Data mining на практике. Подводные камни анализа данных / Ксения Петрова / COO dmlabs.org


Ксения, с точки зрения своего опыта, рассказала про главные грабли, на которые может наступить молодой аналитик.
Data mining на практике. Подводные камни анализа данных / Ксения Петрова / COO dmlabs.org
Презентация: www.slideshare.net/WG_Talks/data-mining-dmlabsorg
DataTalks — неформальные встречи бизнес-аналитиков и специалистов в области анализа данных.
Присоединяйтесь к нашей группе на LinkedIn: www.linkedin.com/groups?gid=6788018

Data Mining, Лекция №2


Техносфера Mail.ru Group, МГУ им. М.В. Ломоносова.
Курс «Алгоритмы интеллектуальной обработки больших объемов данных», Лекция №2 «Задача кластеризации и ЕМ-алгоритм»
Лектор — Николай Анохин

Постановка задачи кластеризации. Функции расстояния. Критерии качества кластеризации. EM-алгоритм. K-means и модификации.

Слайды лекции www.slideshare.net/Technosphere1/lecture-2-47107553

Другие лекции курса Data Mining | www.youtube.com/playlist?list=PLrCZzMib1e9pyyrqknouMZbIPf4l3CwUP
Наш видеоканал | www.youtube.com/user/TPMGTU?sub_confirmation=1
Официальный сайт Технопарка | tech-mail.ru/
Официальный сайт Техносферы | sfera-mail.ru/
Технопарк в ВКонтакте | vk.com/tpmailru
Техносфера в ВКонтакте | vk.com/tsmailru
Блог на Хабре | habrahabr.ru/company/mailru/

#ТЕХНОПАРК
#ТЕХНОСФЕРА

x

Анализ данных — Борис Миркин


Источник — postnauka.ru/video/49443
В чем заключаются сильные и слабые стороны анализа данных? Как проверить наблюдаемые паттерны? Как методы анализа данных помогают формировать новые концепции? На эти и другие вопросы отвечает доктор технических наук Борис Миркин.

Meine Top 5 OSINT Tools


Im heutigen Video möchte ich meine persönlichen Top 5 der Online OSINT Tools vorstellen. Dabei handelt es sich um die Webseiten, die ich in Penetrationstests am meisten verwende. Wer sich für automatisierte OSINT Programme interessiert, kann auch einen Blick auf unser Video von letzter Woche werfen. Darin habe ich das Programm SpiderFoot vorgestellt.

-= Links =-
www.googleguide.com/print/adv_op_ref.pdf
www.exploit-db.com/google-hacking-database
hunter.io/search
transparencyreport.google.com/https/certificates
crt.sh/?a=1
censys.io/certificates
www.shodan.io
wigle.net/
haveibeenpwned.com/

-= Newsletter =-
Abonniere unseren Newsletter für monatliche Updates zu Videos, Trainings, Blog Posts und mehr.
lastbreach.us12.list-manage.com/subscribe?u=f9e18dd06480686b1abb16f6d

Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018


This talk will examine Intelligence Preparation for the Battlefield and for the Environment (IPB/IPE) for the cyber domain. We will look at the conventional intelligence methodologies and use our findings to answer key questions for Intelligence Preparation of the Cyber Environment (IPCE): What do I look I look like to my attackers, what do my attackers look like to me, how are we likely to “do battle,” and thus how can I better prepare for it. The talk will
provide an overview of how the conventional methodology is applied to the cyber environment and, ultimately, how it applies to
the organizations of attendees themselves.

We’ll look at how to collect information on the attackers, how to understand your own environment, and how to visualize a likely attack and prepare for it.

Speaker Bio: Rob Dartnall (@cyberfusionteam), Director of Intelligence, Security Alliance Ltd.
Drawing on his diverse intelligence background, Rob brings together both cyber and traditional intelligence experience. Rob is an ex-British Army Military Intelligence Operator specializing in intelligence fusion, exploitation, and strategic analysis. After leaving the military, he entered the cyber security industry, where he specializes in bringing traditional methodologies to cyber threat
intelligence and insider threat analysis
.

Next Level in Cyber Threat Intelligence Training: New FOR578 course updates


The SANS FOR578 Cyber Threat Intelligence course ( www.sans.org/course/cyber-threat-intelligence) has been proven to be one of hottest courses offered by the DFIR Curriculum often sold out in each city. The overwhelming acceptance of this course has allowed SANS to collect invaluable feedback that is leading the course to the next level. We invite you to join lead author Robert M. Lee as he covers core cyber threat intelligence concepts and provides an overview of the FOR578 class who should attend and why. Attend this webcast and be among the first to get a sneak peak of the changes, additions, exciting new tools and tradecraft added into the course.

Speaker: Robert M. Lee www.sans.org/instructors/robert-m-lee
Robert M. Lee is the CEO and Founder of the critical infrastructure cyber security company Dragos Security LLC where he has a passion for control system traffic analysis, incident response, and threat intelligence research. He is a SANS Certified Instructor and the course author of SANS ICS515 — «Active Defense and Incident Response» and the co-author of SANS FOR578 — «Cyber Threat Intelligence.» Robert is also a non-resident National Cyber Security Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure and a PhD candidate at Kings College London. For his research and focus areas, he was named one of Passcodes Influencers, awarded EnergySecs 2015 Cyber Security Professional of the Year, and named to the 2016 Forbes 30 Under 30 list.

Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. Robert routinely writes articles in publications such as Control Engineering and the Christian Science Monitors Passcode and speaks at conferences around the world. Lastly, Robert, is author of the book «SCADA and Me» and the weekly web-comic www.LittleBobbyComic.com.

How to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 2019


Everyone is moving to the cloud, specifically Microsoft Cloud. Microsoft expects to have 66 percent of its Office business customers in the cloud by 2019. Doing so makes sense: it’s easier than having on-premises mail servers, it (theoretically) reduces costs, and Microsoft Office 365 has one of the best security teams in the world. However, there is a downside, which is that it’s hard to protect what you can’t see or access. As of today, it is extremely difficult (or impossible, depending on your subscription level) to apply your externally created threat intelligence into Microsoft Office 365 detections. It is even more frustrating to try and search for known indicators on a platform that is not designed to help the security community.

This talk will describe methods and release open-source code to enhance your Office 365 security by analyzing email metadata, attachments, and even full content with tools like stoQ or LaikaBOSS and by looking at how to use that information to research and create actionable threat intelligence via platforms like Splunk.

Dave Herrald (@daveherrald), Staff Security Strategist, Splunk
Ryan Kovar (@meansec), Principal Security Strategist, Splunk

Insights from NSA’s Cybersecurity Threat Operations Center


Dave Hogue, Technical Director, National Security Agency (NSA)

Dave Hogue will provide one of the first in-depth perspectives from a “Day in the Life” of NSA’s Cybersecurity Threat Operations Center (NCTOC)—the mission, threat landscape, and offer best principles for CISOs and other network defenders. Mr. Hogue will equip the audience with actionable insights that they can implement into their daily operations.

Learning Objectives:
1: Gain exclusive insights into top cyberthreats from NSA’s perspective.
2: Learn actionable best practices to use in building an effective cyber-defense posture.
3: Learn about what’s working and what’s not in emerging areas such as machine learning.

www.rsaconference.com/events/us18

Open Source Intelligence 101


From Wild West Hackin Fest 2018 in Deadwood, SD.
Presenter: April C. Wright

April C. Wright is a hacker, writer, teacher, and community leader with over 25 years of breaking, making, fixing, and defending global critical communications and connections. She is an international speaker and trainer, educating others about personal privacy and information security with the goal of safeguarding the digital components we rely on every day. A security specialist for a Fortune 15 company and an OReilly author, April has held roles on offensive, defensive, operational, and development teams throughout her career, and been a speaker and contributor at numerous security conferences including BlackHat, DEF CON, DerbyCon, Hack in Paris, DefCamp, ITWeb, as well as for the US Government and industry organizations such as OWASP and ISSA. She has started multiple small businesses including a non-profit, is a member of the DEF CON Groups Core Team, and in 2017 she co-founded the Boston DEF CON Group DC617.

Follow Wild West Hackin Fest on Twitter here: twitter.com/wwhackinfest

Website