Главная
Study mode:
on
1
Intro
2
Thank yous
3
How can we evolve
4
We are going to fail
5
Robotic process automation
6
We need to be effective
7
Data and analytics
8
Data gravity
9
Learning from others
10
Jupiter Notebook
11
Data scientist libraries
12
Basket
13
Dependencies
14
Security Risk Advisors
15
Examples
16
IP Map
17
Publish Metrics
18
Why do our vulnerability counts always increase
19
Challenges to solve
20
Money to be made
21
Work with the business partner
22
Demos
23
Importing Excel
24
DataFrame
25
Questions
Description:
Explore scientific computing's role in information security through this 41-minute conference talk from Derbycon 2019. Discover how robotic process automation, data analytics, and tools like Jupiter Notebook can revolutionize security practices. Learn from real-world examples, including IP mapping and vulnerability count analysis. Gain insights into overcoming challenges, collaborating with business partners, and leveraging data science libraries to enhance security effectiveness. Includes practical demonstrations on importing Excel data and working with DataFrames.

Scientific Computing for Information Security - Forging the Missing Link

Add to list