POPULARITY
Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI's evolving role in combating cyber threats, and the surprising insights data can unveil about security incidents. We also dive into ransomware trends, phishing techniques, the ethics of AI, and the critical role of storytelling in decision-making, with some fun nods to fantasy swords along the way. In this episode, we discuss: Using big data to tackle cybersecurity challenges Ransomware and phishing trends The ethical debate around AI in security Unique discoveries from security data analysis Practical strategies for influencing decision-makers Catch this insightful conversation and stay ahead of the cybersecurity curve. Like, share, and subscribe for more expert discussions on the latest security trends! #Cybersecurity #DataAnalytics #RiskManagement
Howdy, y'all! Our guest today is Wade Baker, cybersecurity researcher, entrepreneur, professor… Wade is a Board of Directors member of the FAIR Institute, was an Advisory Board Member at the RSA Conference, was VP of Strategy & Risk Analytics at ThreatConnect, and is now Co-Founder of Cyentia Institute, which aims to advance cybersecurity knowledge and practice through data-driven research. Wade joins Drew and Allan to talk about (go figure!) data-driven cybersecurity. The three smash through a lot of assumptions and get to the heart of what is really going on in cybersecurity. Questions covered: What is the Information Risk Insights Study (IRIS)? (cyentia.com/iris/) What is a good summary of the IRIS Ransomware report? How organizations out there can be more data-driven? Analyst whitepapers vs. real data research – what are the differences? Who else can mine data like this? What truths do people resist or what do they fail to embrace? What are the sacred cows and the “inflatable cows”? Is the cyber job shortage a real, data-backed problem? The desire for “flat math” vs. curves (the 5x5 grid) … Measuring the problem side vs the solution side… Actual best practices vs. common practices… Insurance industry data and why they don't share it… Much of what we do does not affect the realities of our cyber risk. Stepping back from all of this, what is the value in data-driven industry analysis of this sort? How does one sponsor IRIS publications? Y'all be good now!
To help us unpack it all we've invited Wade Baker, Co-Founder of Cyentia Institute – a leading firm focused on cybersecurity data-driven research.
Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC's renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/206 Selected reading. Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction (Microsoft Security) MGM Resorts hackers 'one of the most dangerous financial criminal groups' (Record) Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data (SecurityWeek) Examining Predator Mercenary Spyware (HYAS) Fresh Phish: The Case of the PepsiCo Procurement Ploy (INKY) U.S. Tries New Tack on Russian Disinformation: Pre-Empting It (New York Times) ESET APT Activity Report Q2–Q3 2023 (We Live Security) Russian hackers claim takedown of WA's Transperth transport agency with DDoS attack (Cyber Daily) The Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement (Europol Innovation Lab) Learn more about your ad choices. Visit megaphone.fm/adchoices
Guest: Wade Baker, Co-Founder of Cyentia Institute, professor at Virginia Tech, board member for the FAIR Institute and RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/drwadebaker/Host: Matthew RosenquistOn ITSPmagazine
The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Wade Baker and Ben Edwards of the Cyentia Institute join Dennis Fisher to discuss the process of designing and interpreting the data from the Cisco Security Outcomes study, what surprised them from the data, and how organizations can use the study.
We're joined today by Wade Baker, co-founder of Cyentia Institute (@wadebaker) and Wolfgang Goerlich (@jwgoerlich), Advisory CISO at Cisco, for a fun discussion on security outcomes.Wade and Wolf dissect the results from Cisco's 2021 Security Outcomes Study, which seeks to answer the ultimate question, "What actually works in cybersecurity?" using random sampling and statistical analysis. Together, we discuss how can we efficiently and effectively manage our cybersecurity risk, how is it that even the largest companies with the biggest security budgets still struggle to achieve certain outcomes, and with all the various options out there for achieving a successful cybersecurity program, which ones should practitioners focus on? New technology? More training? Better incident response procedures? Listen to find out!The full report can be downloaded for free from www.cisco.com/go/securityoutcomes
On this week's episode of The Cinemast Podcast, Brandon sits down with Kelly Poynter and Wade Baker to discuss one of the most divisive superhero movies of all time, Zack Snyder's Batman v Superman: Dawn of Justice...Ultimate Edition! GUARANTEED to have 100% less "Martha" than any other podcast episode talking about Batman v Superman!It's a conversation that goes almost everywhere, and NOT in the places you would expect! It's a discussion around the film, it's main three characters, but also a discussion around the DCEU (DC Extended Universe) and superhero movies in general!
The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.
The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.
Wade Baker and David Severski of Cyentia Institute join Dennis Fisher to discuss the findings from their new Information Risk Insights Study into the risk and cost of security breaches across industries.Read the full IRIS study here.
Listen in as Dr. Wade Baker and I talk about the origins and challenges of producing the very first of the Verizon Data Breach and Incident Reports (DBIR) in 2008. That experience taught Wade, who is a founding partner with the Cyentia Institute, a security research and data analysis firm, and who doubles as a professor in Virginia Tech’s College of Business while also serving on the Advisory Boards of the RSA Conference and FAIR Institute, the value in sharing and marketing data in the cybersecurity marketplace. It eventually led to the Cyentia Institute, where Wayne and his team help other vendors to create fact based research to support their go to market initiatives and content marketing. Wade is on a mission, as he puts it, to take Cybersecurity Marketing from “Dogma to Data”. Listen in as he shares how to do that and why he thinks it’s critical for vendors to do so. Wade of course still recommends your check out the Verizon DBIR and also recommends The Craft of Research as must reading! You can find Wade as @wadebaker on Twitter and and download the latest research from Cyentia here and listen to their podcast channel here. Learn more about your ad choices. Visit megaphone.fm/adchoices
Friends and colleagues Jay Jacobs and Wade Baker, creator of the Verizon Data Breach Investigations Report, talk about the ways in which challenging assumptions--by looking at data--can change the way we see the world.
Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.
Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.
This week on Security Weekly, we interview Wade Baker, Vice President of ThreatConnect! Paul, Jack, Jeff, and Larry address listener feedback and questions. Paul discusses, Jeremiah Grossman, Apple hiring crypto-wizard Jon Callas to beef up security, Google killing passwords on Android, and lots more in Security News.
Episode 27 In this post-RSA conference episode, Jay participated with StoryCorps along with Wade Baker and the two reflected on their time working together on the Verizon Data Breach Investigations Report. Find out more about StoryCorps at https://storycorps.org/
With the recent release of the Verizon Data Breach Investigations Report (DBIR) we invited Wade Baker, the godfather of the DBIR, onto the podcast. Alex and Allison were able to ask questions of Wade and Jay about the DBIR. We wrap things up talking about Allison’s paper being accepted at WEIS. Episode 14: Talking DBIR