The Cloudcast - Cloud Computing

AIOps for Security and Breach Protection

March 15, 2019
The Cloudcast - Cloud Computing
AIOps for Security and Breach Protection
Chapters
The Cloudcast - Cloud Computing
AIOps for Security and Breach Protection
Mar 15, 2019
Aaron Delp & Brian Gracely
Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches.
Show Notes

SHOW: 390

DESCRIPTION: Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches.

SHOW SPONSOR LINKS:

CLOUD NEWS OF THE WEEK

AWS Announced Open Distro for ElasticSearch

https://aws.amazon.com/blogs/opensource/keeping-open-source-open-open-distro-for-elasticsearch/

Rebuttals or Commentary on Open Distro for ElasticSearch  

Continuous Delivery Foundation launched by Linux Foundation
https://devops.com/the-linux-foundation-launches-continuous-delivery-foundation/

VC Investment in the Service Mesh space
Bouyant ($10M)
Tetrate ($12.5M

SHOW INTERVIEW LINKS:

SHOW NOTES:

Topic 1 - Welcome to the show. You have quite an interesting and impressive background. Can you talk a little bit about your work in academia prior to RiskIQ, and then what drew you to this space?

Topic 2 - RiskIQ focuses on helping companies mitigate massive security attacks. For people that don’t live in the security domain, can you give us a sense of what one of these attacks and breaches look like? 

Topic 3 - Can you give us a sense of how many of these massive attacks are utilizing new techniques, or is it variants of existing techniques, or just old techniques looking for new (vulnerable) targets? And are there tools to help companies understand how to prioritize against these?  

Topic 4 - Where are we in the industry in terms of the intersection of security best practices that IT teams can control, and when ML-driven capabilities can augment for more proactive security? 

Topic 5 - What are some of the things that you’re recommending to companies that are helping to make immediate impacts to them preventing or reducing massive breaches?

Feedback?

×

Listen to this podcast on