Welcome to Survey & Beyond: The Data Collection Podcast, where we connect with professionals and organizations involved in data collection. Listen in as we discuss innovative methods and tools that can significantly enhance data quality and security, demystify complex data collection concepts, and highlight the many ways that organizations today are involved in data collection–sometimes, without even calling it “data collection.” With your host, Marta Costa, we feature in-depth interviews wi ...
…
continue reading
A podcast about the methods and metascience of developmental science, cohosted by Jessica Logan @jarlogan and Sara Hart @saraannhart. We talk about developmental sciencing, including data collection, data analysis, research methods, and open science, as well as life in academia. Think about it like a lab meeting where you don’t have to do the readings and never have to present.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Web scraping is the process of automatically collecting data from websites or online services with software designed for this task. The word “automatic” indicates that not only does it require some sort code to collect what you want, but also an input device such as your mouse/keyboard combo so there's no human involvement whatsoever in order to perform these actions - unless they are doing all their work by hand! If you don’t want to build a Reddit scraper yourself with Python you can use I ...
…
continue reading

1
STEPPING INTO SPECIAL EDUCATION, Special Education, SPED, Special Ed, Students with Disabilities, Classroom Management
Michelle Vazquez, M.A.Ed., Special Education Teacher, Special Ed Teacher, IEP Writer, Special Education Teacher Coach
Confused with how to write IEPs (Individualized Education Plans)? Not sure how to keep track of all the data? Tired of searching for the right behavior strategies to manage your special ed. classroom? In this podcast, you will find methods to create IEP goals that students can reach, a system to collect data with your team, & know which behavior strategies will work best for your classroom. My mission is to help new sped teachers write IEPs with confidence, share ideas for classroom manageme ...
…
continue reading
Come along with horticulturist Daniel Fuller as we enter a hidden world of horticultural, ecological and landscape gardening knowledge with featured experts, industry professionals and enthusiasts. We inform and inspire you with weekly episodes to help you become an unstoppable plant whisperer.
…
continue reading
Ancestry and AI: Genealogical Roots Reborn and Historical Echoes Rediscovered. "Dispatches from the Disputed Texas Territories," another exciting branch of ancestral narratives from FamilyTreeSagas.com, offers a vivid exploration into our families' past, encapsulating the essence of our ancestors' experiences through a series of innovative narrative formats. This collection is an endeavor to breathe life into the tales of those who came before us, presenting their stories through a variety o ...
…
continue reading

1
Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. In this no-holds-barred conve…
…
continue reading

1
[Greatest Hits] Make Data Work for Good with Maulik Chauhan of Trestle Research
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00In this greatest hits episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Maulik Chauhan, Founder and Managing Director of Trestle Research. They dive into the importance of digitizing data, the challenges and benefits of transitioning from paper-based to digital data collection methods, and what it takes to smoot…
…
continue reading

1
Option Care’s Jill Rhodes on Uniting Legal Expertise and Cybersecurity in Healthcare
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Jill Rhodes, SVP & CISO at Option Care Health, shares her unconventional journey from international development lawyer stationed in Bolivia and Moscow to healthcare leader, where she built the security program from the ground up as the organization's first CISO. Jill outlines for David how a transformative assignment at an intelligence agency spark…
…
continue reading

1
Silverado Policy Accelerator’s Dmitri Alperovitch on Hunting Intruders After They're Already In
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00In this episode of The Future of Threat Intelligence, Dmitri Alperovitch, Co-founder & Executive Chairman at Silverado Policy Accelerator and Author of World on the Brink: How America Can Beat China in the Race for the 21st Century, delivers a stark warning about the second Cold War with China that's unfolding, from military and nuclear arms races …
…
continue reading

1
The Ethics of Field Research in Vulnerable Communities with Dr. Angela R. Pashayan of Johns Hopkins School of Advanced International Studies (SAIS)
34:37
34:37
Play later
Play later
Lists
Like
Liked
34:37In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Dr. Angela R. Pashayan, an expert in International Development, Experiential learning, Leading International trips, and Intercultural Communication. Together, they explore the ethics of field research in vulnerable communities. Drawing from her work in Na…
…
continue reading

1
Directions on Microsoft’s Wes Miller on Harmonizing Microsoft's Security & Identity Tools
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28What happens when Microsoft's on-premises security falls behind while cloud innovation accelerates? In this episode of The Future of Threat Intelligence, Wes Miller, Research Analyst for Microsoft Identity, Security, and Management at Directions on Microsoft, pulls back the curtain on Microsoft's fragmented security landscape. Having survived the h…
…
continue reading

1
Wikistrat’s Jeffrey Caruso on New Methods in Cyber-Physical Attacks
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20In this episode of The Future of Threat Intelligence, Jeffrey Caruso, Senior Analyst at Wikistrat & Author of Inside Cyber Warfare, shares examples of how teams with minimal budgets achieved kinetic effects through OT system manipulation — from destroying missile research facilities to compromising subway systems and burning down FSB-affiliated ban…
…
continue reading

1
Rapid7’s Deral Heiland on Why Your Network Segmentation Strategy Overlooks IoT Risk
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31Deral Heiland’s research has uncovered critical vulnerabilities across the IoT spectrum, from office printers to medical devices, revealing how seemingly isolated devices can compromise entire networks. In one investigation, he discovered active credentials for five major hospital systems still present on secondhand medical equipment. With extensiv…
…
continue reading

1
IDC's Frank Dickson on Moving from Reactive to Proactive Security Strategy
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51What happens when you combine market research expertise with cybersecurity strategy? On this episode of The Future of Threat Intelligence, Frank Dickson, Group VP of Security & Trust at IDC, shares his journey from market research to leading a team of 20 cybersecurity analysts advising organizations on security strategy. Frank walks David through t…
…
continue reading

1
How to Write Survey Questions That Get Real Answers with Marta Costa
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa goes solo to address the most pressing questions from over 700 SurveyCTO users about crafting effective survey questions, from avoiding bias to ensuring cultural relevance. If you enjoyed this episode, make sure to subscribe, rate and review on Apple Podcasts, Spotify…
…
continue reading

1
ISG's Jeff Orr on Moving Beyond Perimeter Defense to Dynamic Security
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Jeff Orr, Director of Research & IT Technologies at ISG, brings over three decades of technology experience to his discussion with David about transforming enterprise security approaches. On this episode of The Future of Threat Intelligence, Jeff shares his explanation for why traditional security investments focused primarily on protection are lea…
…
continue reading

1
Meta's Oded Anderman on Preventing Unauthorized Data Collection
20:42
20:42
Play later
Play later
Lists
Like
Liked
20:42Where is the balance between data accessibility and protection in today's interconnected digital landscape? Oded Anderman, Privacy Lead at Meta, has plenty of insights on this question and more from his journey from financial services to protecting user data at one of the world's largest social platforms. His conversation with David on this episode…
…
continue reading

1
Maltego's Ben April on Using Commander's Intent for Remote Team Success
18:39
18:39
Play later
Play later
Lists
Like
Liked
18:39When Ben April started managing remote teams in 2005, the concept was nearly unheard of. Now, as CTO of Maltego, he brings nearly two decades of distributed team leadership experience, which he shares with David in this episode of The Future of Threat Intelligence. From implementing Commander's Intent for clear direction to ensuring mental health s…
…
continue reading

1
The Cyber Hut's Simon Moffatt on Transforming Identity Security from Static to Dynamic Defense
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22David steps into the new world of identity security with Simon Moffatt, Founder & Research Analyst at The Cyber Hut, on the latest episode of The Future of Threat Intelligence. With over two decades of experience, Simon illuminates the dramatic transformation from static directory management to dynamic, threat-informed security architecture. He wal…
…
continue reading

1
Data and the Fight for Fair Representation of Community Health Workers with Dr. James O'Donovan & Dickson Mbewe of Community Health Impact Coalition
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Dr. James O'Donovan & Dickson Mbewe, who represent the Community Health Impact Coalition. Together, they dissect a recent study that shines a blaring spotlight on the lack of fair recognition of community health workers’ contributions to data collection, …
…
continue reading

1
Zoom's Lee Ramsey on Transforming Customer Service Skills into Cybersecurity Success
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08David’s latest guest on The Future of Threat Intelligence points out the unexpected ways his customer service background enhances his cybersecurity work. From mastering the art of asking the right questions to navigating remote SOC operations, Lee Ramsey, Senior Security Analyst at Zoom shares practical insights on digital forensics, incident respo…
…
continue reading

1
Google’s James Brodsky on Securing AI and Building Security Ecosystems
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45In our latest episode of the Future of Threat Intelligence podcast, David is joined by James Brodsky, Head of Global Security Architects at Google, who shares insights from his extensive career in cybersecurity. Drawing from his experience at Splunk, Okta, and now Google, James discusses the challenges of securing AI applications and infrastructure…
…
continue reading

1
Enhancing Your Health Communication with Amelia Burke-Garcia
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Amelia Burke-Garcia, Director of the Center for Health Communication Science at NORC at the University of Chicago, to dive into the transformative role of data in health communication, the integration of AI in messaging, and the importance of inclusivity …
…
continue reading

1
Veeva Systems’ Justin Jettòn on Balancing Human Analysis and Automation in Threat Intel
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56In our latest episode of the Future of Threat Intelligence podcast, David welcomes Justin Jettòn, Senior Threat Intelligence Engineer at Veeva Systems who brings his military intelligence background to discuss the evolving landscape of cybersecurity. Drawing from his experience transitioning from forensics to threat intelligence, Justin explores ho…
…
continue reading

1
How Data Is Changing Lives Around the World: Holiday Edition
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00In this special Christmas episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa shares key insights from our guests about the transformative role of data in empowering communities and driving impactful change, featuring Paul Nzerebende, Maulik Chauhan, Andrew Gerhardt, Lara Mikhail, Mohammad Malik, and Yahya Hussein. If you enjo…
…
continue reading

1
VOTH 2024 Roundtable: Building Visibility in Cybersecurity
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In our special episode of the Future of Threat Intelligence podcast, David welcomes Ryan Chapman, Threat Hunter & Author and Instructor at SANS Institute and Matthew Winters, Lead Threat Hunter at T. Rowe Price, to break down Team Cymru's second annual Voice of a Threat Hunter report. Our two experts discuss the statistic that nearly 50% of organiz…
…
continue reading

1
GigaOm’s Howard Holton on Cyber Threats Facing Small Businesses
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58In our latest episode of the Future of Threat Intelligence podcast, David speaks with Howard Holton, CTO of GigaOm. Howard shares his insights on the increasing vulnerability of small and medium-sized businesses to cyber threats because adversaries are targeting them due to their limited resources and maturity in cybersecurity practices. Howard emp…
…
continue reading

1
How Oxfam Gives Power Back to Marginalized Communities with Yahya Hussein
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Yahya Hussein, Digital Programmes Advisor for Oxfam, to explore innovative digital tools that empower marginalized communities. They dive into how Oxfam is empowering communities through bottom-up accountability, challenges and innovations in implementing…
…
continue reading

1
CDW’s Ryan Link on Building a Culture of Continuous Learning
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In our latest episode of the Future of Threat Intelligence podcast, David sits down with Ryan Link, Principal of Threat Detection and Response at CDW. Ryan shares his decade-long journey in cybersecurity, emphasizing the importance of thinking like an attacker to enhance threat detection capabilities. He discusses the critical role of continuous tr…
…
continue reading

1
Cybersecurity Analyst & Author Deb Radcliff on the Intersection of Fiction and Cybersecurity
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29In our latest episode of the Future of Threat Intelligence, David speaks with Deb Radcliff, Cybersecurity Analyst, Journalist, & Author of the Breaking Backbones hacker trilogy, who shares her unique journey from investigative journalism to writing her books. She discusses the importance of understanding hacker culture and the human side of cybercr…
…
continue reading

1
Shaping Pakistan's Data Collection Practices with Mohammad Malik of Research Solutions
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Mohammad Malik, a Managing Partner for Research Solutions, to explore the exciting transformation of data collection practices in Pakistan. Mohammad shares how shifting from traditional paper methods to digital tools has revolutionized their work, the rol…
…
continue reading

1
Threat Hunter Ryan Chapman on Critical Security Mistakes Against Ransomware
25:45
25:45
Play later
Play later
Lists
Like
Liked
25:45In our latest episode of the Future of Threat Intelligence podcast, David chats with Ryan Chapman, Threat Hunter, Author & Instructor at SANS Institute. They explore the alarming evolution of ransomware tactics, including the rise of multi-extortion strategies where attackers not only encrypt data but also threaten to leak sensitive information. Ry…
…
continue reading

1
T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way. He explains that threat hunting is …
…
continue reading

1
Creating Impactful Data Stories with Lara Mikhail of USAID Egyptian Pioneers
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29In this episode of Survey & Beyond: The Data Collection Podcast, host Marta Costa is joined by Lara Mikhail, Senior Officer of Monitoring, Evaluation, and Learning (MEL) at USAID Egyptian Pioneers. Lara is an experienced and certified Monitoring and Evaluation (M&E) practitioner, with a demonstrated history of working on various projects in the dev…
…
continue reading

1
Marsh’s Gregory Van den Top on Understanding Cyber Risk in Business Strategy
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41In our latest episode of the Future of Threat Intelligence podcast, David speaks with Gregory Van den Top, AI Practice Leader for Europe at Marsh. They explore the critical importance of understanding cyber risk as an integral part of business strategy, rather than a technical afterthought. Gregory emphasizes the need for organizations to conduct t…
…
continue reading