Summary Nuggets Flashcards
AI use cases:
· Correct Typos/Grammar Spelling
· Understand Spoken Commands
· Aisles in Kroger are optimized
Read handwriting
Supervised Models
Cat vs dog that were tagged by a human
Unsupervised Models
no labels, looks for natural groupings [cluster analysis; associate rule]
Reinforcement Learning Models
tradeoff between exploration and exploitation = using the existing model to drive decisions. [multiarmed bandits]
Four Principles of Transformation
- One strategy
- Architecture clarity
- Agile Product focused organization
- Clear multidisciplinary governance
Starting point for IT Security
- Know your assets
- Protect your assets
- Detect
- Recover
Speed of Trust Formula
Strategy X Execution X Trust = RESULTS
Network Effect
First Fax machine by itself wasn’t very helpful; need a network to communicate to
AirBNB very well clustered and builds upon itself
Uber not as much as its focused on geographical regions
Multihoming
ability to be on two networks/across platforms. Alexa wants you on their network and no other. iPhone and android similar [opposite of walled garden]
Millionaire Mindset
Integrity is key, having passion for your customer and set your leader standard work
People Development –> Drive Line
You should pay enough to take the issue of money off the table –> then the h care about:
1) Autonomy
2) Mastery
3) Purpose
Zero Trust
· is a framework, a single product will not solve your problems
· will replace VPN users request and are validated at the application level vs network level
· No more walled garden, microsegment the applications
· Start with highest value/highest risk apps
Use AI/ML to know what normal good traffic looks like
Verizon DBIR
(Data Breach Investigation Report)
Incident
(1 million in 2022) a security event that is a POTENTIAL EXPOSURE compromises integrity of an asset
Breach
(.25 million in 2022) an incident that results in a confirm disclosure of data to an authorized party
83% of all incidents are external actors
Actors [security]
who is behind the event?
Actions [security]
what tactic or actions did they do?
Confidentiality [security
data exposed to an unauthorized actor
Integrity [security]
data that is changed from original state
Phishing [security]
send dubious attachment
Social Engineering [security]
responding to email asking to update banking info (with PRETEXT)
Why MFA
MFA is critical, need to do the basic things.
CIS Critical Security Controls
more focused on cyber than NIST
Vanity Metrics
sound useful but don’t actually measure product performance (app downloads vs orders)