Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore scientific computing's role in information security through this 41-minute conference talk from Derbycon 2019. Discover how robotic process automation, data analytics, and tools like Jupiter Notebook can revolutionize security practices. Learn from real-world examples, including IP mapping and vulnerability count analysis. Gain insights into overcoming challenges, collaborating with business partners, and leveraging data science libraries to enhance security effectiveness. Includes practical demonstrations on importing Excel data and working with DataFrames.
Syllabus
Intro
Thank yous
How can we evolve
We are going to fail
Robotic process automation
We need to be effective
Data and analytics
Data gravity
Learning from others
Jupiter Notebook
Data scientist libraries
Basket
Dependencies
Security Risk Advisors
Examples
IP Map
Publish Metrics
Why do our vulnerability counts always increase
Challenges to solve
Money to be made
Work with the business partner
Demos
Importing Excel
DataFrame
Questions