Sponsored By

sponsor Visit https://securityweekly.com/vicarius for more information!

In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direction but definitely not enough. There is a need for a customized identifying threat process.

This segment is sponsored by Vicarius.

Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

Generating Threat Insights Using Data Science



[caption id="attachment_210" align="alignleft" width="120"]Jeff Man Jeff Man - Sr. InfoSec Consultant[/caption] [caption id="attachment_210" align="alignleft" width="120"]Larry Pesce Larry Pesce - Senior Managing Consultant and Director of Research[/caption] [caption id="attachment_210" align="alignleft" width="120"]Lee Neely Lee Neely - Senior Cyber Analyst [/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Assadorian Paul Assadorian - Founder/CIO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Tyler Robinson Tyler Robinson - Managing Director of Network Operations[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Roi Cohen Roi Cohen - Co-Founder & VP Sales [/caption] [caption id="attachment_210" align="alignleft" width="120"]Shani Dodge Shani Dodge - C++ Developer [/caption]


  • Do you always end up missing our live streams? Need somewhere to flag Security Weekly podcasts that you want to listen to? Subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe

[audio src="http://traffic.libsyn.com/sw-all/PSW_678_-_Roi_Cohen_Shani_Dodge_vicarius-0_converted.mp3"]