics - Module 10 - Why Perfect Security Is Mathematically Impossible
    May 1 2026

    This podcast examines cybersecurity from both an economic and technological standpoint, focusing on how organizations can efficiently manage digital risks. One source introduces the Gordon-Loeb Model, which uses mathematical frameworks to help executives determine the optimal level of investment by balancing potential losses against the productivity of security spending. This model suggests that firms should generally invest no more than 37% of their expected losses from a breach to ensure cost-effectiveness. Complementing this financial view, the second source explains adaptive authentication, a dynamic security method that adjusts access requirements based on real-time risk signals like user behavior and location. Together, these texts emphasize that 100% security is impossible, requiring leaders to make strategic, data-driven decisions that balance robust protection with operational efficiency. Organizations must prioritize their most valuable assets and use context-aware tools to mitigate threats while minimizing friction for legitimate users.

    Afficher plus Afficher moins
    19 min
adbl_web_anon_alc_button_suppression_c
Aucun commentaire pour le moment