{"id":885,"date":"2020-10-23T20:05:37","date_gmt":"2020-10-24T00:05:37","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?post_type=cu_video&#038;p=885"},"modified":"2026-01-27T10:53:15","modified_gmt":"2026-01-27T15:53:15","slug":"data-driven-approaches-for-cyber-security-evaluation-and-assurance","status":"publish","type":"cu_video","link":"https:\/\/carleton.ca\/cybersea\/video\/data-driven-approaches-for-cyber-security-evaluation-and-assurance\/","title":{"rendered":"Data-Driven Approaches for Cyber Security Evaluation and Assurance"},"content":{"rendered":"\n\n\n<header class=\"mb-6 cu-pageheader cu-component-updated md:mb-12\">\n    <h1 id=\"\" class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px\">\n        \n    <\/h1>\n\n    <\/header>\n\n\n\n<div class=\"cu-section cu-section--white w-screen ml-offset-center px-4 md:px-6 lg:px-12\"><div class=\"cu-max-w-child-5xl space-y-6 md:space-y-10   cu-prose-first-last\"><figure class=\"cu-figure not-prose  max-w-full\"><div class=\"not-prose overflow-hidden bg-white shadow-lg max-w-full rounded-none\"><div class=\"relative none overflow-hidden w-full pb-[56.25%] border border-cu-black-100\"><iframe title=\"Videos Embed\" src=\"https:\/\/www.youtube.com\/embed\/VOR1o2UrNWo\" class=\"cu-embed-iframe\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/div><\/figure><\/div><\/div>\n\n\n\n<p>Dr. Jason Jaskolka of the CyberSEA Research Lab presents for the <a href=\"https:\/\/carleton.ca\/cuids\/\">Carleton University Institute for Data Science<\/a> Distinguished Speaker Seminar Series<\/p>\n\n\n\n<h3 id=\"presentation-abstract\" class=\"wp-block-heading\">Presentation Abstract<\/h3>\n\n\n\n<p>Evaluating and assuring the security of software-dependent systems in the face of cyber-attacks and failures is among the top priorities for governments and providers of electric, financial, communication, and other essential services. This demands systematic, evidence-driven approaches for software development, capable of providing early evidence of mitigating security risks, attacks, and vulnerabilities. As a result, it is necessary to incorporate a variety of system security analyses into the system development life cycle to produce data to support engineering and stakeholder decision-making as part of the security evaluation and assurance activities. This is, of course, not without its challenges. In this talk, we will explore the challenges and opportunities of data-driven approaches for security evaluation and assurance. We will provide a brief overview of some of the different research projects that we are undertaking to address these challenges. Our goal is to provide more objective, reproducible, and consistent outcomes that can serve as the evidentiary basis for more effective security assurance of critical software-dependent systems.<\/p>\n","protected":false},"author":2,"template":"","meta":{"_acf_changed":false,"cu_video_source":"https:\/\/youtu.be\/VOR1o2UrNWo","cu_video_service":"YouTube","footnotes":"","_links_to":"","_links_to_target":""},"cu_video_type":[33],"class_list":["post-885","cu_video","type-cu_video","status-publish","has-post-thumbnail","hentry","cu_video_type-presentations"],"acf":[],"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/cu_video"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/885\/revisions"}],"predecessor-version":[{"id":2150,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/885\/revisions\/2150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/887"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=885"}],"wp:term":[{"taxonomy":"cu_video_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video_type?post=885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}