Podcast appearances and mentions of wade baker

  • 18PODCASTS
  • 23EPISODES
  • 40mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about wade baker

Latest podcast episodes about wade baker

The Audit
Big Data Meets Cybersecurity: Expert Insights from Wade Baker

The Audit

Play Episode Listen Later Jan 13, 2025 51:57 Transcription Available


Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications.  Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI's evolving role in combating cyber threats, and the surprising insights data can unveil about security incidents. We also dive into ransomware trends, phishing techniques, the ethics of AI, and the critical role of storytelling in decision-making, with some fun nods to fantasy swords along the way. In this episode, we discuss: Using big data to tackle cybersecurity challenges Ransomware and phishing trends The ethical debate around AI in security Unique discoveries from security data analysis Practical strategies for influencing decision-makers  Catch this insightful conversation and stay ahead of the cybersecurity curve. Like, share, and subscribe for more expert discussions on the latest security trends! #Cybersecurity #DataAnalytics #RiskManagement 

The Cyber Ranch Podcast
Data-Driven Cybersecurity with Wade Baker

The Cyber Ranch Podcast

Play Episode Listen Later Sep 11, 2024 40:46


Howdy, y'all!  Our guest today is Wade Baker, cybersecurity researcher, entrepreneur, professor…  Wade is a Board of Directors member of the FAIR Institute, was an Advisory Board Member at the RSA Conference, was VP of Strategy & Risk Analytics at ThreatConnect, and is now Co-Founder of Cyentia Institute, which aims to advance cybersecurity knowledge and practice through data-driven research.  Wade joins Drew and Allan to talk about (go figure!) data-driven cybersecurity.  The three smash through a lot of assumptions and get to the heart of what is really going on in cybersecurity. Questions covered: What is the Information Risk Insights Study (IRIS)? (cyentia.com/iris/) What is a good summary of the IRIS Ransomware report? How organizations out there can be more data-driven? Analyst whitepapers vs. real data research – what are the differences? Who else can mine data like this? What truths do people resist or what do they fail to embrace? What are the sacred cows and the “inflatable cows”? Is the cyber job shortage a real, data-backed problem? The desire for “flat math” vs. curves (the 5x5 grid) … Measuring the problem side vs the solution side… Actual best practices vs. common practices… Insurance industry data and why they don't share it… Much of what we do does not affect the realities of our cyber risk. Stepping back from all of this, what is the value in data-driven industry analysis of this sort? How does one sponsor IRIS publications? Y'all be good now!

Cybersecurity Unplugged
Generative AI's Role in Cybersecurity Data Analysis

Cybersecurity Unplugged

Play Episode Listen Later Feb 22, 2024 29:38


To help us unpack it all we've invited Wade Baker, Co-Founder of Cyentia Institute – a leading firm focused on cybersecurity data-driven research.

The CyberWire
Social engineering as a blunt instrument–almost like swatting without the middleman.

The CyberWire

Play Episode Listen Later Oct 27, 2023 28:18


Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC's renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/206 Selected reading. Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction (Microsoft Security) MGM Resorts hackers 'one of the most dangerous financial criminal groups' (Record) Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data (SecurityWeek)  Examining Predator Mercenary Spyware (HYAS) Fresh Phish: The Case of the PepsiCo Procurement Ploy (INKY)  U.S. Tries New Tack on Russian Disinformation: Pre-Empting It (New York Times)  ESET APT Activity Report Q2–Q3 2023 (We Live Security)  Russian hackers claim takedown of WA's Transperth transport agency with DDoS attack (Cyber Daily)  The Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement (Europol Innovation Lab)  Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
A Deep Dive into Cyber Risk | A Conversation with Wade Baker | Cybersecurity Insights Podcast with Matthew Rosenquist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 27, 2023 53:40


Guest: Wade Baker, Co-Founder of Cyentia Institute, professor at Virginia Tech, board member for the FAIR Institute and RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/drwadebaker/Host: Matthew RosenquistOn ITSPmagazine  

Security Science
Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

Security Science

Play Episode Listen Later Jul 26, 2023 49:22


The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

Hacking Humans
Encore: Diamond Model (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 4, 2023 7:47


A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.

star wars model battles diamond noun threatconnect wade baker
Word Notes
Encore: Diamond Model (noun)

Word Notes

Play Episode Listen Later Jul 4, 2023 7:47


A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices

star wars model battles diamond noun threatconnect wade baker
Hacking Humans
Diamond Model (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jun 7, 2022 7:17


A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.

star wars model battles diamond noun threatconnect wade baker
Word Notes
Diamond Model (noun)

Word Notes

Play Episode Listen Later May 17, 2022 7:17


A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.

star wars model battles diamond noun threatconnect wade baker
Decipher Security Podcast
Wade Baker and Ben Edwards

Decipher Security Podcast

Play Episode Listen Later Dec 8, 2021 39:12


Wade Baker and Ben Edwards of the Cyentia Institute join Dennis Fisher to discuss the process of designing and interpreting the data from the Cisco Security Outcomes study, what surprised them from the data, and how organizations can use the study.

ben edwards dennis fisher wade baker
Security Stories
23: What really works in cybersecurity? With Wade Baker and Wolfgang Goerlich

Security Stories

Play Episode Play 30 sec Highlight Listen Later Feb 8, 2021 44:53


We're joined today by Wade Baker, co-founder of Cyentia Institute (@wadebaker) and Wolfgang Goerlich (@jwgoerlich), Advisory CISO at Cisco, for a fun discussion on security outcomes.Wade and Wolf dissect the results from Cisco's 2021 Security Outcomes Study, which seeks to answer the ultimate question, "What actually works in cybersecurity?" using random sampling and statistical analysis. Together, we discuss how can we efficiently and effectively manage our cybersecurity risk, how is it that even the largest companies with the biggest security budgets still struggle to achieve certain outcomes, and with all the various options out there for achieving a successful cybersecurity program, which ones should practitioners focus on? New technology? More training? Better incident response procedures? Listen to find out!The full report can be downloaded for free from www.cisco.com/go/securityoutcomes

The Cinemast Podcast
"Batman v Superman: Dawn of Justice" (2016) w/ Kelly Poynter & Wade Baker

The Cinemast Podcast

Play Episode Listen Later Aug 10, 2020 83:17


On this week's episode of The Cinemast Podcast, Brandon sits down with Kelly Poynter and Wade Baker to discuss one of the most divisive superhero movies of all time, Zack Snyder's Batman v Superman: Dawn of Justice...Ultimate Edition! GUARANTEED to have 100% less "Martha" than any other podcast episode talking about Batman v Superman!It's a conversation that goes almost everywhere, and NOT in the places you would expect! It's a discussion around the film, it's main three characters, but also a discussion around the DCEU (DC Extended Universe) and superhero movies in general!

Security Science
Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

Security Science

Play Episode Listen Later Jul 15, 2020 49:23


The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

Security Science
Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

Security Science

Play Episode Listen Later Jul 15, 2020 49:28


The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

Decipher Security Podcast
Wade Baker and David Severski

Decipher Security Podcast

Play Episode Listen Later Mar 23, 2020 36:21


Wade Baker and David Severski of Cyentia Institute join Dennis Fisher to discuss the findings from their new Information Risk Insights Study into the risk and cost of security breaches across industries.Read the full IRIS study here.

technology security dennis fisher wade baker
Marketing InSecurity
MiS007: From Dogma to Data - How Research Can Change Your Go To Market

Marketing InSecurity

Play Episode Listen Later Jun 18, 2019 27:59


Listen in as Dr. Wade Baker and I talk about the origins and challenges of producing the very first of the Verizon Data Breach and Incident Reports (DBIR) in 2008. That experience taught Wade, who is a founding partner with the Cyentia Institute, a security research and data analysis firm, and who doubles as a professor in Virginia Tech’s College of Business while also serving on the Advisory Boards of the RSA Conference and FAIR Institute, the value in sharing and marketing data in the cybersecurity marketplace. It eventually led to the Cyentia Institute, where Wayne and his team help other vendors to create fact based research to support their go to market initiatives and content marketing. Wade is on a mission, as he puts it, to take Cybersecurity Marketing from “Dogma to Data”. Listen in as he shares how to do that and why he thinks it’s critical for vendors to do so. Wade of course still recommends your check out the Verizon DBIR  and also recommends The Craft of Research as must reading! You can find  Wade as @wadebaker on Twitter and and download the latest research from Cyentia here and listen to their podcast channel here. Learn more about your ad choices. Visit megaphone.fm/adchoices

RSA Conference
StoryCorps @ RSAC: Eureka Moments

RSA Conference

Play Episode Listen Later Jun 10, 2016 7:48


Friends and colleagues Jay Jacobs and Wade Baker, creator of the Verizon Data Breach Investigations Report, talk about the ways in which challenging assumptions--by looking at data--can change the way we see the world.

Paul's Security Weekly (Video-Only)
Security Weekly #466 - Wade Baker

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Jun 2, 2016 57:21


Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.

Paul's Security Weekly TV
Security Weekly #466 - Wade Baker

Paul's Security Weekly TV

Play Episode Listen Later Jun 1, 2016 57:21


Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.

Paul's Security Weekly
Security Weekly #466 - "8-Inch Floppy"

Paul's Security Weekly

Play Episode Listen Later Jun 1, 2016 117:16


This week on Security Weekly, we interview Wade Baker, Vice President of ThreatConnect! Paul, Jack, Jeff, and Larry address listener feedback and questions. Paul discusses, Jeremiah Grossman, Apple hiring crypto-wizard Jon Callas to beef up security, Google killing passwords on Android, and lots more in Security News.

Data Driven Security
Data Driven Security - Episode 27

Data Driven Security

Play Episode Listen Later Mar 8, 2016 34:17


Episode 27 In this post-RSA conference episode, Jay participated with StoryCorps along with Wade Baker and the two reflected on their time working together on the Verizon Data Breach Investigations Report. Find out more about StoryCorps at https://storycorps.org/

The Risk Science Podcast
Episode 14: Talking DBIR

The Risk Science Podcast

Play Episode Listen Later May 15, 2014


With the recent release of the Verizon Data Breach Investigations Report (DBIR) we invited Wade Baker, the godfather of the DBIR, onto the podcast.  Alex and Allison were able to ask questions of Wade and Jay about the DBIR. We wrap things up talking about Allison’s paper being accepted at WEIS. Episode 14: Talking DBIR