Powered by RND
PodcastyBiznesFuture of Threat Intelligence
Słuchaj Future of Threat Intelligence w aplikacji
Słuchaj Future of Threat Intelligence w aplikacji
(4 676)(250 137)
Zapisz stacje
Budzik
Sleep timer

Future of Threat Intelligence

Podcast Future of Threat Intelligence
Team Cymru
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us ...

Dostępne odcinki

5 z 68
  • Veeva Systems’ Justin Jettòn on Balancing Human Analysis and Automation in Threat Intel
    In our latest episode of the Future of Threat Intelligence podcast, David welcomes Justin Jettòn, Senior Threat Intelligence Engineer at Veeva Systems who brings his military intelligence background to discuss the evolving landscape of cybersecurity. Drawing from his experience transitioning from forensics to threat intelligence, Justin explores how AI is transforming both offensive and defensive capabilities in cybersecurity.  They discuss the potential of AI in early threat detection, the critical need for breaking down organizational silos to improve collective defense, and finding the right balance between automation and human analysis. Justin also emphasizes that while technology advances, the human element remains crucial for effective threat intelligence analysis. Topics discussed: Artificial intelligence is reducing the timeline between threat identification and new attack development, lowering barriers for adversaries. Using AI models for "indications and warning" could help identify threat patterns earlier, enabling proactive defense strategies. Breaking down organizational silos and creating security collectives is crucial for effective threat intelligence in modern cybersecurity. Despite technological advances, human analysts remain essential for contextual understanding and strategic threat assessment. Adding multiple security tools can extend detection time; organizations need better strategies for tool integration and automation. Clear distinction between engineering and analyst roles, with engineers handling technology while analysts focus on assessment and dissemination. Future security teams need balanced automation with human oversight, following the military's OODA (Observe, Orient, Decide, Act) loop. Key Takeaways:  Implement human verification checkpoints within automated security processes to maintain the "trust but verify" approach in threat intelligence workflows. Evaluate your organization's security tool stack to prevent tool fatigue — focus on understanding each tool's workflow before adding new ones. Develop comprehensive understanding of automation processes, from data collection points to decision thresholds, before deploying new security automation. Establish cross-organizational information sharing frameworks to enhance collective threat detection capabilities through shared AI models. Differentiate clearly between threat intelligence engineering and analyst roles to optimize team structure and workflow efficiency. Incorporate the OODA loop (Observe, Orient, Decide, Act) methodology into your threat intelligence processes, ensuring human oversight at critical points. Broaden your threat intelligence perspective by studying geopolitical events and connecting them to potential cybersecurity implications. Create sampling protocols to regularly verify that automated security systems are functioning as intended and catching relevant threats. Build collaborative relationships with ISPs, tech companies, and security vendors to expand threat detection capabilities beyond organizational boundaries. Document automation workflows thoroughly to ensure security teams understand where decision points occur and how data flows through the system.
    --------  
    31:56
  • VOTH 2024 Roundtable: Building Visibility in Cybersecurity
    In our special episode of the Future of Threat Intelligence podcast, David welcomes Ryan Chapman, Threat Hunter & Author and Instructor at SANS Institute and Matthew Winters, Lead Threat Hunter at T. Rowe Price, to break down Team Cymru's second annual Voice of a Threat Hunter report. Our two experts discuss the statistic that nearly 50% of organizations experienced a major security breach last year, emphasizing the critical role of threat hunting in enhancing incident response.    Ryan and Matt also touch on the importance of proactive detection in cybersecurity, the necessity of curiosity as a fundamental skill for threat hunters, and the challenges organizations face regarding visibility and tool availability.   Topics discussed: Nearly 50% of organizations reported experiencing a major security breach in the past year, highlighting the urgency for improved security measures.   72% of breached organizations believe that threat hunting significantly enhanced their ability to respond to incidents effectively.   Proactive detection is becoming essential as organizations recognize the need to stay ahead of evolving cyber threats and attacks.   Curiosity is a key skill for threat hunters, enabling them to uncover hidden vulnerabilities and enhance overall security posture.   Many organizations struggle with visibility into their networks, which hampers effective threat hunting and incident response efforts.   The importance of leveraging existing tools and resources is emphasized to maximize threat hunting capabilities without requiring significant new investments.   Collaboration across security teams can enhance threat hunting efforts, leading to better detection, response, and overall cybersecurity resilience.   Key Takeaways:  Assess your organization's current security posture to identify potential vulnerabilities and areas needing improvement in threat detection and response. Implement proactive threat hunting practices to stay ahead of evolving cyber threats and enhance incident response capabilities. Foster a culture of curiosity within your security team to encourage exploration and investigation of anomalies in your network. Leverage existing tools and resources effectively to maximize your threat hunting efforts without incurring significant additional costs. Collaborate across different security teams to share insights and improve the overall effectiveness of threat detection and incident response. Invest in training programs focused on threat hunting skills to empower your team with the knowledge needed to identify threats. Document all threat hunting activities and findings to create a knowledge base that can inform future security strategies and decisions. Establish clear KPIs to measure the effectiveness of your threat hunting initiatives and overall security posture. Engage with external cybersecurity communities to share experiences, learn best practices, and stay updated on the latest threat intelligence. Review and update your security tools regularly to ensure they are equipped to handle the latest threats and vulnerabilities.   
    --------  
    44:06
  • GigaOm’s Howard Holton on Cyber Threats Facing Small Businesses
    In our latest episode of the Future of Threat Intelligence podcast, David speaks with Howard Holton, CTO of GigaOm. Howard shares his insights on the increasing vulnerability of small and medium-sized businesses to cyber threats because adversaries are targeting them due to their limited resources and maturity in cybersecurity practices.    Howard emphasizes the importance of understanding the business-like nature of cybercriminals and their strategies. He also explores the role of AI and large language models in enhancing threat intelligence, highlighting how these tools can help organizations prioritize their security efforts effectively.    Topics discussed: The increasing trend of cybercriminals targeting small and medium-sized businesses due to their lack of resources and cybersecurity maturity.   Understanding how adversaries operate like businesses, seeking maximum profit by exploiting vulnerabilities in less fortified organizations.   Actionable cybersecurity measures that organizations can implement immediately to reduce risks and enhance their defenses.   The role of AI and large language models in improving threat intelligence and making security tools more intuitive for users.   The challenges of transitioning from a technical role to an executive position and the skills needed for effective leadership in cybersecurity.   The significance of communication and awareness within organizations to ensure that executive teams understand cybersecurity risks and resource needs.   Strategies for mitigating the impact of cyber attacks, focusing on prioritizing efforts based on potential threats and vulnerabilities.   The evolving landscape of cyber threats and how organizations can stay informed and adapt to new challenges in real-time.   The necessity of governance in implementing AI and LLMs to ensure that sensitive information is handled appropriately within organizations.   The ongoing need for continuous improvement in cybersecurity practices, as threats are constantly evolving and new vulnerabilities emerge.      Key Takeaways:  Assess your organization's cybersecurity maturity to identify vulnerabilities and prioritize areas for improvement, especially if you are a small or medium-sized business. Implement immediate cybersecurity measures to reduce the likelihood of a compromise, focusing on actionable steps that can be completed within hours or days. Leverage AI and large language models to enhance threat intelligence, making it easier to analyze data and respond to potential threats effectively. Communicate regularly with your executive team about cybersecurity risks and resource needs to ensure they are informed and can provide necessary support. Establish a governance framework for AI and LLMs to manage sensitive information and ensure compliance with organizational policies. Educate your team on the business-like nature of cybercriminals, helping them understand how attackers target organizations based on perceived weaknesses. Prioritize cybersecurity training for employees to foster a culture of awareness and preparedness against potential cyber threats. Monitor emerging cyber threats continuously to stay informed about new tactics and vulnerabilities that could impact your organization. Document all cybersecurity policies and procedures clearly, ensuring that employees understand their roles and responsibilities in maintaining security. Review and update your incident response plan regularly to reflect changes in the threat landscape and ensure your organization is prepared for potential attacks. 
    --------  
    21:58
  • CDW’s Ryan Link on Building a Culture of Continuous Learning
    In our latest episode of the Future of Threat Intelligence podcast, David sits down with Ryan Link, Principal of Threat Detection and Response at CDW. Ryan shares his decade-long journey in cybersecurity, emphasizing the importance of thinking like an attacker to enhance threat detection capabilities.    He discusses the critical role of continuous training for security teams and the integration of AI in reducing detection fatigue. Additionally, Ryan highlights the necessity of cloud training to future-proof cybersecurity teams in an increasingly digital landscape. Tune in for valuable insights on building a resilient and adaptive security strategy!    Topics discussed: The importance of thinking like an attacker to identify potential risks and improve overall security posture.   The critical role of continuous training for cybersecurity professionals to keep skills sharp and stay updated on threats.   The integration of AI in threat detection, focusing on reducing noise and enhancing efficiency in security operations.   The need for collaboration between blue and red teams to improve detection capabilities and incident response processes.   The value of cloud training as essential for future-proofing cybersecurity teams in an increasingly cloud-centric digital environment.   Why organizations should assess their maturity level before leveraging threat intelligence, ensuring it aligns with their capabilities and resources.      Key Takeaways:  Assess your cybersecurity maturity level to determine the appropriate use of threat intelligence and avoid overspending on unnecessary tools.   Implement continuous training programs for your security team to keep skills sharp and ensure they stay updated on evolving threats.   Encourage team members to think like attackers to better identify vulnerabilities and enhance your organization’s overall security posture.   Integrate AI technologies into your threat detection processes to reduce noise and improve the efficiency of security operations.   Foster collaboration between blue and red teams to enhance detection capabilities and ensure effective incident response strategies.   Prioritize cloud training for your team to understand the complexities of cloud environments and secure data effectively.   Develop custom detection capabilities by leveraging threat intelligence to create tailored responses to specific threats your organization may face.   Document processes and procedures regularly to maintain clarity and support onboarding of new team members effectively.   Utilize automated testing environments to streamline the threat detection lifecycle and improve the accuracy of your security tools.   Take regular breaks to prevent burnout among your security team, ensuring they remain mentally sharp and effective in their roles. 
    --------  
    21:34
  • Cybersecurity Analyst & Author Deb Radcliff on the Intersection of Fiction and Cybersecurity
    In our latest episode of the Future of Threat Intelligence, David speaks with Deb Radcliff, Cybersecurity Analyst, Journalist, & Author of the Breaking Backbones hacker trilogy, who shares her unique journey from investigative journalism to writing her books. She discusses the importance of understanding hacker culture and the human side of cybercrime, emphasizing that many hackers are driven by curiosity rather than malice.    Deb also explores the ethical implications of artificial intelligence and the challenges of maintaining privacy in an increasingly tech-driven world. With insights drawn from her experiences and fiction, Deb offers a thought-provoking perspective on the future of cybersecurity and the role of storytelling in shaping our understanding of it.    Topics discussed: How the Breaking Backbones trilogy humanizes hackers, portraying them as complex individuals rather than mere criminals in a tech landscape.   Deb emphasizes the importance of understanding social engineering and its role in both hacking and cybersecurity defenses.   The ethical implications of artificial intelligence are discussed, highlighting potential risks and responsibilities in its development and use.   Privacy and autonomy are critical themes, with Deb advocating for individual rights in an increasingly monitored and tech-driven society.   Deb reflects on her early experiences with hackers, illustrating the wild west nature of the cybersecurity landscape in the 1990s.   The conversation emphasizes the need for collaboration between tech experts and creatives to address cybersecurity challenges effectively.     Key Takeaways:  Explore the hacker culture to gain insights into motivations and behaviors that can inform better cybersecurity practices.   Advocate for ethical AI development by engaging in discussions about its implications on privacy and security in society.   Educate yourself and others about social engineering tactics to enhance awareness and improve defenses against cyber threats.   Promote privacy rights by supporting initiatives that protect individual autonomy in an increasingly digital and monitored world.   Collaborate with creatives and tech experts to develop innovative solutions that address the challenges of cybersecurity.   Participate in cybersecurity training programs to improve your understanding of current threats and effective response strategies.   Engage in conversations about the ethical use of technology to foster a culture of responsibility among developers and users.   Utilize storytelling techniques to communicate complex cybersecurity concepts, making them more relatable and understandable for broader audiences.   Stay informed about emerging technologies and their potential impacts on security to proactively adapt your strategies and practices.
    --------  
    26:29

Więcej Biznes podcastów

O Future of Threat Intelligence

Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
Strona internetowa podcastu

Słuchaj Future of Threat Intelligence, Biznes 2.0 - Maciej Wieczorek i wielu innych podcastów z całego świata dzięki aplikacji radio.pl

Uzyskaj bezpłatną aplikację radio.pl

  • Stacje i podcasty do zakładek
  • Strumieniuj przez Wi-Fi lub Bluetooth
  • Obsługuje Carplay & Android Auto
  • Jeszcze więcej funkcjonalności
Media spoecznościowe
v7.1.1 | © 2007-2025 radio.de GmbH
Generated: 1/8/2025 - 8:53:50 AM