

128. David Hirko - AI observability and data as a cybersecurity weakness
Sep 28, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Introduction
00:00 • 3min
What Is Data Observability?
02:44 • 3min
Data Security and Data Observability
05:53 • 4min
Are You Aware of the Quality of Your Data?
10:15 • 2min
What Is a Data Supply Chain?
12:39 • 2min
Data Security - The Supply Chain
14:57 • 3min
Data Poisoning in Cyber Security?
18:09 • 2min
Deep Data Inspection
20:16 • 2min
The Log for J Shell Vulnerability
22:32 • 2min
The Log for J Vulnerability - What's the Difference?
24:29 • 2min
What's the Direction of Change in Cyber Security?
26:35 • 2min
AWS Model Failure
28:59 • 2min
The Challenge Is How Do You Verify That This Isn't Being Used Today?
31:13 • 2min
Are There Steps That the Average Person Should Take When It Comes to Data Provenance?
33:31 • 2min
Are We Treating Data Like a Safe Category of Thing?
35:06 • 3min
The Challenge of Customization for Enterprise Data Warehouses
37:57 • 3min
GDPR - What Are Some of the Challenges?
40:38 • 2min
Data Poisoning
42:53 • 3min
Synthetic Data
46:09 • 3min