POPULARITY
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Davi Ottenheimer, vp, trust and digital ethics, Inrupt. Sir Tim Berners-Lee co-founded Inrupt to provide enterprise-grade software and services for the Solid Protocol. You can find their open positions here. In this episode: LLMs lack integrity controls A valid criticism Doubts in self-policing AI New tech, familiar problems Thanks to our podcast sponsor, Concentric AI Concentric AI's DSPM solution automates data security, protecting sensitive data in real-time. Our AI-driven solution identifies, classifies, and secures on-premises and cloud data to reduce risk across your enterprise. Seamlessly integrated with tools like Microsoft Copilot, Concentric AI empowers your team to innovate securely and maintain compliance all while eliminating manual data protection tasks. Ready to put RegEx and trainable classifiers in the rear view mirror? Contact Concentric AI today!
All links and images for this episode can be found on CISO Series. In principle, we can generally all agree that security theater is a waste of time for security teams. But the reality is that these are things that look good, so it can be hard to justify to non-technical leadership why you're eliminating something they see as secure. So how can we positively identify actual security theater practices and how do we communicate that to the rest of the organization? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our guest, Davi Ottenheimer, vp of trust and digital ethics, Inrupt. Thanks to our podcast sponsor, Sysdig For businesses innovating in the cloud, every second counts. Sysdig strengthens cyber resilience by reducing the attack surface, detecting threats in real time, and accelerating incident response. Our platform correlates signals across cloud workloads, identities, and services to enable businesses to prioritize risks and act decisively. Sysdig. Secure every second. In this episode: Is security theater a waste of time for security teams? Why can it be hard to justify to non-technical leadership why you're eliminating something they see as secure? How can we positively identify actual security theater practices and how do we communicate that to the rest of the organization?
Link to blog post This week's Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest Davi Ottenheimer, VP, Trust and Ethics, Inrupt Thanks to our show sponsor, Conveyor The team at Lucid software reduced the time spent answering customer security questionnaires by a whopping 91% with Conveyor's security questionnaire automation software – powered by OpenAI. Compared to the tools on the market, Conveyor's AI auto-generates the most accurate answers to entire questionnaires so you can spend almost zero time on them. That's it. That's the ad. We'll let you get back to the show, but if you want to take away the pain of questionnaires, try a free proof of concept at www.conveyor.com. All links and the video of this episode can be found on CISO Series.com
Guests: Leah McLean, Vice President - Cybersecurity Specialist, Mastercard Data & Services [@Mastercard]On LinkedIn | https://www.linkedin.com/in/leahrmclean/On Twitter | https://twitter.com/lmcleanDiana Kelley, Chief Security Officer / Chief Strategy Officer, CybrizeOn LinkedIn | https://www.linkedin.com/in/dianakelleysecuritycurve/At RSAC | https://www.rsaconference.com/experts/diana-kelleyDavi Ottenheimer, VP Trust and Digital Ethics, Inrupt [@inrupt]At RSAC | https://www.rsaconference.com/experts/Davi%20Ottenheimer____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this panel, we will explore the potential impact artificial intelligence technologies can have on the role of the security analyst and security operations. How can these technologies be used for:Education, training, skill development, and practice?Better protection, detection, response, and recovery?Program definition, planning, management, and measurement to create better results?Connect security operations to the business to drive better business outcomes?Given some of the controversy surrounding generative AI (ChatGPT), we will also explore the potential harms coming from the use of these technologies.____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
Guests: Leah McLean, Vice President - Cybersecurity Specialist, Mastercard Data & Services [@Mastercard]On LinkedIn | https://www.linkedin.com/in/leahrmclean/On Twitter | https://twitter.com/lmcleanDiana Kelley, Chief Security Officer / Chief Strategy Officer, CybrizeOn LinkedIn | https://www.linkedin.com/in/dianakelleysecuritycurve/At RSAC | https://www.rsaconference.com/experts/diana-kelleyDavi Ottenheimer, VP Trust and Digital Ethics, Inrupt [@inrupt]At RSAC | https://www.rsaconference.com/experts/Davi%20Ottenheimer____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this panel, we will explore the potential impact artificial intelligence technologies can have on the role of the security analyst and security operations. How can these technologies be used for:Education, training, skill development, and practice?Better protection, detection, response, and recovery?Program definition, planning, management, and measurement to create better results?Connect security operations to the business to drive better business outcomes?Given some of the controversy surrounding generative AI (ChatGPT), we will also explore the potential harms coming from the use of these technologies.____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
HostsSean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliEpisode NotesThe ITSPmagazine Weekly Catch-Up | 14-April-2023 | With Marco Ciappelli and Sean MartinITSPmagazine YouTube Channel
There's a lot of worry about "fakes" especially in a world rapidly adopting AI/ML, so it's time for solutions. "Solid" is the W3C open standard, extending HTTPS, to upgrade the Web with security paradigms that solve for data integrity. Distributed systems naturally break through digital moats, free control through proper ownership, thus helping expand and achieve the best of the Internet. Segment Resources: https://solidproject.org/ https://github.com/inrupt https://www.flyingpenguin.com/?p=29523 https://alltechishuman.org/davi-ottenheimer https://www.schneier.com/blog/archives/2020/02/inrupt_tim_bern.html https://events.inrupt.com/dublin This week in the Security News: Crypto Miners Using Tox P2P Messenger as Command and Control Server, 8-year-old Linux Kernel flaw DirtyCred is nasty as Dirty Pipe, & Janet Jackson music video given CVE for crashing laptops, & more! Segment Resources: Use code "securityweekly" to save 10% off Hack Red Con tickets at https://www.hackredcon.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw753
There's a lot of worry about "fakes" especially in a world rapidly adopting AI/ML, so it's time for solutions. "Solid" is the W3C open standard, extending HTTPS, to upgrade the Web with security paradigms that solve for data integrity. Distributed systems naturally break through digital moats, free control through proper ownership, thus helping expand and achieve the best of the Internet. Segment Resources: https://solidproject.org/ https://github.com/inrupt https://www.flyingpenguin.com/?p=29523 https://alltechishuman.org/davi-ottenheimer https://www.schneier.com/blog/archives/2020/02/inrupt_tim_bern.html https://events.inrupt.com/dublin Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw753
There's a lot of worry about "fakes" especially in a world rapidly adopting AI/ML, so it's time for solutions. "Solid" is the W3C open standard, extending HTTPS, to upgrade the Web with security paradigms that solve for data integrity. Distributed systems naturally break through digital moats, free control through proper ownership, thus helping expand and achieve the best of the Internet. Segment Resources: https://solidproject.org/ https://github.com/inrupt https://www.flyingpenguin.com/?p=29523 https://alltechishuman.org/davi-ottenheimer https://www.schneier.com/blog/archives/2020/02/inrupt_tim_bern.html https://events.inrupt.com/dublin This week in the Security News: Crypto Miners Using Tox P2P Messenger as Command and Control Server, 8-year-old Linux Kernel flaw DirtyCred is nasty as Dirty Pipe, & Janet Jackson music video given CVE for crashing laptops, & more! Segment Resources: Use code "securityweekly" to save 10% off Hack Red Con tickets at https://www.hackredcon.com/ Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw753
There's a lot of worry about "fakes" especially in a world rapidly adopting AI/ML, so it's time for solutions. "Solid" is the W3C open standard, extending HTTPS, to upgrade the Web with security paradigms that solve for data integrity. Distributed systems naturally break through digital moats, free control through proper ownership, thus helping expand and achieve the best of the Internet. Segment Resources: https://solidproject.org/ https://github.com/inrupt https://www.flyingpenguin.com/?p=29523 https://alltechishuman.org/davi-ottenheimer https://www.schneier.com/blog/archives/2020/02/inrupt_tim_bern.html https://events.inrupt.com/dublin Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw753
All links and images for this episode can be found on CISO Series A young woman is killing it in her first cybersecurity job out of college. Management is so thrilled with her that they want to give her a promotion. Problem is the promotion reveals a lot of other innerworkings that don't speak well of the company's culture. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Davi Ottenheimer (@daviottenheimer), vp trust and digital ethics, Inrupt. Thanks to our podcast sponsor, Code42 As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more. In this episode: A student has some serious privacy concerns when they learn that "all data is being monitored and anonymously collected." We examine how we can break from the Internet Oligarchs who appear to be consuming, selling, and using so much of our data. How GDPR can benefit organizations to stay ahead of the competition. A young recruit facing imposter syndrome after receiving a promotion with added responsibilities.
Davi joins us to discuss how the Internet has evolved since its creation. We also dive into the issues with Facebook, and why everyone needs to deactivate their social media accounts. Interview with Davi Ottenheimer, Lead Security at Inrupt. You can check out his blog here: https://bit.ly/3Ks00nM This episode is brought to you by EthicsGrade, an ESG Ratings agency with a particular focus on Technology Governance, especially AI Ethics. You can find more information about EthicsGrade here: https://www.ethicsgrade.io/ You can also follow EthicsGrade on Twitter (@EthicsGrade) and LinkedIn: https://bit.ly/2JCiQOg Connect with Us: Join our Slack channel for more conversation about the big ethics issues that rise from AI: https://bit.ly/3jVdNov Follow Are You A Robot? on Twitter, Instagram, and Facebook: @AreYouARobotPod Follow our LinkedIn page: https://bit.ly/3gqzbSw Check out our website: https://www.areyouarobot.co.uk/ Resources: Interview with Robbie Stamp: https://bit.ly/3qIPVLj “The Three-Body People” https://bit.ly/33UYaLi Mark Zuckerberg's interview: https://bit.ly/3cHkUj5 Davi's blog: https://bit.ly/3rD7sno
Debbie Reynolds “The Data Diva” talks to Davi Ottenheimer VP, Trust, and Digital Ethics Technologist, Inrupt. We discuss our lack of preparedness for the future of AI and technology, ethics inAI, AI errors have no redress, correct balance between law and technology, difficulty in crafting a US Federal Data Privacy law, individual agency with identity rights, AI bias and inference, the concept of digital slavery, the privacy vs security debate, and his hopes for Data Privacy in the future.
Link to Blog Post https://cisoseries.com/cyber-security-headlines-week-in-review-april-12-16-2021 This week’s Cyber Security Headlines - Week in Review, April 12-16, 2021, is hosted by Steve Prentice (@stevenprentice) with our guest, Davi Ottenheimer, vp, trust and digital ethics, Inrupt. Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations around the world are turning to Sonatype as trusted advisors. The company’s Nexus platform offers the only full-spectrum control of the cloud-native software development lifecycle including third-party open source code, first-party source code, infrastructure as code, and containerized code. All links and the video of this episode can be found on CISO Series.com
How do we save the world wide web again?
Davi is VP of Trust and Digital Ethics at Inrupt. Inrupt, the startup from World Wide Web founder Sir Tim Berners-Lee, is building a new decentralised version of the internet with the aim of shaping a new era of creativity, opportunity, and market-shaping competition for all. With over twenty five years of experience in Cyber Security, Davi has gained a deep understanding of risk assessment, security incident management and software protection. He is the author of the book "Realities of Securing Big Data" and is also an affiliate of the Policy Innovation Lab of Tomorrow at Penn State University where he lectures in consumer privacy and artificial intelligence. Davi joins us to talk about his days as one of the early internet hackers, his first hand experience of the dot com bubble and how Inrupt is giving users back control of their data. https://www.inrupt.com/
Byron speaks with author and security expert Davi Ottenheimer on the relationship between ai and security. Episode 115 – A Conversation with Davi Ottenheimer
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-legal-protection-for-cisos/) What's the legal responsibility of a CISO? New cases are placing the liability for certain aspects of security incidents squarely on the CISO. And attorney-client privilege has been overruled lately too. What does this mean for corporate and for CISO risk? Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, co-host Allan Alford (@allanalfordintx), and our guest is Evan Wolff, partner at Crowell & Moring. Thank to our episode sponsor, TrustMAPP. TrustMAPP delivers continuous, automated Security Performance Management, a real-time view of your cybersecurity maturity. TrustMAPP tells you where you are, where you’re going, and what it will take to get there. TrustMAPP lets you manage security as a business, quantifying and prioritizing remediation actions and costs. On this episode of Defense in Depth, you’ll learn: We repeatedly joke about Davi Ottenheimer's comment that the CISO has held the moniker of "designated felon" in American risk mitigation. Big piece of advice that was repeated throughout the episode is to have an employment contract. In the employment contract you want an exit strategy that allows you to leave if you think a situation is not tenable or the company is asking you to do something that you believe to be unethical. It gives you an opportunity to leave without any blame assigned. The cc field is your friend. If you don't want to be seen as the only one "in the know" take advantage of making sure key people are also in the loop. We heard one unbelievable story of an employment contract where it was clear that the CISO would be the "designated felon" should there be any breach. This was put in place to protect the executive team. The contract offered financial security for two years post breach. We all agreed this was insane and had never heard of anything like that before. Be wary of being forced to take on personal ownership of security issues. A CISO is responsible, not accountable.
On this episode, Davi Ottenheimer delivers a clear and compelling argument that Ethics is security, that Facebook should not only broken up, but dissolved and that keeping markets free means removing things that harm the marketplace. And the most provocative question of all: is the US still in a civil war?
When Sir Tim Berners-Lee invented the web, it was intended for everyone. Now it is dominated by a few tech companies who have accumulated huge amounts of data on its users. So Tim decided to make a change. He launched Solid, an open source platform, built to decentralise the web and give citizens more power over their data. Alongside this, a new business called Inrupt was created to design and deliver new services from this technology. VP for Trust and Digital Ethics at Inrupt, Davi Ottenheimer, joins Damian Collins this week. Dr Charles Kriel unpacks the new Twitter-like platform for conservatives, Parler.
All links and images for this episode can be found on CISO Series (https://cisoseries.com/we-compensate-our-low-paying-ciso-jobs-with-high-stress/) On this week's episode we're seeking candidates for unrealistically low-paying CISO positions. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Nir Rothenberg, CISO, Rapyd. Thanks to this week's podcast sponsor Trend Micro. Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit www.trendmicro.com. On this week's episode Why is everyone talking about this now? On LinkedIn, Farhan Khan, a recruiter at CyberApt Recruitment, told a tale of getting a call asking if he could help his company recruit a seasoned CISO for their 300+ person company. He was excited until he found out the salary they were offering the CISO was in the range of $90-$105K. We've talked before about unrealistic CISO salaries before, but this is actually below the rate of entry level cyber positions in the Bay Area. How do CISOs or heck any cybersecurity professional handle someone's unrealistic expectations? Do you say something or just say, "No thank you"? Also, Davi Ottenheimer of Inrupt, brought this story to my attention and argued that high CISO salaries are just attracting fraudsters. Does our panel agree, and if so, what would a company have to be wary of? Mike's Confused. Let’s help him out On previous shows Mike has admitted he would not want to (not confused although that may be part of it) run the IT department. Nir mentioned that he feels that getting out of one's comfort zone is critical, no matter what department you're in. What are the pros and cons of other departments not just being security aware, but taking on cybersecurity responsibilities? And vice versa, cybersecurity taking on other department responsibilities? How far can/should it go? What's Worse?! Too much flexibility or too many restrictions? We’ve got listeners and they’ve got questions Anya Shpilman of Swiss Gulf Partners sent recorded this question: "I'm a recruiter and I specialize in cybersecurity recruitment. At the end of the show everyone says they're hiring. But I have a hard time getting traction from CISOs. So what would you like to see/hear in those initial emails or LinkedIn messages." Go here to record a question to be played on one of our shows. Umm, Is this good idea? I recently published an article on CISO Series entitled "25 API Security Tips You're Probably Not Considering”. The very first tip, from Gary Hayslip, CISO, Softbank Investment Advisers, is K.I.S.S. or Keep It Simple Stupid. I then went on to provide 24 more tips from experts which if you were to deploy them all would in no way be simple. KISS sounds great in theory, but how the heck do you pull it off in practice. Can you point to an example of how you took something that was complicated and simplified it?
All links and images for this episode can be found on CISO Series (https://cisoseries.com/cleaning-those-tough-to-reach-digital-identity-stains/) We're trying to erase our past and it's becoming harder and harder to clean that history. This week’s episode of CISO/Security Vendor Relationship Podcast features me, David Spark (@dspark), producer of CISO Series, and co-host Mike Johnson. Our guest is Davi Ottenheimer (@daviottenheimer), vp of trust and digital ethics, Inrupt. Thanks to this week's podcast sponsor, Reciprocity. ZenGRC by Reciprocity is a cloud-based GRC software that automates and simplifies compliance and risk management, solving critical problems at scale while customizing to your business needs. Adhering to the majority of regulations is a snap with pre-built templates and a unified system of record. Learn more at reciprocitylabs.com. On this week's episode Why is everybody talking about this now? On Quora, the question was asked, "What are some ways to protect identities on the Internet?" Mike and Davi offer their advice. It's time for "Ask a CISO" The Three As: Authentication, Authorization, and Auditing or Accounting. How do they interrelate? What's the order? And have we been doing it wrong? It's time to play, "What's Worse?!" How are you going to handle having a very well known exploit? Close your eyes, breathe in. It's time for a little security philosophy. On Quora, the question was asked, "What should I do to completely erase my digital identity for good?" It seems impossible, and probably is, but how what steps would one need to get rid of our online identities? It's time to play, "What Is It and Why Do I Care?" We're introducing a brand new game today called "What Is It and Why Do I Care?" Here's how the game is played. I have three pitches from three different vendors who are all in the same category, application security. I have asked the reps to first, in 25 words or less, just explain their category. So give me a simple explanation of application security. That's the "What Is It?" and then for the "Why Do I Care?" I asked them to explain what differentiates them or makes them unique also in 25 words or less. It is up to Mike and Davi to pick your favorite of each and explain why. I only reveal the winning contestants and their companies. If you would like to be a contestant for "What Is It and Why Do I Care?" just go here and fill out the simple SurveyMonkey form.
Listen in to my chat with artificial intelligence expert Davi Ottenheimer about not only the potential benefits of AI, but also the risks to information security, privacy and safety when flawed, biased and maliciously-engineered AI is used. Also hear the boundaries Davi recommends for preventing bad AI. Some of the questions covered include: • What are some examples of tragedies that possibly could have been prevented with AI? • In what ways are AI controlled robots shifting power in our society? • What kind of boundaries can be used with AI to support strengthening information security and protecting privacy? • Are AI regulations, laws, and other rules necessary? • And many more!
Full post for this episode (https://cisoseries.com/defense-in-depth-machine-learning-failures/) NOTE: You're seeing this special episode of Defense in Depth, because we think our CISO/Security Vendor Relationship Podcast listeners should hear it. Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX), CISO at Mitel. Our guest for this episode is Davi Ottenheimer (@daviottenheimer), product security for MongoDB. Thanks to this week’s podcast sponsor, Remediant 81% of cyberattacks utilize stolen administrative credentials. Yet, legacy enterprise password vaults solve only a fraction of the problem and are difficult to rollout. Remediant's SecureONE takes a new approach to privileged access management: offering agent-less, vault-less, continuous detection and just-in-time-administration. Learn what Remediant can do in a half-day POC deployment. On this episode of Defense in Depth, you'll learn: Don't fall victim to believing that success and failure of machine learning is isolated to just garbage in/garbage out. It's far more nuanced than that. Some human actually has to determine what is considered garbage in and what is not. It only takes a very small amount of data to completely corrupt and ruin machine learning data. This knowledge of small infection can spread and corrupt all of the data and can have political and economic motivations to do just that. We have failures in human intervention. Machine learning can just magnify that at rapid rates. While there are many warning signs that machine learning can fail, and we have the examples to back it up, many argue that competitive environments don't allow us to ignore it. We're in a use it or lose it scenario. Even when you're aware of the pitfalls, you may have no choice but to utilize machine learning to accelerate development and/or innovation.
Full post for this episode (https://cisoseries.com/defense-in-depth-machine-learning-failures/) Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX), CISO at Mitel. Our guest for this episode is Davi Ottenheimer (@daviottenheimer), product security for MongoDB. Thanks to this week’s podcast sponsor, Remediant 81% of cyberattacks utilize stolen administrative credentials. Yet, legacy enterprise password vaults solve only a fraction of the problem and are difficult to rollout. Remediant's SecureONE takes a new approach to privileged access management: offering agent-less, vault-less, continuous detection and just-in-time-administration. Learn what Remediant can do in a half-day POC deployment. On this episode of Defense in Depth, you'll learn: Don't fall victim to believing that success and failure of machine learning is isolated to just garbage in/garbage out. It's far more nuanced than that. Some human actually has to determine what is considered garbage in and what is not. It only takes a very small amount of data to completely corrupt and ruin machine learning data. This knowledge of small infection can spread and corrupt all of the data and can have political and economic motivations to do just that. We have failures in human intervention. Machine learning can just magnify that at rapid rates. While there are many warning signs that machine learning can fail, and we have the examples to back it up, many argue that competitive environments don't allow us to ignore it. We're in a use it or lose it scenario. Even when you're aware of the pitfalls, you may have no choice but to utilize machine learning to accelerate development and/or innovation.
Government Shutdowns, Bug Bountires, and Ethics - what do these have in common? Our first live panel of security experts in 2019. We recorded this live in January 2019 and are now providing the audio for your listening pleasure on the Masters of Data Podcast.
Davi Ottenheimer is a strategist and author focused on cultural disruptions and defense ethics in emerging data platforms and intelligent machines; for more than twenty years’ he has led global teams developing and managing secure systems. Full Show Notes: https://wiki.securityweekly.com/Episode568 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
Davi Ottenheimer is a strategist and author focused on cultural disruptions and defense ethics in emerging data platforms and intelligent machines; for more than twenty years’ he has led global teams developing and managing secure systems. Full Show Notes: https://wiki.securityweekly.com/Episode568 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
This week, Paul interviews Davi Ottenheimer, Product Strategy at MongoDB! In our second feature interview, we welcome Chris Spehn, Consultant at Mandiant’s Red Team! In the Security News, Pentesting, SIM Hijackers, Thousands of Mega logins dumped online, the Russians who allegedly hacked the DNC mined Bitcoin for funds, and more on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode568 Visit https://www.securityweekly.com/psw for all the latest episodes! →Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul interviews Davi Ottenheimer, Product Strategy at MongoDB! In our second feature interview, we welcome Chris Spehn, Consultant at Mandiant’s Red Team! In the Security News, Pentesting, SIM Hijackers, Thousands of Mega logins dumped online, the Russians who allegedly hacked the DNC mined Bitcoin for funds, and more on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode568 Visit https://www.securityweekly.com/psw for all the latest episodes! →Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Davi Ottenheimer, of MongoDB, interviews Tim Jenkin, winner of the Excellence in Humanitarian Service award at RSA Conference 2018.
Anyone who made it to Black Hat or DEF CON this summer will likely tell you: machine learning and artificial intelligence are two of the hottest buzzwords in cybersecurity right now.
Davi Ottenheimer discusses the ethics of big data, machine learning, information security, and software development. Davi's work and blog can found at Flying Penguin.
In this episode with Davi Ottenheimer you are going to love learning more about Big Data Security and the challenges that CIOs face as well as the planet. The challenges that the IT profession and IT Security face are tough ones. We dive into many concepts related to why you can't limit gathering data and at the same time expect to find security correlations between system systems or people. You will learn why De-Identification so important to understand with Big Data Security? And why it doesn't work!
At the Black Hat conference last week, TNS Founder Alex Williams sat down with Adallom's vice president of marketing, Tal Klein; EMC's senior director of trust, Davi Ottenheimer; and Ryan Potter, Fortinet's senior director of strategic alliances, to discuss the security features of Docker. We used this discussion as the starting point for a larger conversation about the rise of application development, the context of trust, and the industry's overall flawed fascination with making things easy to use. Learn more at: https://thenewstack.io/the-new-stack-analysts-show-9-dockers-inherent-lack-of-security-the-black-hat-view/
Davi Ottenheimer (senior director of trust, EMC) kicks off this week’s episode with a wide-ranging discussion on computer security and trust – everything from security in the cloud to the weaponization of cyber attacks to active defense. To learn more about Davi and connect with him, visit http://www.flyingpenguin.com. Our second interview is with Navin Thadani (SVP, Ravello Systems; @navinthadani), who stops by to talk about using the public cloud to develop and test applications. Ravello is currently in beta testing mode and looking for users. Visit www.ravellosystems.com for more information. Show Timeline: • 0:00 – Introductions and News of the Week • 8:28 – Interview with Davi Ottenheimer • 23:03 – Interview with Navin Thadani • 41:06 – Wrap up