Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Regular threat intelligence podcasts providing you with a deeper insight and more comprehensive analysis of wider security trends, evolving patterns and unexplored geopolitical themes from every corner of the globe. Get the complete, unfiltered and unbiased global picture from Intelligence Fusion. 🌍📲 Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading

1
Season 1 - Episode 6 (Pedro Kertzman & Aaron Roberts)
1:11:44
1:11:44
Na później
Na później
Listy
Polub
Polubione
1:11:44What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of "Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers," reveals the powerful intersection where these disciplines meet. Aaron's jo…
…
continue reading

1
Rapid7’s Lonnie Best on Measuring SOC Success Beyond Alert Closures
21:25
21:25
Na później
Na później
Listy
Polub
Polubione
21:25In a world obsessed with cutting-edge security technology, Lonnie Best, Senior Manager of Detection & Response Services at Rapid7, makes a compelling case for mastering the fundamentals. After transitioning from craft beer journalism through nuclear security to cybersecurity, Lonnie witnessed the evolution of ransomware attacks from "spray and pray…
…
continue reading

1
Season 1 - Episode 5 (Pedro Kertzman & Josh Darby MacLellan)
43:21
43:21
Na później
Na później
Listy
Polub
Polubione
43:21What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals. The conversation opens with Josh's unexpected path into threat intelligence, highlighting a crucial rev…
…
continue reading

1
Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities
28:27
28:27
Na później
Na później
Listy
Polub
Polubione
28:27From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. In this no-holds-barred conve…
…
continue reading

1
Season 1 - Episode 4 (Pedro Kertzman & Cherie Burgett)
38:20
38:20
Na później
Na później
Listy
Polub
Polubione
38:20Cherie Burgett takes us on a fascinating journey from her days as a Radio Shack employee and avid gamer to becoming the Director of Cyber Intelligence Operations for the Mining and Metals Information Sharing and Analysis Center. Her story demolishes the myth that cybersecurity professionals must follow traditional career paths, demonstrating how li…
…
continue reading

1
Option Care’s Jill Rhodes on Uniting Legal Expertise and Cybersecurity in Healthcare
28:39
28:39
Na później
Na później
Listy
Polub
Polubione
28:39Jill Rhodes, SVP & CISO at Option Care Health, shares her unconventional journey from international development lawyer stationed in Bolivia and Moscow to healthcare leader, where she built the security program from the ground up as the organization's first CISO. Jill outlines for David how a transformative assignment at an intelligence agency spark…
…
continue reading

1
Season 1 - Episode 3 (Pedro Kertzman & Pedro Barros)
32:07
32:07
Na później
Na później
Listy
Polub
Polubione
32:07Navigating the world of threat intelligence feeds requires a critical eye and regular evaluation. Security analyst and educator Pedro Barros takes us through his journey from SOC analyst to threat intelligence professional, explaining why CTI should function as a pillar supporting all cybersecurity operations. Pedro highlights a persistent problem …
…
continue reading

1
Silverado Policy Accelerator’s Dmitri Alperovitch on Hunting Intruders After They're Already In
28:00
28:00
Na później
Na później
Listy
Polub
Polubione
28:00In this episode of The Future of Threat Intelligence, Dmitri Alperovitch, Co-founder & Executive Chairman at Silverado Policy Accelerator and Author of World on the Brink: How America Can Beat China in the Race for the 21st Century, delivers a stark warning about the second Cold War with China that's unfolding, from military and nuclear arms races …
…
continue reading

1
Season 1 - Episode 2 (Pedro Kertzman & A. Stryker)
47:28
47:28
Na później
Na później
Listy
Polub
Polubione
47:28Threat intelligence forms the backbone of effective cybersecurity strategy, but what does it really take to build a successful CTI program? In this fascinating conversation, Stryker, a threat intelligence analyst at a major US insurance company, challenges conventional wisdom by asserting that while every organization needs threat information, not …
…
continue reading

1
Directions on Microsoft’s Wes Miller on Harmonizing Microsoft's Security & Identity Tools
24:28
24:28
Na później
Na później
Listy
Polub
Polubione
24:28What happens when Microsoft's on-premises security falls behind while cloud innovation accelerates? In this episode of The Future of Threat Intelligence, Wes Miller, Research Analyst for Microsoft Identity, Security, and Management at Directions on Microsoft, pulls back the curtain on Microsoft's fragmented security landscape. Having survived the h…
…
continue reading

1
Wikistrat’s Jeffrey Caruso on New Methods in Cyber-Physical Attacks
25:20
25:20
Na później
Na później
Listy
Polub
Polubione
25:20In this episode of The Future of Threat Intelligence, Jeffrey Caruso, Senior Analyst at Wikistrat & Author of Inside Cyber Warfare, shares examples of how teams with minimal budgets achieved kinetic effects through OT system manipulation — from destroying missile research facilities to compromising subway systems and burning down FSB-affiliated ban…
…
continue reading

1
Season 1 - Episode 1 (Pedro Kertzman & Mary D'Angelo)
29:05
29:05
Na później
Na później
Listy
Polub
Polubione
29:05On this episode of Season 1, our Host Pedro Kertzman will chat with Mary D’Angelo, who is a Cyber Threat Intelligence Solutions Lead at Filigran, dedicated to helping organizations integrate actionable threat intelligence across silos. She emphasizes the need for a top-down cultural shift to demonstrate threat intelligence’s ROI to executives. Focu…
…
continue reading

1
Rapid7’s Deral Heiland on Why Your Network Segmentation Strategy Overlooks IoT Risk
29:31
29:31
Na później
Na później
Listy
Polub
Polubione
29:31Deral Heiland’s research has uncovered critical vulnerabilities across the IoT spectrum, from office printers to medical devices, revealing how seemingly isolated devices can compromise entire networks. In one investigation, he discovered active credentials for five major hospital systems still present on secondhand medical equipment. With extensiv…
…
continue reading

1
IDC's Frank Dickson on Moving from Reactive to Proactive Security Strategy
31:51
31:51
Na później
Na później
Listy
Polub
Polubione
31:51What happens when you combine market research expertise with cybersecurity strategy? On this episode of The Future of Threat Intelligence, Frank Dickson, Group VP of Security & Trust at IDC, shares his journey from market research to leading a team of 20 cybersecurity analysts advising organizations on security strategy. Frank walks David through t…
…
continue reading

1
ISG's Jeff Orr on Moving Beyond Perimeter Defense to Dynamic Security
29:33
29:33
Na później
Na później
Listy
Polub
Polubione
29:33Jeff Orr, Director of Research & IT Technologies at ISG, brings over three decades of technology experience to his discussion with David about transforming enterprise security approaches. On this episode of The Future of Threat Intelligence, Jeff shares his explanation for why traditional security investments focused primarily on protection are lea…
…
continue reading

1
Meta's Oded Anderman on Preventing Unauthorized Data Collection
20:42
20:42
Na później
Na później
Listy
Polub
Polubione
20:42Where is the balance between data accessibility and protection in today's interconnected digital landscape? Oded Anderman, Privacy Lead at Meta, has plenty of insights on this question and more from his journey from financial services to protecting user data at one of the world's largest social platforms. His conversation with David on this episode…
…
continue reading

1
Maltego's Ben April on Using Commander's Intent for Remote Team Success
18:39
18:39
Na później
Na później
Listy
Polub
Polubione
18:39When Ben April started managing remote teams in 2005, the concept was nearly unheard of. Now, as CTO of Maltego, he brings nearly two decades of distributed team leadership experience, which he shares with David in this episode of The Future of Threat Intelligence. From implementing Commander's Intent for clear direction to ensuring mental health s…
…
continue reading

1
The Cyber Hut's Simon Moffatt on Transforming Identity Security from Static to Dynamic Defense
25:22
25:22
Na później
Na później
Listy
Polub
Polubione
25:22David steps into the new world of identity security with Simon Moffatt, Founder & Research Analyst at The Cyber Hut, on the latest episode of The Future of Threat Intelligence. With over two decades of experience, Simon illuminates the dramatic transformation from static directory management to dynamic, threat-informed security architecture. He wal…
…
continue reading

1
Zoom's Lee Ramsey on Transforming Customer Service Skills into Cybersecurity Success
15:08
15:08
Na później
Na później
Listy
Polub
Polubione
15:08David’s latest guest on The Future of Threat Intelligence points out the unexpected ways his customer service background enhances his cybersecurity work. From mastering the art of asking the right questions to navigating remote SOC operations, Lee Ramsey, Senior Security Analyst at Zoom shares practical insights on digital forensics, incident respo…
…
continue reading

1
Google’s James Brodsky on Securing AI and Building Security Ecosystems
26:45
26:45
Na później
Na później
Listy
Polub
Polubione
26:45In our latest episode of the Future of Threat Intelligence podcast, David is joined by James Brodsky, Head of Global Security Architects at Google, who shares insights from his extensive career in cybersecurity. Drawing from his experience at Splunk, Okta, and now Google, James discusses the challenges of securing AI applications and infrastructure…
…
continue reading

1
Veeva Systems’ Justin Jettòn on Balancing Human Analysis and Automation in Threat Intel
31:56
31:56
Na później
Na później
Listy
Polub
Polubione
31:56In our latest episode of the Future of Threat Intelligence podcast, David welcomes Justin Jettòn, Senior Threat Intelligence Engineer at Veeva Systems who brings his military intelligence background to discuss the evolving landscape of cybersecurity. Drawing from his experience transitioning from forensics to threat intelligence, Justin explores ho…
…
continue reading

1
VOTH 2024 Roundtable: Building Visibility in Cybersecurity
44:06
44:06
Na później
Na później
Listy
Polub
Polubione
44:06In our special episode of the Future of Threat Intelligence podcast, David welcomes Ryan Chapman, Threat Hunter & Author and Instructor at SANS Institute and Matthew Winters, Lead Threat Hunter at T. Rowe Price, to break down Team Cymru's second annual Voice of a Threat Hunter report. Our two experts discuss the statistic that nearly 50% of organiz…
…
continue reading

1
GigaOm’s Howard Holton on Cyber Threats Facing Small Businesses
21:58
21:58
Na później
Na później
Listy
Polub
Polubione
21:58In our latest episode of the Future of Threat Intelligence podcast, David speaks with Howard Holton, CTO of GigaOm. Howard shares his insights on the increasing vulnerability of small and medium-sized businesses to cyber threats because adversaries are targeting them due to their limited resources and maturity in cybersecurity practices. Howard emp…
…
continue reading

1
CDW’s Ryan Link on Building a Culture of Continuous Learning
21:34
21:34
Na później
Na później
Listy
Polub
Polubione
21:34In our latest episode of the Future of Threat Intelligence podcast, David sits down with Ryan Link, Principal of Threat Detection and Response at CDW. Ryan shares his decade-long journey in cybersecurity, emphasizing the importance of thinking like an attacker to enhance threat detection capabilities. He discusses the critical role of continuous tr…
…
continue reading

1
Cybersecurity Analyst & Author Deb Radcliff on the Intersection of Fiction and Cybersecurity
26:29
26:29
Na później
Na później
Listy
Polub
Polubione
26:29In our latest episode of the Future of Threat Intelligence, David speaks with Deb Radcliff, Cybersecurity Analyst, Journalist, & Author of the Breaking Backbones hacker trilogy, who shares her unique journey from investigative journalism to writing her books. She discusses the importance of understanding hacker culture and the human side of cybercr…
…
continue reading

1
Threat Hunter Ryan Chapman on Critical Security Mistakes Against Ransomware
25:45
25:45
Na później
Na później
Listy
Polub
Polubione
25:45In our latest episode of the Future of Threat Intelligence podcast, David chats with Ryan Chapman, Threat Hunter, Author & Instructor at SANS Institute. They explore the alarming evolution of ransomware tactics, including the rise of multi-extortion strategies where attackers not only encrypt data but also threaten to leak sensitive information. Ry…
…
continue reading

1
T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method
19:56
19:56
Na później
Na później
Listy
Polub
Polubione
19:56In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way. He explains that threat hunting is …
…
continue reading

1
Marsh’s Gregory Van den Top on Understanding Cyber Risk in Business Strategy
18:41
18:41
Na później
Na później
Listy
Polub
Polubione
18:41In our latest episode of the Future of Threat Intelligence podcast, David speaks with Gregory Van den Top, AI Practice Leader for Europe at Marsh. They explore the critical importance of understanding cyber risk as an integral part of business strategy, rather than a technical afterthought. Gregory emphasizes the need for organizations to conduct t…
…
continue reading