Data Analysis Challenges in Cybersecurity

Поделиться
HTML-код
  • Опубликовано: 17 июл 2024
  • An overview of the challenges in data collection and monitoring that can protect from cyber threats. As organizations expand their digital estate and the workforce evolves into a hybrid environment, businesses must monitor tremendous amounts of data to detect suspicious activity. Through millions of events, cybersecurity analysts and data scientists must reduce false positives, identify suspicious signals, and compile threat intelligence to protect their organization.
    In this session, we will review the challenges in data collection and monitoring as well as the tools and solutions that can be leveraged to get up to speed and protect against cyber threats.
    About the Presenter:
    Jordan is a Program Manager 2 at Microsoft working with Azure Security Solutions. He has a B.S. in Industrial Engineering from Purdue University and has a strong focus on cybersecurity, social good, and digital transformation. Jordan has worked across numerous industries (public and commercial) in their adoption of technology to enhance privacy, social programs, and organizational security.
    Table of Contents:
    0:00 - Introduction
    3:00 - Security roles
    8:11 - Cyber challenges
    12:17 - Collection is not detection
    13:20 - Consequences of over-collection
    16:16 - Cyber in the news
    19:16 - SolarWinds case study
    27:48 - Cloud security posture management
    30:07 - Security information event management
    33:13 - Security Orchestration, automation, and response
    35:00 - QnA
    Do you trust AI-based solutions blindly? Do you know what adversarial examples are and how they can be used to poison the models? Then, our playlist is a one-stop you will make to address all your questions: • Introduction to Robust...
    --
    At Data Science Dojo, we believe data science is for everyone. Our data science trainings have been attended by more than 10,000 employees from over 2,500 companies globally, including many leaders in tech like Microsoft, Google, and Facebook. For more information please visit: hubs.la/Q01Z-13k0
    💼 Learn to build LLM-powered apps in just 40 hours with our Large Language Models bootcamp: hubs.la/Q01ZZGL-0
    💼 Get started in the world of data with our top-rated data science bootcamp: hubs.la/Q01ZZDpt0
    💼 Master Python for data science, analytics, machine learning, and data engineering: hubs.la/Q01ZZD-s0
    💼 Explore, analyze, and visualize your data with Power BI desktop: hubs.la/Q01ZZF8B0
    --
    Unleash your data science potential for FREE! Dive into our tutorials, events & courses today!
    📚 Learn the essentials of data science and analytics with our data science tutorials: hubs.la/Q01ZZJJK0
    📚 Stay ahead of the curve with the latest data science content, subscribe to our newsletter now: hubs.la/Q01ZZBy10
    📚 Connect with other data scientists and AI professionals at our community events: hubs.la/Q01ZZLd80
    📚 Checkout our free data science courses: hubs.la/Q01ZZMcm0
    📚 Get your daily dose of data science with our trending blogs: hubs.la/Q01ZZMWl0
    --
    📱 Social media links
    Connect with us: / data-science-dojo
    Follow us: / datasciencedojo
    Keep up with us: / data_science_dojo
    Like us: / datasciencedojo
    Find us: www.threads.net/@data_science...
    --
    Also, join our communities:
    LinkedIn: / 13601597
    Twitter: / 1677363761399865344
    Facebook: / aiandmachinelearningfo...
    Vimeo: vimeo.com/datasciencedojo
    Discord: / discord
    _
    Want to share your data science knowledge? Boost your profile and share your knowledge with our community: hubs.la/Q01ZZNCn0
    #dataanalysis #cybersecurity #tech

Комментарии • 2

  • @Datasciencedojo
    @Datasciencedojo  10 месяцев назад

    Do you trust AI-based solutions blindly? Do you know what adversarial examples are and how they can be used to poison the models? Then, our playlist is a one-stop you will make to address all your questions: ruclips.net/p/PL8eNk_zTBST-WXbWSuIiGdIjLtD5XbPvm

  • @priyadarshini7012
    @priyadarshini7012 2 года назад

    How can Data Scientists play a vital role in fighting against Cybersecurity Threats Provide an example.