AIOps for Security and Breach Protection March 15, 2019

from The Cloudcast· ·

SHOW: 389 DESCRIPTION: Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches. SHOW SPONSOR LINKS: * Datadog Homepage - Modern Monitoring and Analytics * Try Datadog yourself by starting a free, 14-day trial today. Listeners of this podcast will also receive a free Datadog T-shirt CLOUD NEWS OF THE WEEK AWS Announced Open Distro for ElasticSearch Rebuttals or Commentary on Open Distro for ElasticSearch * https://www.elastic.co/blog/on-open-distros-open-source-and-building-a-company * https://thenewstack.io/what-the-fork-amazon/ * https://www.influxdata.com/blog/aws-intends-for-their-new-project-to-be-an-elasticsearch-fork/ * https://redmonk.com/sogrady/2019/03/15/cloud-open-source-powder-keg/



SHOW: 389

DESCRIPTION: Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches.

SHOW SPONSOR LINKS:

AWS Announced Open Distro for ElasticSearch**

Rebuttals or Commentary on Open Distro for ElasticSearch

SHOW NOTES:

Topic 1 - Welcome to the show. You have quite an interesting and impressive background. Can you talk a little bit about your work in academia prior to RiskIQ, and then what drew you to this space?

Topic 2 - RiskIQ focuses on helping companies mitigate massive security attacks. For people that don’t live in the security domain, can you give us a sense of what one of these attacks and breaches look like?

Topic 3 - Can you give us a sense of how many of these massive attacks are utilizing new techniques, or is it variants of existing techniques, or just old techniques looking for new (vulnerable) targets? And are there tools to help companies understand how to prioritize against these?

Topic 4 - Where are we in the industry in terms of the intersection of security best practices that IT teams can control, and when ML-driven capabilities can augment for more proactive security?

Topic 5 - What are some of the things that you’re recommending to companies that are helping to make immediate impacts to them preventing or reducing massive breaches?

Feedback?