Épisodes

  • Cybersecurity Analytics - Module 12 - The Gap Between AI Accuracy & Truth
    May 1 2026

    This podcast outlines the core components of the NIST AI Risk Management Framework, focusing on the essential functions of governance, mapping, measurement, and management. To ensure responsible AI deployment, the framework highlights the importance of establishing clear policies, identifying stakeholder interests, and evaluating performance metrics like fairness and robustness. It emphasizes organizational accountability through oversight structures and systematic risk response planning during the technology's lifecycle. Additionally, the text defines the characteristics of trustworthy AI, which include safety, security, and the active mitigation of harmful biases. By integrating these functions, organizations can maintain transparency and ensure their systems remain valid and reliable.

    Afficher plus Afficher moins
    21 min
  • Cybersecurity Analytics - Module 11 - How Behavioral Analytics Catches Insider Threats
    May 1 2026

    This podcast details the use of User and Entity Behavior Analytics (UEBA) to identify and mitigate insider threats within a digital environment. By establishing behavioral baselines for login times, file access, and network norms, organizations can detect anomalies such as sudden data hoarding or impossible travel. The system aggregates various data sources, including authentication logs and cloud activity, to flag deviations that suggest misuse of legitimate access. It illustrates how these risk scores trigger formal investigations and responses. Ultimately, the source emphasizes that while automated profiling is powerful, effective security still requires human oversight and a commitment to user privacy.

    Afficher plus Afficher moins
    22 min
  • Cybersecurity Analytics - Module 10 - Why Perfect Security Is Mathematically Impossible
    May 1 2026

    This podcast examines cybersecurity from both an economic and technological standpoint, focusing on how organizations can efficiently manage digital risks. One source introduces the Gordon-Loeb Model, which uses mathematical frameworks to help executives determine the optimal level of investment by balancing potential losses against the productivity of security spending. This model suggests that firms should generally invest no more than 37% of their expected losses from a breach to ensure cost-effectiveness. Complementing this financial view, the second source explains adaptive authentication, a dynamic security method that adjusts access requirements based on real-time risk signals like user behavior and location. Together, these texts emphasize that 100% security is impossible, requiring leaders to make strategic, data-driven decisions that balance robust protection with operational efficiency. Organizations must prioritize their most valuable assets and use context-aware tools to mitigate threats while minimizing friction for legitimate users.

    Afficher plus Afficher moins
    19 min
  • Cybersecurity Analytics - Module 09 - Taming The Security Data Hurricane
    May 1 2026

    This podcast explains how data engineering serves as the vital foundation for converting messy, disorganized security logs into actionable intelligence. Because machine learning models require high-quality inputs, the source outlines a log ingestion pipeline that focuses on parsing, normalization, and feature extraction to ensure accurate analysis. It compares the roles of SIEMs and data lakes, highlighting the balance between real-time streaming for immediate detection and batch processing for historical threat hunting. The podcast also addresses the operational hurdles of managing large-scale telemetry, such as storage costs and data quality issues like missing fields or timing errors. Ultimately, the material emphasizes that while automated pipelines drive modern security analytics, human expertise remains essential for designing schemas and interpreting complex anomalies. Use examples, clarify terms, and ensure understanding.

    Afficher plus Afficher moins
    25 min
  • Cybersecurity Analytics - Module 08 - Tricking AI With Invisible Noise
    May 1 2026

    This podcast examines the foundational concepts of adversarial machine learning, focusing on how vulnerabilities emerge from imperfect learning and blind spots within a model’s logic. Exploratory attacks exploit these weaknesses after a system is deployed, requiring no direct access to the original training data to cause errors. These threats are categorized by their specificity, ranging from targeted attacks that subtly redirect a prediction to indiscriminate attacks that aim for total system failure. The material also highlights the adversarial space, which contains exploitable regions that exist because a model's abstraction of reality is inherently limited. Finally, the text explains that while a theoretical minimum error exists in classical settings, attackers in adversarial environments can actively increase this rate. This dynamic demonstrates that simply increasing the volume of data or the complexity of a model does not guarantee perfect security.

    Afficher plus Afficher moins
    20 min
  • Cybersecurity Analytics - Module 07 - Why Machine Learning Models Degrade In Production
    May 1 2026

    This podcast outlines critical strategies for maintaining high-quality machine learning (ML) lifecycles, with a specific focus on feedback loops and data integrity. One source details the AWS Well-Architected Framework, which promotes systematic monitoring and automated retraining to combat model performance degradation over time. Another emphasizes that the presence of missing data is a primary challenge, requiring a rigorous evaluation of imputation techniques like mean substitution or regression to preserve accuracy. Collectively, the texts advocate for a structured evaluation framework that considers factors such as computational efficiency, stability, and bias reduction. By integrating these MLOps best practices, organizations can foster a culture of continuous experimentation and improve the reliability of predictive models.

    Afficher plus Afficher moins
    20 min
  • Cybersecurity Analytics - Module 06 - Stopping Account Takeovers In A Glass Vault
    May 1 2026

    This podcast offers a comprehensive look at the economic impact, technical mechanisms, and prevention strategies associated with modern digital fraud, specifically focusing on account takeover (ATO) and payment systems. The texts detail how criminals exploit vulnerabilities in credit cards, mobile payments, and telecommunications through methods like phishing, credential stuffing, and hardware skimming. While businesses face significant financial and reputational risks from these breaches, individuals are also targeted via social engineering and sophisticated malware. To combat these threats, the authors recommend multi-layered security approaches, including biometric verification, behavioral analytics, and multi-factor authentication. Ultimately, the sources emphasize that as cybercriminals evolve through automation and AI, service providers must adopt real-time detection solutions to safeguard consumer data and financial assets.

    Afficher plus Afficher moins
    22 min
  • Cybersecurity Analytics - Module 05 - Hunting Cyber Threats In Encrypted Traffic
    Apr 29 2026

    This podcast provides a comprehensive network traffic data analysis using real-world traces. The research utilizes various open-source tools like tcpdump, tcptrace, and CoralReef alongside Matlab to examine traffic at the packet, flow, and connection levels. Key areas of investigation include protocol distribution, packet lengths, TCP retransmissions, and round-trip times. The author identifies significant patterns, such as the heavy-tailed nature of flow sizes and the prevalence of Zipf-type distributions in network traffic. Ultimately, the podcast described framework for network analysts to improve traffic engineering and resource optimization.

    Afficher plus Afficher moins
    20 min