October 30–31, 2016: Training
October 31–November 2, 2016: Tutorials & Conference
New York, NY
Jay Jacobs

Jay Jacobs
Senior Data Analyst, BitSight Technologies

@jayjacobs

Jay Jacobs is the senior data scientist at BitSight Technologies. Previously, Jay spent four years as the lead data analyst for the Verizon Data Breach Investigations Report. Jay is the coauthor of Data-Driven Security, which covers data analysis and visualizations for information security, and hosts the Data-Driven Security and R World News podcast. Jay is also a cofounder of the Society of Information Risk Analysts and currently serves on its board of directors. Jay is active in the R community; he coordinates his local R user group for the greater Minneapolis area and contributes to local events and functions supporting data analysis.

Sessions

9:00am - 5:00pm Sunday, October 30 - Monday, October 31
Location: Concourse E
Jay Jacobs (BitSight Technologies), Charles Givre (Deutsche Bank), Bob Rudis (Rapid7)
Join Jay Jacobs, Charles Givre, and Bob Rudis for a hands-on, in-depth exploration into the foundations of security data science. You’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data. Read more.
9:00am–5:00pm Monday, 10/31/2016
Location: Concourse E
Jay Jacobs (BitSight Technologies), Bob Rudis (Rapid7)
Join Jay Jacobs, Charles Givre, and Bob Rudis for a hands-on, in-depth exploration into the foundations of security data science. You’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data. Read more.
11:20am–12:00pm Tuesday, 11/01/2016
Security in context (security datasci)
Location: Rendezvous Trianon
Jay Jacobs (BitSight Technologies)
Average rating: ***..
(3.33, 3 ratings)
Jay Jacobs dives into data from tens of thousands of organizations and shares techniques that pick out the relationships and identify patterns of risky behavior—once we start to find these indicators, we can actually test and prove what separates good from the mediocre when it comes to security. Read more.