Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Regular threat intelligence podcasts providing you with a deeper insight and more comprehensive analysis of wider security trends, evolving patterns and unexplored geopolitical themes from every corner of the globe. Get the complete, unfiltered and unbiased global picture from Intelligence Fusion. 🌍📲 Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading

1
Season 1 - Episode 10 (Pedro Kertzman & Kees Pouw)
47:24
47:24
Na później
Na później
Listy
Polub
Polubione
47:24Ever wonder how top security teams stay one step ahead of cybercriminals? The answer lies in the ancient wisdom of Sun Tzu: "If you know yourself and know your enemy, you'll win all battles." This principle forms the foundation of effective Cyber Threat Intelligence (CTI). To celebrate our 10th episode, we had an insightful conversation with Kees P…
…
continue reading

1
Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology
20:46
20:46
Na później
Na później
Listy
Polub
Polubione
20:46Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech comp…
…
continue reading

1
Season 1 - Episode 9 (Pedro Kertzman & Scott Scher)
56:10
56:10
Na później
Na później
Listy
Polub
Polubione
56:10What happens when traditional intelligence methodology meets modern cybersecurity? Scott Scher, CTI Associate Director with expertise in nation-state threat actors and cybercriminal groups, reveals a powerful perspective: successful CTI professionals are intelligence analysts first and cybersecurity specialists second. Drawing from his background i…
…
continue reading

1
Digital Turbine's Vivek Menon on AI Acceleration vs Attack Expansion
5:16
5:16
Na później
Na później
Listy
Polub
Polubione
5:16The security industry's obsession with cutting-edge threats often overshadows a more pressing reality: the vast majority of organizations are still mastering basic AI implementation. Vivek Menon, CISO & Head of Data at Digital Turbine, brings his insights from the RSA expo floor to share why the agentic AI security rush may be premature, while high…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Na później
Na później
Listy
Polub
Polubione
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading

1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Na później
Na później
Listy
Polub
Polubione
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading

1
Season 1 - Episode 8 (Pedro Kertzman & Ritu Gill)
29:20
29:20
Na później
Na później
Listy
Polub
Polubione
29:20The digital world is full of breadcrumbs that tell our stories - are you carefully tracking who follows them back to you? In this eye-opening conversation with OSINT expert Ritu Gill, we pull back the curtain on the fascinating world of Open Source Intelligence and why proper tool vetting matters more than you might think. Drawing from her 18 years…
…
continue reading

1
GigaOm’s Howard Holton on Why AI Will Be the OS of Security Work
8:43
8:43
Na później
Na później
Listy
Polub
Polubione
8:43The cybersecurity industry has witnessed numerous technology waves, but AI's integration at RSA 2025 signals something different from past hype cycles. Howard Holton, Chief Technology Officer at GigaOm, observed AI adoption across virtually every vendor booth, yet argues this represents genuine transformation rather than superficial marketing. His …
…
continue reading

1
Online Business Systems' Jeff Man on PCI 4.0's Impact
8:31
8:31
Na później
Na później
Listy
Polub
Polubione
8:31The cybersecurity industry has long operated on fear-based selling and vendor promises that rarely align with practical implementation needs. Jeff Man, Sr. Information Security Evangelist at Online Business Systems, brings a pragmatic perspective after years of navigating compliance requirements and advising organizations from Fortune 100 enterpris…
…
continue reading

1
Trellix's John Fokker on Why Ransomware Groups Are Fragmenting
10:51
10:51
Na później
Na później
Listy
Polub
Polubione
10:51The criminal underground is experiencing its own version of startup disruption, with massive ransomware-as-a-service operations fragmenting into smaller, more agile groups that operate like independent businesses. John Fokker, Head of Threat Intelligence at Trellix, brings unique insights from monitoring hundreds of millions of global sensors, reve…
…
continue reading

1
Frost & Sullivan's Martin Naydenov on AI's Cybersecurity Trust Gap
6:14
6:14
Na później
Na później
Listy
Polub
Polubione
6:14In this special RSA episode of Future of Threat Intelligence, Martin Naydenov, Industry Principal of Cybersecurity at Frost & Sullivan, offers a sobering perspective on the disconnect between AI marketing and implementation. While the expo floor buzzes with "AI-enabled" security solutions, Martin cautions that many security teams remain reluctant t…
…
continue reading

1
Season 1 - Episode 7 (Pedro Kertzman & John Doyle)
53:34
53:34
Na później
Na później
Listy
Polub
Polubione
53:34What does the future of Cyber Threat Intelligence look like beyond basic feeds and reports? Former CIA analyst John Doyle takes us behind the curtain of modern CTI operations, revealing how smart teams are delivering value across entire organizations. With over 16 years tracking state-sponsored APT groups and now serving as a principal intelligence…
…
continue reading

1
Unspoken Security’s AJ Nash on Protecting Against AI Model Poisoning
15:32
15:32
Na później
Na później
Listy
Polub
Polubione
15:32In our latest episode of The Future of Threat Intelligence, recorded at RSA Conference 2025, AJ Nash, Founder & CEO, Unspoken Security, provides a sobering assessment of AI's transformation of cybersecurity. Rather than focusing solely on hype, AJ examines the double-edged nature of AI adoption: how it simultaneously empowers defenders while dramat…
…
continue reading

1
Cyware’s Jawahar Sivasankaran on Automating Threat-Centric Operations
8:53
8:53
Na później
Na później
Listy
Polub
Polubione
8:53In this special RSA 2025 episode of The Future of Threat Intelligence, David speaks with Jawahar Sivasankaran, President of Cyware, about their partnership with Team Cymru to democratize threat intelligence. Jawahar outlines how their CTI program in a box approach enables organizations to implement comprehensive threat intelligence capabilities in …
…
continue reading

1
Season 1 - Episode 6 (Pedro Kertzman & Aaron Roberts)
1:11:44
1:11:44
Na później
Na później
Listy
Polub
Polubione
1:11:44What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of "Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers," reveals the powerful intersection where these disciplines meet. Aaron's jo…
…
continue reading

1
Rapid7’s Lonnie Best on Measuring SOC Success Beyond Alert Closures
21:25
21:25
Na później
Na później
Listy
Polub
Polubione
21:25In a world obsessed with cutting-edge security technology, Lonnie Best, Senior Manager of Detection & Response Services at Rapid7, makes a compelling case for mastering the fundamentals. After transitioning from craft beer journalism through nuclear security to cybersecurity, Lonnie witnessed the evolution of ransomware attacks from "spray and pray…
…
continue reading

1
Season 1 - Episode 5 (Pedro Kertzman & Josh Darby MacLellan)
43:21
43:21
Na później
Na później
Listy
Polub
Polubione
43:21What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals. The conversation opens with Josh's unexpected path into threat intelligence, highlighting a crucial rev…
…
continue reading

1
Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities
28:27
28:27
Na później
Na później
Listy
Polub
Polubione
28:27From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. In this no-holds-barred conve…
…
continue reading

1
Season 1 - Episode 4 (Pedro Kertzman & Cherie Burgett)
38:20
38:20
Na później
Na później
Listy
Polub
Polubione
38:20Cherie Burgett takes us on a fascinating journey from her days as a Radio Shack employee and avid gamer to becoming the Director of Cyber Intelligence Operations for the Mining and Metals Information Sharing and Analysis Center. Her story demolishes the myth that cybersecurity professionals must follow traditional career paths, demonstrating how li…
…
continue reading

1
Option Care’s Jill Rhodes on Uniting Legal Expertise and Cybersecurity in Healthcare
28:39
28:39
Na później
Na później
Listy
Polub
Polubione
28:39Jill Rhodes, SVP & CISO at Option Care Health, shares her unconventional journey from international development lawyer stationed in Bolivia and Moscow to healthcare leader, where she built the security program from the ground up as the organization's first CISO. Jill outlines for David how a transformative assignment at an intelligence agency spark…
…
continue reading

1
Season 1 - Episode 3 (Pedro Kertzman & Pedro Barros)
32:07
32:07
Na później
Na później
Listy
Polub
Polubione
32:07Navigating the world of threat intelligence feeds requires a critical eye and regular evaluation. Security analyst and educator Pedro Barros takes us through his journey from SOC analyst to threat intelligence professional, explaining why CTI should function as a pillar supporting all cybersecurity operations. Pedro highlights a persistent problem …
…
continue reading

1
Silverado Policy Accelerator’s Dmitri Alperovitch on Hunting Intruders After They're Already In
28:00
28:00
Na później
Na później
Listy
Polub
Polubione
28:00In this episode of The Future of Threat Intelligence, Dmitri Alperovitch, Co-founder & Executive Chairman at Silverado Policy Accelerator and Author of World on the Brink: How America Can Beat China in the Race for the 21st Century, delivers a stark warning about the second Cold War with China that's unfolding, from military and nuclear arms races …
…
continue reading

1
Season 1 - Episode 2 (Pedro Kertzman & A. Stryker)
47:28
47:28
Na później
Na później
Listy
Polub
Polubione
47:28Threat intelligence forms the backbone of effective cybersecurity strategy, but what does it really take to build a successful CTI program? In this fascinating conversation, Stryker, a threat intelligence analyst at a major US insurance company, challenges conventional wisdom by asserting that while every organization needs threat information, not …
…
continue reading

1
Directions on Microsoft’s Wes Miller on Harmonizing Microsoft's Security & Identity Tools
24:28
24:28
Na później
Na później
Listy
Polub
Polubione
24:28What happens when Microsoft's on-premises security falls behind while cloud innovation accelerates? In this episode of The Future of Threat Intelligence, Wes Miller, Research Analyst for Microsoft Identity, Security, and Management at Directions on Microsoft, pulls back the curtain on Microsoft's fragmented security landscape. Having survived the h…
…
continue reading

1
Wikistrat’s Jeffrey Caruso on New Methods in Cyber-Physical Attacks
25:20
25:20
Na później
Na później
Listy
Polub
Polubione
25:20In this episode of The Future of Threat Intelligence, Jeffrey Caruso, Senior Analyst at Wikistrat & Author of Inside Cyber Warfare, shares examples of how teams with minimal budgets achieved kinetic effects through OT system manipulation — from destroying missile research facilities to compromising subway systems and burning down FSB-affiliated ban…
…
continue reading

1
Season 1 - Episode 1 (Pedro Kertzman & Mary D'Angelo)
29:05
29:05
Na później
Na później
Listy
Polub
Polubione
29:05On this episode of Season 1, our Host Pedro Kertzman will chat with Mary D’Angelo, who is a Cyber Threat Intelligence Solutions Lead at Filigran, dedicated to helping organizations integrate actionable threat intelligence across silos. She emphasizes the need for a top-down cultural shift to demonstrate threat intelligence’s ROI to executives. Focu…
…
continue reading

1
Rapid7’s Deral Heiland on Why Your Network Segmentation Strategy Overlooks IoT Risk
29:31
29:31
Na później
Na później
Listy
Polub
Polubione
29:31Deral Heiland’s research has uncovered critical vulnerabilities across the IoT spectrum, from office printers to medical devices, revealing how seemingly isolated devices can compromise entire networks. In one investigation, he discovered active credentials for five major hospital systems still present on secondhand medical equipment. With extensiv…
…
continue reading

1
IDC's Frank Dickson on Moving from Reactive to Proactive Security Strategy
31:51
31:51
Na później
Na później
Listy
Polub
Polubione
31:51What happens when you combine market research expertise with cybersecurity strategy? On this episode of The Future of Threat Intelligence, Frank Dickson, Group VP of Security & Trust at IDC, shares his journey from market research to leading a team of 20 cybersecurity analysts advising organizations on security strategy. Frank walks David through t…
…
continue reading

1
ISG's Jeff Orr on Moving Beyond Perimeter Defense to Dynamic Security
29:33
29:33
Na później
Na później
Listy
Polub
Polubione
29:33Jeff Orr, Director of Research & IT Technologies at ISG, brings over three decades of technology experience to his discussion with David about transforming enterprise security approaches. On this episode of The Future of Threat Intelligence, Jeff shares his explanation for why traditional security investments focused primarily on protection are lea…
…
continue reading

1
Meta's Oded Anderman on Preventing Unauthorized Data Collection
20:42
20:42
Na później
Na później
Listy
Polub
Polubione
20:42Where is the balance between data accessibility and protection in today's interconnected digital landscape? Oded Anderman, Privacy Lead at Meta, has plenty of insights on this question and more from his journey from financial services to protecting user data at one of the world's largest social platforms. His conversation with David on this episode…
…
continue reading