Summary Nuggets Flashcards
AI use cases:
· Correct Typos/Grammar Spelling
· Understand Spoken Commands
· Aisles in Kroger are optimized
Read handwriting
Supervised Models
Cat vs dog that were tagged by a human
Unsupervised Models
no labels, looks for natural groupings [cluster analysis; associate rule]
Reinforcement Learning Models
tradeoff between exploration and exploitation = using the existing model to drive decisions. [multiarmed bandits]
Four Principles of Transformation
- One strategy
- Architecture clarity
- Agile Product focused organization
- Clear multidisciplinary governance
Starting point for IT Security
- Know your assets
- Protect your assets
- Detect
- Recover
Speed of Trust Formula
Strategy X Execution X Trust = RESULTS
Network Effect
First Fax machine by itself wasn’t very helpful; need a network to communicate to
AirBNB very well clustered and builds upon itself
Uber not as much as its focused on geographical regions
Multihoming
ability to be on two networks/across platforms. Alexa wants you on their network and no other. iPhone and android similar [opposite of walled garden]
Millionaire Mindset
Integrity is key, having passion for your customer and set your leader standard work
People Development –> Drive Line
You should pay enough to take the issue of money off the table –> then the h care about:
1) Autonomy
2) Mastery
3) Purpose
Zero Trust
· is a framework, a single product will not solve your problems
· will replace VPN users request and are validated at the application level vs network level
· No more walled garden, microsegment the applications
· Start with highest value/highest risk apps
Use AI/ML to know what normal good traffic looks like
Verizon DBIR
(Data Breach Investigation Report)
Incident
(1 million in 2022) a security event that is a POTENTIAL EXPOSURE compromises integrity of an asset
Breach
(.25 million in 2022) an incident that results in a confirm disclosure of data to an authorized party
83% of all incidents are external actors
Actors [security]
who is behind the event?
Actions [security]
what tactic or actions did they do?
Confidentiality [security
data exposed to an unauthorized actor
Integrity [security]
data that is changed from original state
Phishing [security]
send dubious attachment