33 min

Data Driven Computer Defense - Implementation Examples The SafeHouse

    • Technology

Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.

Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847

Edited and Produced by David Lewis

Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.

Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847

Edited and Produced by David Lewis

33 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Search Engine
PJ Vogt, Audacy, Jigsaw
Underserved
Andrew Gelina
Hard Fork
The New York Times