A podcast about the fundamentals of safe and resilient modeling systems behind the AI that impacts our lives and our businesses.
…
continue reading
Join us as each week we dive into different technologies that are constantly changing and evolving. With a strong focus on block chain and web3 technologies we are not afraid to talk all things cyber security wise. From firewalls and antivirus to backups and incident validation. Come with us as we discuss all things cyber and maybe learn something maybe hear a different perspective on things you already know about! We are always trying to find new guests to give new points of view on technol ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
A show that deconstructs the Indian and international design world with leading industry experts. We aim to promote thoughtful and incisive conversations on design, art, and architecture. Hosted by Esha Gupta, founder of Design Pataki. http://www.designpataki.com
…
continue reading
The independent insurance agency space is getting turned on it's head right now and the next three to eight years are going to be messy, exciting and potentially revolutionary. I'll be broadcasting the journey one agent at a time as we all scramble to piece together the agency of the future, technology and the unrelenting battle for your client's attention
…
continue reading

1
The State of DevSecOps in the DoD: Where We Are, and What’s Next
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
…
continue reading

1
Mechanism design: Building smarter AI agents from the fundamentals, Part 1
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06What if we've been approaching AI agents all wrong? While the tech world obsesses over larger language models (LLMs) and prompt engineering, there'a a foundational approach that could revolutionize how we build trustworthy AI systems: mechanism design. This episode kicks off an exciting series where we're building AI agents "the hard way"—using pri…
…
continue reading

1
I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16Did you know there are 500 million tweets per day? 3 billion monthly active Facebook users? 1 billion LinkedIn members? Are you one of them? In this webcast, Destiney Marie Plaza reveals how a hacker can use seemingly benign public information to customize an attack on a victim by showing a scenario-based attack and demo (using free and open-source…
…
continue reading

1
A New Performance Zone for Software for National Security
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Today, we have seen our national security organizations working to adopt modern software practices, particularly Agile methods and DevSecOps practices, efforts challenged by a mismatch of tempos between operational needs and development processes. The newly mandated Software Acquisition Pathway helps to align those tempos. However, to sustain a com…
…
continue reading

1
Principles, agents, and the chain of accountability in AI systems
46:26
46:26
Play later
Play later
Lists
Like
Liked
46:26Dr. Michael Zargham provides a systems engineering perspective on AI agents, emphasizing accountability structures and the relationship between principals who deploy agents and the agents themselves. In this episode, he brings clarity to the often misunderstood concept of agents in AI by grounding them in established engineering principles rather t…
…
continue reading

1
S2 Ep2: The Design Pataki Podcast | Decoding Design in Luxury Real Estate Ft. Supratik Datta
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36“The devil lies in the details,” says Supratik Datta, Head of Design at SD Corp, the mind behind Mumbai’s most iconic landmarks —from the Imperial Tower to the upcoming Imperial i. In this episode, he joins Esha Gupta, Founder of Design Pataki, to unpack the nuances of what it means to craft iconic spaces in a transforming cityscape. From designing…
…
continue reading
An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.By Matt Butkovic, Greg Crabbe and Beth-Anne Bygum
…
continue reading

1
Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
…
continue reading

1
Threat Hunting: What Should Keep All of Us Up at Night
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
…
continue reading

1
Supervised machine learning for science with Christoph Molnar and Timo Freiesleben, Part 2
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58Part 2 of this series could have easily been renamed "AI for science: The expert’s guide to practical machine learning.” We continue our discussion with Christoph Molnar and Timo Freiesleben to look at how scientists can apply supervised machine learning techniques from the previous episode into their research. Introduction to supervised ML for sci…
…
continue reading

1
Supervised machine learning for science with Christoph Molnar and Timo Freiesleben, Part 1
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29Machine learning is transforming scientific research across disciplines, but many scientists remain skeptical about using approaches that focus on prediction over causal understanding. That’s why we are excited to have Christoph Molnar return to the podcast with Timo Freiesleben. They are co-authors of "Supervised Machine Learning for Science: How …
…
continue reading

1
Can a Cybersecurity Parametric Cost Model be Developed?
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
…
continue reading

1
Elements of Effective Communications for Cybersecurity Teams
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Communications, both in times of crisis and during normal operations, are essential to the overall success and sustainability of an incident response or security operations team. How you plan for and manage these communications and how they are received and actioned by your audience will influence your trustworthiness, reputation, and ultimately yo…
…
continue reading

1
The future of AI: Exploring modeling paradigms
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Unlock the secrets to AI's modeling paradigms. We emphasize the importance of modeling practices, how they interact, and how they should be considered in relation to each other before you act. Using the right tool for the right job is key. We hope you enjoy these examples of where the greatest AI and machine learning techniques exist in your routin…
…
continue reading

1
Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Surviving disruptive cyber events requires a specific form of planning. One must strike a balance between defending against threats (e.g., managing conditions) and effectively handling the effects of disruption (e.g., managing consequences). Employing a model (such as the CERT Resilience Management Model) provides a catalog of practices and a syste…
…
continue reading
Chief Information Security Officers (CISOs) perpetually navigate a dynamic set of challenges. Applying focus and aligning resources is imperative for success. In this Intersect, Matthew Butkovic and Gregory Touhill, reflect on 2024 and explore the topics that should be front of mind for CISOs in 2025. They provide insights and advice for those cont…
…
continue reading
Agentic AI is the latest foray into big-bet promises for businesses and society at large. While promising autonomy and efficiency, AI agents raise fundamental questions about their accuracy, governance, and the potential pitfalls of over-reliance on automation. Does this story sound vaguely familiar? Hold that thought. This discussion about the ove…
…
continue reading

1
Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02No organization can comprehensively avoid disruptive cyber events. All must strive to maintain operational resilience during times of organizational stress. Ransomware incidents create disruption that can be fatal to the unprepared. In this webcast, we explore how to maintain operational resilience during a ransomware incident. Experts with varied …
…
continue reading

1
Contextual integrity and differential privacy: Theory vs. application with Sebastian Benthall
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32What if privacy could be as dynamic and socially aware as the communities it aims to protect? Sebastian Benthall, a senior research fellow from NYU’s Information Law Institute, shows us how privacy is complex. He uses Helen Nissenbaum’s work with contextual integrity and concepts in differential privacy to explain the complexity of privacy. Our tal…
…
continue reading
As the strategic importance of AI increases, so too does the importance of defending those AI systems. To understand AI defense, it is necessary to understand AI offense—that is, counter AI. In this session, Matthew Butkovic, CISA, CISSP, technical director for risk and resilience, and Nathan VanHoudnos, senior machine learning researcher explore t…
…
continue reading

1
Model documentation: Beyond model cards and system cards in AI governance
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43What if the secret to successful AI governance lies in understanding the evolution of model documentation? In this episode, our hosts challenge the common belief that model cards marked the start of documentation in AI. We explore model documentation practices, from their crucial beginnings in fields like finance to their adaptation in Silicon Vall…
…
continue reading

1
Cyber Challenges in Health Care: Managing for Operational Resilience
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37Health-care organizations are seemingly besieged by a complex set of cyber threats. The consequences of disruptive cyber events in health care are in many ways uniquely troubling. Health-care organizations often face these challenges with modest resources. In this webcast, Matthew Butkovic and Darrell Keeling will explore approaches to maximize ret…
…
continue reading

1
Independent Verification and Validation for Agile Projects
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Traditionally, independent verification and validation (IV&V) is performed by an independent team throughout a program’s milestones or once the software is formally delivered. This approach allows the IV&V team to provide input at the various milestone gates. As more programs move to an Agile approach, those milestones aren’t as clearly defined sin…
…
continue reading

1
New paths in AI: Rethinking LLMs and model risk strategies
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Are businesses ready for large language models as a path to AI? In this episode, the hosts reflect on the past year of what has changed and what hasn’t changed in the world of LLMs. Join us as we debunk the latest myths and emphasize the importance of robust risk management in AI integration. The good news is that many decisions about adoption have…
…
continue reading

1
Complex systems: What data science can learn from astrophysics with Rachel Losacco
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02Our special guest, astrophysicist Rachel Losacco, explains the intricacies of galaxies, modeling, and the computational methods that unveil their mysteries. She shares stories about how advanced computational resources enable scientists to decode galaxy interactions over millions of years with true-to-life accuracy. Sid and Andrew discuss transfera…
…
continue reading

1
Preparing AI for the unexpected: Lessons from recent IT incidents
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13Can your AI models survive a big disaster? While a recent major IT incident with CrowdStrike wasn't AI related, the magnitude and reaction reminded us that no system no matter how proven is immune to failure. AI modeling systems are no different. Neglecting the best practices of building models can lead to unrecoverable failures. Discover how the t…
…
continue reading

1
Exploring the NIST AI Risk Management Framework (RMF) with Patrick Hall
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Join us as we chat with Patrick Hall, Principal Scientist at Hallresearch.ai and Assistant Professor at George Washington University. He shares his insights on the current state of AI, its limitations, and the potential risks associated with it. The conversation also touched on the importance of responsible AI, the role of the National Institute of…
…
continue reading

1
Data lineage and AI: Ensuring quality and compliance with Matt Barlin
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29Ready to uncover the secrets of modern systems engineering and the future of AI? Join us for an enlightening conversation with Matt Barlin, the Chief Science Officer of Valence. Matt's extensive background in systems engineering and data lineage sets the stage for a fascinating discussion. He sheds light on the historical evolution of the field, th…
…
continue reading

1
Generative AI and Software Engineering Education
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05Within a very short amount of time, the productivity and creativity improvements envisioned by generative artificial intelligence (AI), such as using tools based on large language models (LLMs), have taken the software engineering community by storm. The industry is in a race to develop your next best software development tool. Organizations are pe…
…
continue reading
Traditionally, cybersecurity has focused on finding and removing vulnerabilities. This is like driving backward down the highway using your rearview mirror. Most breaches are due to defects in design or code; thus, the only way to truly address the issue is to design and build more secure solutions. In this webcast, Tim Chick discusses how security…
…
continue reading

1
Differential privacy: Balancing data privacy and utility in AI
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17Explore the basics of differential privacy and its critical role in protecting individual anonymity. The hosts explain the latest guidelines and best practices in applying differential privacy to data for models such as AI. Learn how this method also makes sure that personal data remains confidential, even when datasets are analyzed or hacked. Show…
…
continue reading

1
Can You Rely on Your AI? Applying the AIR Tool to Improve Classifier Performance
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Modern analytic methods, including artificial intelligence (AI) and machine learning (ML) classifiers, depend on correlations; however, such approaches fail to account for confounding in the data, which prevents accurate modeling of cause and effect and often leads to prediction bias. The Software Engineering Institute (SEI) has developed a new AI …
…
continue reading

1
Responsible AI: Does it help or hurt innovation? With Anthony Habayeb
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59Artificial Intelligence (AI) stands at a unique intersection of technology, ethics, and regulation. The complexities of responsible AI are brought into sharp focus in this episode featuring Anthony Habayeb, CEO and co-founder of Monitaur, As responsible AI is scrutinized for its role in profitability and innovation, Anthony and our hosts discuss th…
…
continue reading

1
Using a Scenario to Reason About Implementing a Zero Trust Strategy
1:02:22
1:02:22
Play later
Play later
Lists
Like
Liked
1:02:22There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these sys…
…
continue reading

1
Baseline modeling and its critical role in AI and business performance
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Baseline modeling is a necessary part of model validation. In our expert opinion, it should be required before model deployment. There are many baseline modeling types and in this episode, we're discussing their use cases, strengths, and weaknesses. We're sure you'll appreciate a fresh take on how to improve your modeling practices. Show notes Intr…
…
continue reading

1
Information theory and the complexities of AI model monitoring
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56In this episode, we explore information theory and the not-so-obvious shortcomings of its popular metrics for model monitoring; and where non-parametric statistical methods can serve as the better option. Introduction and latest news 0:03 Gary Marcus has written an article questioning the hype around generative AI, suggesting it may not be as trans…
…
continue reading

1
The importance of anomaly detection in AI
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this episode, the hosts focus on the basics of anomaly detection in machine learning and AI systems, including its importance, and how it is implemented. They also touch on the topic of large language models, the (in)accuracy of data scraping, and the importance of high-quality data when employing various detection methods. You'll even gain some…
…
continue reading

1
S2 Ep1: The Design Pataki Podcast |Designing for Global Identity, Nappa Dori's Expansion beyond Borders
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Gautam Sinha, the Founder and Creative Director of Nappa Dori, drives the brand's visionary creativity. Renowned for propelling Nappa Dori from a single store in Delhi to over 12 locations, his design ethos merges Indian heritage with international aesthetics. With a background in fashion accessories and a love for leather, Sinha's approach reflect…
…
continue reading

1
What is consciousness, and does AI have it?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55We're taking a slight detour from modeling best practices to explore questions about AI and consciousness. With special guest Michael Herman, co-founder of Monitaur and TestDriven.io, the team discusses different philosophical perspectives on consciousness and how these apply to AI. They also discuss the potential dangers of AI in its current state…
…
continue reading

1
Ask Us Anything: Supply Chain Risk Management
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11According to the Verizon Data Breach Report, Log4j-related exploits have occurred less frequently over the past year. However, this Common Vulnerabilities and Exposures (CVE) flaw was originally documented in 2021. The threat still exists despite increased awareness. Over the past few years, the Software Engineering Institute (SEI) has developed gu…
…
continue reading

1
The Future of Software Engineering and Acquisition with Generative AI
1:32:10
1:32:10
Play later
Play later
Lists
Like
Liked
1:32:10We stand at a pivotal moment in software engineering, with artificial intelligence (AI) playing a crucial role in driving approaches poised to enhance software acquisition, analysis, verification, and automation. While generative AI tools initially sparked excitement for their potential to reduce errors, scale changes effortlessly, and drive innova…
…
continue reading

1
Upskilling for AI: Roles, organizations, and new mindsets
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23Data scientists, researchers, engineers, marketers, and risk leaders find themselves at a crossroads to expand their skills or risk obsolescence. The hosts discuss how a growth mindset and "the fundamentals" of AI can help. Our episode shines a light on this vital shift, equipping listeners with strategies to elevate their skills and integrate mult…
…
continue reading
Get ready for 2024 and a brand new episode! We discuss non-parametric statistics in data analysis and AI modeling. Learn more about applications in user research methods, as well as the importance of key assumptions in statistics and data modeling that must not be overlooked, After you listen to the episode, be sure to check out the supplement mate…
…
continue reading

1
AI regulation, data privacy, and ethics - 2023 summarized
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27It's the end of 2023 and our first season. The hosts reflect on what's happened with the fundamentals of AI regulation, data privacy, and ethics. Spoiler alert: a lot! And we're excited to share our outlook for AI in 2024. AI regulation and its impact in 2024. Hosts reflect on AI regulation discussions from their first 10 episodes, discussing what …
…
continue reading

1
Episode 15: Security Posture and Cyber Insurance Forms
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02In this week's episode, we are joined by a special guest, Andrew Correll from Security Score Card. We dive into a variety of topics mostly centered around security posturing and cyber insurance. Andrews rich history with insurance and cyber gives him a unique view on how the landscape is changing over time. 🔥 What's Happening This Week: December 15…
…
continue reading

1
Managing bias in the actuarial sciences with Joshua Pyle, FCAS
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Joshua Pyle joins us in a discussion about managing bias in the actuarial sciences. Together with Andrew's and Sid's perspectives from both the economic and data science fields, they deliver an interdisciplinary conversation about bias that you'll only find here. OpenAI news plus new developments in language models. 0:03 The hosts get to discuss th…
…
continue reading

1
14 Web3 and the Impact of Future Finances
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40The Realm Newsletter - Week of December 8thth Greetings Realm Subscribers! Welcome back to another exciting entry in The Realm! We're thrilled to bring you the latest episode, going over the next chapter of cyber talk! Tune in to YouTube, Spotify, and other podcast stations to catch the latest episode! In this week's episode, we are joined by a spe…
…
continue reading

1
13 A Survey of Blockchain tech and its effect on the future of human interaction
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this week's episode, we are joined by a very special guest, Chris Elric. A mathematician by profession and a data analyst by career. Join us as we dive into discussing all sorts of blockchain ideas, concepts, and futures. We touch on various blockchain ideals and how from a non-vested interest these technologies are so intriguing. 🔥 What's Happe…
…
continue reading
Episode 9. Continuing our series run about model validation. In this episode, the hosts focus on aspects of performance, why we need to do statistics correctly, and not use metrics without understanding how they work, to ensure that models are evaluated in a meaningful way. AI regulations, red team testing, and physics-based modeling. 0:03 The host…
…
continue reading
In this week's episode, we are joined by special guest Jim Lowry a sales engineer from Veeam. Join us as we discuss backups, disaster recovery, and Office 365 backups. We touch on a few key factors happening in the world impacting backups, and how they are widely impacting the industry. 🔥 What's Happening This Week: November 1st🔥 Here's a sneak pee…
…
continue reading