On this episode of The Artists of Data Science, we get a chance to hear from Chase Cunningham, a retired Navy chief cryptologist with nearly two decades of experience in cyber, forensic and analytic operations. He holds both PHD and Masters in Computer Science, and has been named one of Security magazine's most influential people in security for 2019.
Chase shares with us the definition of cybersecurity and cyberwarfare, how cyberspace has evolved over the past decade, and the dangers of operating within this space. Chase’s knowledge within cybersecurity will help data scientists identify ways for them to build models that have better real world outcomes and give them insights into a field that impacts our work.
WHAT YOU'LL LEARN
[4:15] What is cyberwarfare and cybersecurity?
[5:33] How does cybersecurity impact data science?
[8:19] The truth about hackers
[16:22] Autonomous vehicles and cybersecurity concerns
[26:20] Ways for data scientists to prevent biases within their models
FIND CHASE ONLINE
[00:01:30] Introduction for our guest today
[00:02:37] Talk to us a bit about your professional journey, how you first heard of cyber security, cyber warfare, and kind of what drew you into that field.
[00:04:06] Can you define what cyber warfare and cyber security are?
[00:05:19] Cyber security and data science
[00:06:01] Cybersecurity, data science, and machine learning
[00:06:52] What are some of the biggest concerns in cyber warfare that we'll face both kind of at individual user level and at the organizational level over the next two to five years?
[00:07:56] Hollywood hackers aren't real like hackers
[00:09:05] How hacking has evolved overtime
[00:10:02] How to practice for cyberwarefare
[00:11:03] How can machine learning help detect or prevent these hacking incidents from occurring?
[00:11:29] Cybersecurity projects
[00:13:01] The Cyber Shot Heard around the world.
[00:14:04] What you mean by kinetic outcomes?
[00:14:33] Modern cybersecurity and kinetic outcomes
[00:15:02] Perimeter based security mode
[00:15:42] Alternative to a perimeter based security
[00:16:09] What does cyber security have to do with autonomous vehicles?
[00:16:50] Cyber security attacks on autonomous vehicles
[00:18:14] How cyber security, social media, and A.I can be used for bad
[00:19:15] How to not be tricked by deep fakes
[00:20:38] Weaponizing biometrics
[00:21:26] Cyber warfare campaigns
[00:22:26] Societal impacts of deep fakes, machine learning, A.I. and cloud computing?
[00:24:18] What the history of warfare can teach us about cyberwarfare
[00:25:04] What happens, when Data and A.I. studies go awry?
[00:26:05] How to prevent bias in machine learning systems
[00:27:01] What do you think would be the equivalent of the nuclear bomb for cyber warfare, cyber security?
[00:27:38] You've got six patents that are credited to you. Which one is your favorite one?
[00:29:05] Why should we kill the password?
[00:29:38] What would be the alternative to passwords?
[00:30:07] What's the one thing you want people to learn from your story?
[00:30:39] The lightning round