The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
1
Insider Threats and Social Engineering Tactics by Counterintelligence Institute’s Peter Warmka
32:06
32:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
32:06
In Episode 90 of TheCyber5, we are joined by Peter Warmka, founder of the Counterintelligence Institute. Warmka is a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection. With 20+ years of breaching security overseas for a living, Warmka now te…
…
continue reading
1
The Top Nisos Investigations Of the Last Seven Years with Nisos Research Principal Vincas Ciziunas
27:27
27:27
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:27
In Episode 89 of TheCyber5, we are joined by Nisos Research Principal, Vincas Ciziunas. It was 7 years ago, at a restaurant in Ashburn, Virginia, when Nisos’ co-founders Justin Zeefe and Landon Winkelvoss met Vincas. At the time, Vincas was working as a contractor for the US government but was considering a pivot into the private sector. It was Vin…
…
continue reading
1
The Vital Role of Customer Success in Intel Programs with Senior Director of Nisos Brandon Kappus
27:43
27:43
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:43
In Episode 88 of TheCyber5, we are joined by Nisos Senior Director for Customer Success, Brandon Kappus. Here are five topics we discuss in this episode: Intelligence Playbooks Start with Education to the Customer Playbooks should include three major steps. The first step is education on how intelligence is going to be consumed and not be nonstop n…
…
continue reading
1
Identifying When Attribution of Threat Actors Matters and How to Track the Outcomes with Senior Information Security Leader Charles Garzoni
36:51
36:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:51
In Episode 87 of TheCyber5, we are joined by senior information security leader Charles Garzoni. Here are five topics we discuss in this episode: Defining When Attribution is Relevant and Necessary Many corporations are not overly concerned with attribution against cyber adversaries, they just want to get back to business operations. However, if so…
…
continue reading
1
Properly Defining a Threat Management Department within Enterprise with Senior Manager of Nvidia Chris Cottrell
37:17
37:17
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:17
In Episode 86 of TheCyber5, we are joined by Senior Manager of Threat Management for Nvidia Chris Cottrell. Here are six topics we discuss in this episode: What is a threat management department within enterprise security? Threat management departments are usually formed when security teams become mature and have table stakes functions within threa…
…
continue reading
1
Operational Resiliency Framework Pertaining to Supply Chains by Foundation for Defense of Democracies George Shea
18:44
18:44
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:44
In Episode 85 of TheCyber5, we are joined by Chief Technologist of Transformative Cyber Innovation Lab for the Foundation for Defense of Democracies (FDD) Dr. George Shea. Here are four topics we discuss in this episode: What is the Operational Resiliency Framework (ORF)? The Operational Resiliency Framework (ORF) is a framework that is intended to…
…
continue reading
1
Integrating Attack Simulation with Intelligence to Provide Actionable Outcomes with CrossCountry Consulting
39:21
39:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:21
In Episode 84 of TheCyber5, we are joined by members of the CrossCountry Consulting team: Brian Chamberlain, Offensive R&D Lead, Eric Eames, Associate Director, and Gary Barnabo, Director, Cyber and Privacy. Here are five topics we discuss in this episode: Adversary Emulation vs. Simulation and Use of Threat Intelligence Replaying attacks from adve…
…
continue reading
1
Data Governance and Threat Intelligence Converge with Egnyte’s Chief Governance Officer Jeff Sizemore
26:25
26:25
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:25
Topic: Title: Data Governance and Threat Intelligence Converge In Episode 83 of TheCyber5, we are joined by our guest, Egnyte’s Chief Governance Officer, Jeff Sizemore. We discuss the Cybersecurity Maturity Model Certification (CMMC) and the impact on Department of Defense (DOD) contractors to mature their cybersecurity hygiene in order to compete …
…
continue reading
1
Driving Diversity in Cyber Security and Intelligence with BGH Security CEO Tennisha Martin
18:11
18:11
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:11
In episode 82 of The Cyber5, we are joined by guest moderator and senior intelligence analyst for Nisos, Valerie G., and CEO of BGH Security, Tennisha Martin. In this episode, we discuss the challenges and opportunities of promoting and enabling diversity and inclusion in cyber security. Key Takeaways: Showing Impact for Diversity and Inclusion (D&…
…
continue reading
1
Leveraging Open Source Intelligence in Insider Threat Programs with Vaillance Group CEO, Shawnee Delaney
24:51
24:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
24:51
In episode 81 of The Cyber5, we are joined by the Head of Insider Threat at Uber and CEO of Vaillance Group, Shawnee Delaney. In this episode, we provide an overview of different functions within an insider threat program. We also discuss the support open source intelligence provides to such programs and how to change company culture to care about …
…
continue reading
1
The DISARM Framework Helps Bring Focus to the Disinformation Problem with Executive Director of the DISARM Foundation Jon Brewer
24:18
24:18
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
24:18
In episode 80 of The Cyber5, we are joined by Executive Director of the DISARM Foundation, Jon Brewer. We discuss the mission of the DISARM Framework, which is a common framework for combating disinformation. Much like how the MITRE ATT&CK framework is used for combating cyber attacks, the DISARM framework is used to identify what Jon calls “cognit…
…
continue reading
1
The Persistent Problem of Spear Phishing with Senior Security Practitioner Garrett Gross
28:28
28:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:28
In episode 79 of The Cyber5, we are joined by senior security practitioner, Garrett Gross. We discuss the age old problem of spear phishing and why enterprises still struggle to fix this problem. We talk about the critical processes and technologies necessary to defend against spear phishing, including robust training programs and endpoint detectio…
…
continue reading
1
Digital Transformation and Threat Intelligence Use in the US Public Sector with Former Booz Allen Hamilton Manager Gaurang Shah
31:14
31:14
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:14
In episode 78 of The Cyber5, we are joined by our guest, Gaurang Shah, former senior lead technology manager at Booz Allen Hamilton. We talk about the challenges of digital transformation and cybersecurity in the US federal government. We discuss solutions for bringing innovative technology and bespoke services into the federal space and how to sho…
…
continue reading
1
Moving a Security Team Beyond IOCs and Positioning for Stronger Outcomes with Senior Manager of Deloitte Eric Lekus
22:41
22:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
22:41
In episode 77 of The Cyber5, we are joined by our guest, Eric Lekus, Senior Manager for Threat Intelligence at Deloitte. Eric delivers for Deloitte’s internal security team and is not a client-facing consultant. We talk about how to evolve cyber threat intelligence in a SOC environment, beyond basic indicators of compromise (IOC) integration. We di…
…
continue reading
1
Topic: Elevating Private Sector Intelligence through Professionalization with Harvard University's Maria Robson
21:20
21:20
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
21:20
In episode 76 of The Cyber5, guest moderator and Nisos Director for Product Marketing, Stephen Helm, is joined by our guest, Dr. Maria Robson, the Program Coordinator for the Intelligence Project of the Belfer Center at Harvard University's Kennedy School. We discuss the evolution of intelligence roles in enterprise and the ultimate path for intell…
…
continue reading
1
Open Source Intelligence's Role in the National Security and the Broader Public Sector with Grist Mill Exchange's Kristin Wood
31:41
31:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:41
In episode 75 of The Cyber5, we are joined by Grist Mill Exchange CEO, Kristin Wood. We discuss open source intelligence (OSINT) use in the U.S. public sector, not only with national security but also with the emergency response sectors. We talk about how open source intelligence has evolved in the last ten years and talk about how adversaries use …
…
continue reading
1
Evolving the Physical Security and the GSOC with Open Source Intelligence Collection and Analysis with Director of GSOC Operations for the NFL Robert Gummer
38:51
38:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:51
In episode 74 of The Cyber5, we are joined by Robert Gummer, the Director of the Global Security Operations Center (GSOC) for the National Football League (NFL). First, we talk about how to expand the mission of a global security operations center (GSOC) using open source intelligence. We talk about the role of vendors in the GSOC ecosystem and how…
…
continue reading
1
Threat Intelligence Usage in API Security and DevSecOps with Snap Finance Chief Security Officer Upendra Mardikar
34:05
34:05
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
34:05
In episode 73 of The Cyber5, we are joined by Snap Finance Chief Security Officer Upendra Mardikar. We discuss how threat intelligence is used in application programming interface (API) security and development security operations (devsecops). Any organization building an application has data or user-generated content as the primary product. Once c…
…
continue reading
1
Integrating Threat Intelligence into an Application Security and Fraud Program with DoorDash’s Patrick Mathieu
28:16
28:16
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:16
In episode 72 of The Cyber5, we are joined by DoorDash Application Security Manager, Patrick Mathieu. We talk about threat intelligence's role within applications security programs, particularly programs focusing on fraud. We discuss the importance of prioritization between what could happen, as often seen in penetration testing, and what is happen…
…
continue reading
1
Building Your Own Intelligence Program within the SOC and Beyond
26:44
26:44
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:44
In episode 71 of The Cyber5, guest Nisos moderator and teammate Matt Brown is joined by security practitioner Matt Nelson. They talk about a recent intelligence blog Matt Nelson wrote about how to operationalize intelligence for the SOC and some outcomes that an incident response team looks for from intelligence. They also talk about how to make in…
…
continue reading
1
Holistic Uses of PDNS and BGP Data to Address Intelligence Needs in the Private Sector
39:30
39:30
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:30
In episode 70 of The Cyber5, we are joined by Open Source Context Director of Operations, Donald McCarthy. We discuss external telemetry available to the private sector, focusing on passive domain name systems or passive DNS, and Border Gateway Protocol or BGP. These data sets are critical for threat intelligence teams, as they often provide crucia…
…
continue reading
1
Future of XDR, SIEM, SOAR, and Threat Intelligence
31:15
31:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:15
In episode 69 of The Cyber5, we are joined by Lima Charlie’s CEO, Maxime Lamothe-Brassard. We discuss the future of what's known in the security industry as XDR, which is essentially an enrichment of endpoint detection response products. Three Key Takeaways: 1) What is XDR? Depends who you ask. XDR is not another tool, but merely an extension of En…
…
continue reading
1
Enterprise Stakeholder Management and the Use of Threat Intelligence
27:59
27:59
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:59
In episode 68 of The Cyber5, we are joined by Executive Director and Head of Global Threat Intelligence for Morgan Stanley, Valentina Soria. We discuss leading a large-scale threat intelligence program in the financial institution space and how to make intelligence absorbable by multiple consumers. We also talk about how intelligence teams can buil…
…
continue reading
1
Value of Securing Containers in the Technology Supply Chain with Security Practitioner Julie Tsai
27:34
27:34
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:34
Topic: Value of Securing Containers in the Technology Supply Chain In episode 67 of The Cyber5, we are joined by senior security practitioner Julie Tsai. We discuss security and intelligence in modern-day technology platforms, concentrating on how to secure the impact that container and cloud environments have on the technology supply chain. Compli…
…
continue reading
1
Building a Security Team to the Business And Using Intelligence to Inform the Proper Risk Strategy with H&R Block CISO Josh Brown
37:44
37:44
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:44
In episode 66 of The Cyber5, we are joined by H&R Block Chief Information Security Officer (CISO) Josh Brown. In this episode we discuss the importance in building an informed security team that can collect intelligence and proper risk strategy. We have a frank conversation about what the business of security means and how to develop a team that un…
…
continue reading
1
Brand and Reputation Intelligence: Open Source Intelligence That Drives Revenue Generation But Protects the Brand with Vizsense's Jon Iadonisi
32:24
32:24
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
32:24
In episode 65 of The Cyber5, we are joined by Jon Iadonisi, CEO and Co-Founder of VizSense. Many people think of open-source intelligence (OSINT) as identifying and mitigating threats for the security team. In this episode, we explore how OSINT is used to drive revenue. We talk about the role social media and OSINT play in marketing campaigns, part…
…
continue reading
1
Building an Intelligence Program to Protect Executives with Okta Senior Intelligence Analyst John Marshall
22:45
22:45
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
22:45
In episode 64 of The Cyber5, we are again joined by John Marshall, Senior Intelligence Analyst at Okta. We discuss building a threat intelligence program to protect executives, particularly on nuances of being a “solution-side security company”. We discuss a risk-based approach for protecting executives and the data that's important to aggregate an…
…
continue reading
1
Defining Metrics for Attribution in Cyber Threat Intelligence and Investigations
31:10
31:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:10
In episode 63 of The Cyber5, we are again joined by Sean O’Connor, Head of Global Cyber Threat Intelligence for Equinix. We discuss attribution in the cyber threat intelligence and investigation space, and what the private sector can learn from public sector intelligence programs. We also discuss different levels of attribution, the outcomes, and t…
…
continue reading
1
Introduction to Cryptocurrency Investigations
29:03
29:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:03
In episode 62 of The Cyber5, we are again joined by Charles Finfrock, CEO and Founder of Black Hand Solutions. Charles was previously the Senior Manager of Insider Threat and Investigations at Tesla and prior to that, he worked as an Operations Officer for the Central Intelligence Agency. We discuss the generalities of cryptocurrency and go into th…
…
continue reading
1
Combating Account Takeovers and Fraudulent Websites at Scale for SMB
38:21
38:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:21
In episode 61 of The Cyber5, we are joined by Josh Shaul, CEO of Allure Security. We discuss cybersecurity and account takeovers. We focus on the lifecycle of an account takeover , how to permanently solve it, and how to show a clear return on investment to small business owners. We also talk about how to impede attackers by making their efforts mo…
…
continue reading
1
Combating Terrorist Messaging on the Open Internet
31:06
31:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:06
In episode 60 of The Cyber5, we are joined by Tom Thorley, the Director of Technology at the Global Internet Forum to Counter Terrorism (GIF-CT). We discuss the mission of GIF-CT and how it's evolved over the last five years, with particular interest on violent terrorist messaging across different social media platforms. We also discuss the technic…
…
continue reading
1
The Business of Security: Positively Influencing Profit and Loss
23:52
23:52
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
23:52
In episode 59 of The Cyber5, we are joined by active security compliance practitioner, Dylan McKnight. We discuss the business of security. We unpacked how security can be effective at driving profitability and not just be a cost center toward an organization. We discuss how compliance measures can drive meaningful metrics around profitability and …
…
continue reading
1
Tips on Recruiting and Retaining Cybersecurity Talent
23:38
23:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
23:38
In episode 58 of The Cyber5, we are joined by Magen Gicinto, Director People Strategy and Culture for Nisos. We discuss the “Great Resignation’” that's happening in the work environment during the COVID pandemic and how to realign your “people strategy” to recruit and retain the best talent in spite of those challenges. We address the aspects of re…
…
continue reading
1
Evolution of Incident Response Playbooks in the Last Five Years
28:39
28:39
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:39
In episode 57 of The Cyber5, we are joined by Colby Clark, Director for Cyber Threat Management. He’s also the author of the recently published book, The Cyber Security Incident Management Master’s Guide. We baseline incident response playbooks around customer environment, threat, landscape, regulatory environment, and security controls. Afterward,…
…
continue reading
1
Use of Intelligence for Corporate Security Programs
25:51
25:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:51
In episode 56 of The Cyber5, we are joined by Ray O’Hara, Executive Vice President for Allied Universal. We discuss the use of intelligence for corporate security programs, usually overseen by a Chief Security Officer (CSO). We talk about some of the challenges this role faces and how intelligence can be actionable to mitigate those risks. We also …
…
continue reading
1
Evaluating the Conundrums of OT Security in the Energy and ONG Industries
30:29
30:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
30:29
In episode 55 of The Cyber5, we are joined by Nate Singleton, a security practitioner who was most recently the Director of IT, Governance, and Incident Response at Helmerich and Payne. We discussed the conundrums of operational technology security within gas and energy sectors, including risks downstream and upstream. We also compared the aggressi…
…
continue reading
1
Personal Information Exposure Can Lead to Disaster
21:32
21:32
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
21:32
In episode 54 of The Cyber5, we are joined by Aaron Barr, Piiq Media’s Chief Technology Officer. We discuss how data breaches are combined with other open source information to paint a more holistic target profile for bad actors. We also discussed the true information anchors and weaponization that can lead to an online attack against someone. Fina…
…
continue reading
1
Thinking about Cybersecurity Challenges in the Geopolitical and World Economic Context
25:22
25:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:22
In episode 53 of The Cyber5, we are joined by Ciaran Martin, the former United Kingdom National Cybersecurity Center CEO and former Director General for Cybersecurity of GCHQ. He’s currently a professor at the University of Oxford and a strategic advisor for Paladin Capital. We discuss the political, legal, and ethical challenges of today's ransomw…
…
continue reading
1
Evolution of Nisos Over the Last Six Years from the Operators
31:13
31:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:13
In episode 52 of The Cyber5, we are joined by Nisos Managing and Technical Principals Robert Volkert and Travis Peska who lead operations within the Pandion Intelligence team. We talk about the evolution of Nisos over the past six years, including how we now position ourselves within the private sector threat intelligence market under our new Chief…
…
continue reading
1
Building and Implementing Security Programs within Fast Growing Technology Companies
27:36
27:36
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:36
In episode 51 of The Cyber5, we are joined by Chris Castaldo. Chris is the Chief Information Security Officer for CrossBeam and has been CISO for a number of emerging technology companies. In this episode, we talk about his newly released book, “Startup Secure” and how different growth companies can implement security at different funding stages. H…
…
continue reading
1
Intelligence Management: Translating Biden’s Executive Order for Public and Private Enterprise
24:05
24:05
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
24:05
In episode 50 of The Cyber5, we are joined by Paul Kurtz. Paul’s career includes serving as Director of Counter-Terrorism, Senior Director for Cyber Security, and Special Assistant to the President of the United States for Critical Infrastructure Protection. He was previously the CEO of Threat Intelligence Platform TrueStar and is now the Chief Cyb…
…
continue reading
1
Building a Security Program for a Fast Growth Technology Company
25:01
25:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:01
In episode 49 of The Cyber5, we are joined by Cassio Goldschmidt. Cassio is Senior Director and Chief Information Security Officer at ServiceTitan. We discuss building a security company in late stage tech startups, including what to prioritize when starting a security program. While tech startups have a mantra of “move fast and break things,” Cass…
…
continue reading
1
Using Intelligence Analysis in InfoSec: Think Globally and Act Locally
31:23
31:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:23
Topic: Using Intelligence Analysis in InfoSec: Think Globally and Act Locally In episode 48 of The Cyber5, we are joined by Rick Doten. Rick is VP of Information Security at Centene Corporation and consults as CISO for Carolina Complete Health. We discuss shifting the operating model of threat hunting and intelligence to a more collaborative model,…
…
continue reading
1
Security Enabling the Business During Periods of Fast Growth
17:21
17:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:21
In episode 47 of The Cyber5, we are joined by Lena Smart. Lena is the Chief Information Security Officer at MongoDB. We discuss how security can be an enabler of a business during fast periods of growth. We review how different departments can set up their own applications without needing an arduous approval process. We also discuss different cultu…
…
continue reading
1
Navigating the Complex Challenges of Trust and Safety Teams
20:46
20:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
20:46
In episode 46 of The Cyber5, we are joined by Charlotte Willner. Charlotte is the Executive Director of the Trust and Safety Professional Association. We will define what trust and safety means within organizations and how it differs from traditional cyber and physical security. We’ll focus on fraud and abuse of user-generated content on platforms …
…
continue reading
1
Different Motivations Between Espionage and Crime Actors
27:43
27:43
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:43
In episode 45 of The Cyber5, we are joined by John Grim. John is the head of research, development, and innovation for Verizon’s Threat Research Advisory Center. In this episode, we discuss the differences between threat actors who engage in cybercrime and those who are nation state espionage actors. We explore their motivations around computer net…
…
continue reading
1
Automating Cyber Threat Intelligence 101
18:49
18:49
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:49
In episode 44 of The Cyber5, we are joined by Ronald Eddings. Ron is a Security Engineer and Architect for Marqeta, host of Hack Valley Studio podcast, and a cybersecurity expert and blogger have earned him a reputation as a trusted industry leader. In this episode, we discuss the fundamentals of automating threat intelligence. We focus on the auto…
…
continue reading
1
Mastercard’s Cybersecurity Strategy to Secure the Digital Ecosystem
27:17
27:17
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
27:17
In episode 43 of The Cyber5, we are joined by Steve Brown, Director of Cyber & Intelligence Solutions for Europe at Mastercard. Steve discusses the key aspects of cyber defense learned while working international cyber crime investigations with the United Kingdom’s National Crime Agency. He will discuss the proven approach of prevent, protect, prep…
…
continue reading
1
Building an Enterprise Intelligence Program
23:53
23:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
23:53
In episode 42 of The Cyber5, we are joined by A.J. Nash, Senior Director of Cyber Intelligence Strategy at Anomali. A.J. discusses the steps and key components of building an enterprise intelligence program. Among the topics covered are frameworks, roles and responsibilities, critical skill sets, and metrics. 5 Topics Covered in this Episode: 1. De…
…
continue reading
1
Scaling a Cyber Fusion Center Using Threat Intelligence
36:57
36:57
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:57
In episode 41 of the Cyber5, we are joined by Director of Cyber Defense Integration at Thomson Reuters, Cliff Webster. Cliff discusses the building and scaling of cyber fusion centers and their integral part in reducing risk to all facets of the business. Here are the 5 Topics We Cover in this Episode: Differentiating a Cyber Fusion Center over a S…
…
continue reading