Security Intelligence Podcast artwork

Security Intelligence Podcast

189 episodes - English - Latest episode: over 3 years ago - ★★★★★ - 34 ratings

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

Technology
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

How IBM Fellow and Master Inventor Rhonda Childress Learned to Thrive Outside Her Comfort Zone

September 20, 2018 12:12 - 19 minutes - 18 MB

Rhonda Childress has earned more than her share of "firsts" over her 25 year IBM career: She was the first woman in IBM Security to become an IBM Fellow as well as the first woman in IBM Services to be named an IBM Master Inventor. Rhonda is a force to be reckoned with, and these day she's using her influence to help inspire the next generation of women in the security industry. Today, she joins the podcast to share her story and remind us all of a simple but inconvenient fact: growth and c...

How a Stakeholder Analysis Improves Communication During a Cybersecurity Incident

September 13, 2018 11:30 - 24 minutes - 22.5 MB

When a cyber crisis hits, your communication strategy can make or break your company's fate. Loren Dealy Mahler, president and founder of Dealy Mahler Strategies, returns to the podcast today to share more of her crisis communications expertise. The topic this time around is stakeholder analysis. In the wake of a data breach or other security incident, who needs to know? What do they need to know? When? And how? The list of questions goes on, but fortunately Loren and IBM Security's Mitch Ma...

X-Force Red In Action 007: Spotlight on Smart Cities with Daniel Crowley

September 06, 2018 11:35 - 18 minutes - 16.6 MB

Have you ever wanted to be a supervillain? When X-Force Red research baron Daniel Crowley and his team set out test a variety of smart city devices, their explicit goal was to discover what types of “supervillain-level” attacks might actually be possible. Fresh from a standout presentation at Black Hat, Crowley joins the podcast today to discuss the results of his research (spoiler: they found more than a dozen vulnerabilities!) and offer recommendations for both manufacturers and users of s...

Healthcare Security Trends to Watch in the Second Half of 2018

August 30, 2018 11:21 - 22 minutes - 20.4 MB

Healthcare organizations reported more cyberthreats in the second quarter of 2018 than in the first, and July 2018 may be the worst month on record for the industry. Jennifer Kady, IBM's director of security solutions specializing in healthcare, has spent years working with chief medical and healthcare security officers and has a deep knowledge of industry concerns. In this episode, she identifies 3 key security trends for healthcare enterprises and offers actionable recommendations for impr...

X-Force Red In Action 006: Spotlight on ATM Testing with David 'VideoMan' Bryan

August 20, 2018 12:08 - 11 minutes - 10.1 MB

With ATM fraud dominating the headlines, David "VideoMan" Bryan — X-Force Red global leader of technology — joins the podcast to talk about the need for improved ATM security and how his team is prepared to help. To learn more about ATM security and the brand new X-Force Red ATM testing practice, visit https://ibm.co/2nTLFHY, and make sure to listen to all the past episodes of X-Force Red in Action at http://bit.ly/2PlDfFw.

How IBM Master Inventor Mike Spisak is Hacking Cybersecurity Education and the Diversity Gap

August 16, 2018 13:32 - 21 minutes - 19.5 MB

"Do you know who Tony Stark is? Do you know who Iron Man is? Would you be interested in having a Tony Stark-like experience with your computer?" These are the questions that led IBM Master Inventor Mike Spisak – and his 11 year old son Evan – to begin the development of Havyn, a voice-enabled digital assistant for cybersecurity analysts that uses Watson technology. But Mike’s many professional achievements are not the subject of this podcast. Instead, he and Heather Ricciuto, academic outr...

Gain an Edge Over BEC and Account Compromise With Intelligent Incident Response and X-Force IRIS

August 07, 2018 13:48 - 12 minutes - 11.8 MB

As Black Hat heats up in Las Vegas, Nick Rossmann and Jordan Rogers of IBM X-Force Incident Response and Intelligence Services (IRIS) join the podcast to discuss the hottest threats in today's security landscape and the critical advantage of intelligent incident response. To learn more, register for the webinar, "5 Ways X-Force IRIS Can Help You Manage Your Incident Response Strategy" [https://ibm.co/2nhuKP9] and visit the X-Force IRIS homepage: https://ibm.co/2L421re.

X-Force Red in Action 005: Global Head Charles Henderson Announces X-Force Red Labs

August 06, 2018 11:59 - 20 minutes - 18.9 MB

"Hacking anything to secure everything." X-Force Red is rolling out its new mission statement just in time for Black Hat. Global partner and team lead Charles Henderson joins the podcast live from Las Vegas for a special conversation about the team's plans for Black Hat and DEF CON this week — and to make a couple announcements you won't want to miss. Listen now to learn about the latest steps IBM X-Force Red is taking to secure the world's IoT, IIoT and OT devices from development to launc...

DTCH 010: Fight the Spear Phishing Plague with a Strong Security Culture

August 02, 2018 15:33 - 16 minutes - 14.8 MB

Bubonic plague, influenza… spear phishing? In today’s episode, cyber risk strategist Chris "Dr. InfoSec" Veltsos and cybersecurity expert and attorney Paul Ferrillo return to the podcast to discuss whether spear phishing has reached epidemic proportions. They also tackle the importance of identity access management (IAM) solutions and the benefits of user behavior analytics (UBA). To learn more, check out the blog, “Identity is the New Perimeter” [https://ibm.co/2vsxUTZ] and read about IBM...

X-Force Red In Action 004: Spotlight on the Next Generation of Offensive Security Specialists

July 31, 2018 11:25 - 12 minutes - 11.9 MB

Be honest. After listening the first few episodes of the X-Force Red in Action series, are you wondering what it would be like to join the team? If so, you're not alone — and you're also in luck! Today, host Anshul Garg goes behind the scenes with 4 of X-Force Red's 2018 summer interns to discover what it's like working side by side with the industry's top offensive security experts. To learn more about X-Force Red, visit ibm.com/xforcered. And don't miss the team at Black Hat and DEF CON i...

Boost Energy and Utilities Security by Reducing SOC Complexity

July 26, 2018 12:23 - 8 minutes - 7.33 MB

Threat actors today are finding new ways to exploit industrial control (ICS) and supervisory control and data acquisition (SCADA) systems that often lack robust security controls — and the consequences could be catastrophic. On this episode, Kate Scarcella, executive security architect at IBM, discusses emerging trends and critical next steps to defend energy environments. To learn more about how IBM Security provides fast, integrated and efficient solutions for your industry, visit https:/...

Larry Ponemon Goes Behind the Scenes of the 2018 Cost of a Data Breach Study

July 24, 2018 13:12 - 26 minutes - 24.3 MB

The 2018 Cost of a Data Breach Study from Ponemon Institute, released earlier this month, breaks down precisely what lost and stolen records could cost companies this year. So, there's no better time to chat with Dr. Larry Ponemon, founder of the Ponemon Institute, about historical highlights of the annual study, how things have changed in the last decade, and what's next for corporate data breaches and cybersecurity overall. To learn more, read the blog [https://ibm.co/2v8MnV1] and downlo...

X-Force Red in Action 003: Spotlight on Penetration Testing with Space Rogue

July 19, 2018 11:39 - 16 minutes - 15.3 MB

When Space Rogue testified before Congress in 1998 as part of activist group L0pht Heavy Industries, he never expected to work for IBM. And yet, that's just where he finds himself today — and he couldn't be happier. Space Rogue, a.k.a. Cris Thomas, joins the X-Force Red in Action podcast this week to talk about everything from penetration testing to Black Hat 2018 to his extensive sticker collection. To learn more about the team and their adventures in offensive security, visit ibm.com/xfor...

How Can Companies Bridge the Data Risk Divide? Go Back to Basics

July 12, 2018 12:36 - 16 minutes - 15.4 MB

Forrester analyst Heidi Shey joins IBM Security's Dan Goodes and Ken Brisco for a conversation about the challenges of secure data management. Listen in as Shey and Goodes share their thoughts on how to make data risk management a priority within the C-suite, how to recognize the symptoms of poor data risk management, and how to use data risk management to meet compliance requirements. To learn more, read the complete Forrester report, "Is Your Company In Peril If Critical Data Is Breache...

Fight Back with the X-Force IRIS Cyberattack Preparation and Execution Frameworks

July 10, 2018 12:33 - 16 minutes - 14.7 MB

Cyberattack preparation takes center stage on today’s podcast. Listen in as global security intelligence analyst Alexandrea Berninger zooms in on IBM X-Force Incident Response and Intelligence Services' (IRIS) new cyberattack preparation and execution frameworks. To learn more, visit X-Force IRIS homepage [https://ibm.co/2L421re], read the SecurityIntelligence article [https://ibm.co/2m7FEXf] and download the interactive white paper [https://ibm.co/2NBX6iS].

X-Force Red In Action 002: Spotlight on Hardware Testing with Ivan Reedman

July 05, 2018 11:40 - 19 minutes - 17.9 MB

Have you ever nearly blown up your home while attempting to hack a smart washing machine? Ivan Reedman, global hardware security and capability development lead at IBM X-Force Red, has — and his wife isn't letting him forget it. In this second episode of the X-Force Red in Action series, Reedman, who’s known as “the Toymaker” among his colleagues, discusses his passion for creating hardware-based tools to compromise physical devices. X-Force Red is an autonomous organization within IBM Secu...

The State of the CISO and the Board — A Panel of Security Leaders Weighs In

June 28, 2018 12:19 - 12 minutes - 11.3 MB

Curious about the threats and challenges keeping CISOs up at night? In this podcast, security leaders from a range of IBM business partners, including Cisco Systems, Carbon Black, Fortinet, Palo Alto Networks and VMware, share their thoughts on the evolving role of chief information security officers (CISOs) in meeting the key security challenges of both today and tomorrow. To watch the video, "How Unlikely Pairings Work for Collaborative Defense," visit http://bit.ly/2MwR029.

How Hacker Highschool and IBM Security are Inspiring the Next Generation of Defensive Hackers

June 26, 2018 12:28 - 22 minutes - 20.2 MB

Do you know a teenager looking for a way to fill his or her time this summer? Pete Herzog, managing director at the Institute for Security and Open Methodologies (ISECOM) and co-founder of Hacker Highschool, recommends a crash course in hacking. In this podcast, Herzog joins IBM’s David Jarvis and Heather Ricciuto to talk about why cybersecurity awareness and hacking skills are critical for today’s youth. To visit the new Hacker Highschool lesson on defensive hacking, developed in coordin...

X-Force Red in Action 001: Spotlight on IoT Security with Thomas MacKenzie

June 21, 2018 14:30 - 25 minutes - 23 MB

Hacking a smart toilet is more than just fun and games. With that pronouncement, we welcome you to the inaugural episode of the X-Force Red in Action podcast series! In this series, IBM Security’s Anshul Garg will talk with the security industry's top penetration testers about the work they're doing and the trends and developments that excite them. In today's episode, Thomas MacKenzie, European associate partner at X-Force Red, looks at the growing impact of Internet of Things (IoT) secur...

Why Financial Services Shouldn't Overlook the Digital Trust Investment

June 14, 2018 10:25 - 11 minutes - 10.7 MB

Financial services remain a top target for cyberattacks as we head into the second half of 2018. While organizations understand the need for better protection, many struggle to articulate ideal spending strategies. In this podcast, Lauren Jensen, host and worldwide industry marketing lead at IBM Security, sits down with Matt Konwiser, first-line manager in the North American financial sector at IBM, to discuss the emerging role of digital trust as the new foundation of financial cybersecurit...

Can the Girl Scouts STEM the Skills Gap?

June 07, 2018 13:10 - 26 minutes - 24.5 MB

Could the Girl Scouts' new science, technology, engineering and mathematics (STEM) badge program help stem the information security gap? Listen in as Kymberly Miller, Senior Director of Program at Girl Scouts of Northern California and Jean Fahy, STEM Program Director at Girl Scouts of Northern California, talk with IBM Security's Mitch Mayne and Heather Ricciuto about a new Girl Scouts' program that offers 23 badges for STEM-related activities, including cybersecurity. To make a donation ...

Cisco and IBM Security: Partnering to Provide Integrated Threat Defense

May 31, 2018 16:50 - 17 minutes - 16.1 MB

With overlapping areas of interest, why should IBM Security and Cisco Security collaborate rather than compete? In this podcast, Dov Yoran, senior director of strategy and business development at Cisco Security, talks with IBM Security’s George Mina and Mitch Mayne about the need for strong partnerships in an infosec landscape that’s more complex than ever. Resources: Attend the June 15 Webinar, Cisco Security Integrations with IBM QRadar SIEM & IBM Resilient: http://bit.ly/2LJsQlf. Download...

DTCH 009: What's The Best Defense Against Cyberattacks? You Are

May 24, 2018 12:26 - 17 minutes - 16.3 MB

Episode 9 of the "Deciphering Today's Cyber Headlines” series. For past episodes in this series, visit https://ibm.co/2rZ6gzt. Paul Ferrillo, Chris Veltsos and Mitch Mayne are back, and this time they're offering up a surprising solution to defend against cyberattacks: the organization's entire workforce. And yes, that includes YOU. RESOURCES: Listen to the “Five Data Types to Consider When Conducting a Risk Assessment” podcast: https://ibm.co/2C6T93v. Listen to the “Social Engineering 101:...

[Encore] What You Need To Know About Data Encryption Right Now

May 17, 2018 13:26 - 16 minutes - 15.4 MB

With mere days left until GDPR (General Data Protection Regulation) comes into force, now is the perfect time to revisit our December 2017 podcast on data encryption. Whether you’re working toward GDPR compliance, considering cloud migration or just looking for best practices to get encryption right, take 16 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white pa...

Cloud Data Security Trends, Challenges and Best Practices

May 10, 2018 12:20 - 20 minutes - 18.7 MB

Whether a company is deploying to a public, private, hybrid or even multi-cloud scenario, one of the most common concerns is protecting the sensitive or business critical data that resides there. In this podcast, IBM Security Data Security Product Marketing Manager Grace Murphy speaks with Heidi Shey, Senior Analyst at Forrester Research, about how organizations should face the challenges of cloud transformation in the context of competing priorities. To learn more, read the interactive whi...

[Encore] A Salute To Our Teachers And Mentors

May 08, 2018 13:00 - 13 minutes - 12.1 MB

It’s once again National Teacher Appreciation Week in the United States! In celebration of all our most memorable teachers and mentors, we’re replaying a special podcast from last year. Listen now to hear IBM Security subject matter experts Limor Kessem, Pam Cobb and Neil Jones reflect on the teachers who shaped their young minds or guided them on the path to their current careers. Visit https://securityintelligence.com/ to read the latest security content from all the IBM experts.

Sneak Peek: The Transformative Power of GDPR for People and Business

May 03, 2018 14:18 - 18 minutes - 17.4 MB

Just 3 weeks remain until the General Data Protection Regulation (GDPR) takes effect. In this week's podcast, IBM experts Cindy Compert and David Jarvis discuss the state of GDPR compliance and offer advice to help organizations use the remaining weeks to prepare most effectively. To learn more, attend the May 22 webinar, "The Transformative Power of GDPR for People and Business." Register now: https://ibm.co/2KxDqv2.

AI is Changing the Game in Digital Trust — Are You Keeping Up?

April 26, 2018 12:29 - 18 minutes - 16.5 MB

Does the future of digital trust lie in artificial intelligence (AI)? Join Andras Cser, Vice President, Principal Analyst Serving Security & Risk Professionals at Forrester, to discover how AI is changing the landscape of digital identity. You'll also learn why organizations are relying on identity trust as a the foundation of the digital customer journey and how to stay ahead of evolving fraud attacks. Visit https://ibm.co/2FgqohD to learn more about detecting digital identity fraud.

[Encore] Peeling Back The Onion On Threat Hunting

April 19, 2018 11:59 - 17 minutes - 16.3 MB

This podcast was originally broadcast in November 2017. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn more, read Eric's Security Intelligence blog series on threat hunting [ibm.co/2hQ535Y] and follow both Bob [bit.ly/2haHdAX] and Eric [bit.ly/2znGgNX] on Twitter.

Social Engineering 101: How to Hack a Human

April 12, 2018 12:58 - 22 minutes - 20.6 MB

In this podcast, IBM Senior Security Architect Joe Gray outlines the basics of social engineering, including what it is, why it can be so dangerous and what companies can do protect themselves, their employees and their assets. Listen now for a firsthand account of Joe's vast experience with Open Source Intelligence (OSINT) collection and social engineering. For more from Joe, attend his RSA Conference session, "Compromising a Fortune 500 Business without Hacking a Thing!" at 9:15 a.m. on A...

Millennials, Baby Boomers and the Future of Identity

April 03, 2018 13:34 - 12 minutes - 11.9 MB

IBM's recently released "Future of Identity Study" reveals global and generational preferences on authentication. Among the study's many interesting findings, it was discovered that consumers of different generations have different preferences on authentication and take substantially different approaches to cybersecurity overall. IBM Security's Dillon Townsel recently interviewed Payton, a 24 year-old community manager, and Susan, a 68 year-old grandmother and retired schoolteacher about th...

Collaboration: The Secret to More Effective Security

March 27, 2018 12:10 - 14 minutes - 13.1 MB

In the world of cybersecurity, collaboration is much more than a buzzword. In this podcast, Mitch Mayne, Public Information Officer for IBM X-Force Exchange, talks with George Mina, Program Director of IBM Security Strategic Alliances, about the importance of collaboration among different security products and even between different security vendors. To learn more about collaborative defense in depth, read this recent blog: https://ibm.co/2GgyNTR. To view the IBM Security App Exchange, vis...

How to Ensure That Your Cybersecurity Project Stays on Track

March 20, 2018 12:09 - 14 minutes - 13 MB

When it comes to cybersecurity, there's no such thing as a simple project. There's also no "one size fits all" approach. In this podcast, IBM Security consultants Katrina Avila and Vanja Kulic address these challenges head-on and offer actionable tips for keeping your cybersecurity project on track. To learn more, visit https://www.ibm.com/security or listen to our 6-part podcast series, "A CISO’s Guide to Obtaining Budget" [https://ibm.co/2pqJc95].

Eric Cole and Shira Rubinoff Get Excited for IBM Think 2018

March 13, 2018 17:08 - 11 minutes - 10.6 MB

IBM Think 2018 kicks off in Las Vegas on March 19 — less than a week from now. In this short podcast, Eric Cole [http://bit.ly/2znGgNX] and Shira Rubinoff [http://bit.ly/2p88U1O] discuss why they’re excited to attend Think, what sessions they’re most looking forward to and what hot trends and topics they expect to dominate the conversation. For more Think content, visit https://ibm.co/2FB8KKz or register to attend at https://ibm.co/2p8HoRM and save $300 with promo code TK18SECCOM.

Take the Risk: New IBMer Bridgette Pepper Begins Her Cybersecurity Journey

March 06, 2018 14:05 - 22 minutes - 20.7 MB

As we approach International Women’s Day on March 8, Bridgette Pepper joins IBM Security Academic Outreach Leader Heather Ricciuto to discuss her unexpected entrance into the cybersecurity field and her experience first as an IBM intern and now as a full-time team member. Bridgette’s passion for both security and for bringing greater gender diversity to the industry shine through her story and offer inspiration to other girls and women interested in pursuing security careers. To hear more...

The Future of Identity: Examining Authentication Practices in Asia-Pacific and Beyond

February 27, 2018 13:26 - 15 minutes - 13.9 MB

In order to better understand the latest trends in consumer identity protection, IBM Security recently commissioned a global research study to learn more about consumers' views on passwords, biometrics and multifactor authentication. In this podcast, Trilochan Sehgal, IBM Security's APAC Segment Leader for Identity and Access Management, discusses the survey's results and what these findings mean for both consumers and enterprises in the Asia-Pacific region and beyond. Download the complete...

Five Data Types To Consider When Conducting A Risk Assessment

February 20, 2018 14:47 - 24 minutes - 22 MB

Following the enthusiastic response to their "Get Smarter About Disaster Response — Five Resolutions For 2018" [https://ibm.co/2mc4tAP], Mitch Mayne and Loren Dealy Mahler are back to take a more in-depth look at the first resolution on their list: conducting a risk assessment. Listen now to learn about the five distinct data types your enterprise may hold or interact with and why performing an effective risk assessment means widening your lens to view how a data breach might affect your org...

Data Risk Management In 2018: What to Look For and How to Prepare

February 15, 2018 13:47 - 20 minutes - 19 MB

If you're looking to bring greater awareness to data risk management practices within your organization and among your C-suite, don't miss this podcast, moderated by Paula Musich, of Enterprise Management Associates, and featuring Dan Goodes and Nev Zunic, both of IBM Security. To learn more about data risk management, read Paula’s 3 part blog series, What Data Risk Management Means for the Enterprise in 2018: https://ibm.co/2EumodN.

Closing the Gender Gap in Cybersecurity: Girls Can't Be What They Can't See

February 08, 2018 15:07 - 15 minutes - 20.6 MB

Heather Ricciuto, Academic Outreach Leader at IBM Security, joins the podcast today to discuss why women are vastly underrepresented in the cybersecurity industry. She also shares examples of the programs and initiatives IBM runs and supports to help close the gender gap. To apply for the Women in Cybersecurity Seminar for College Women, taking place Feb. 15 in Dallas, TX, please send your resume and a cover letter to Heather at [email protected]. To learn more about the 5th annual Women i...

What You Need to Know about the Changes to the Australian Privacy Act

February 01, 2018 09:41 - 19 minutes - 27 MB

Beginning on Feb. 22 of this year, new data breach and response amendments to the Australia Privacy Act will impact thousands of organizations in Australia and around the world. In this podcast, Chris Hockings, Chief Technology Officer and Master Inventor for IBM Security Australia New Zealand, talks about the implications of the changes to the Privacy Act in Australia, how organizations can prepare, and what steps they can take to build a best practice incident response plan. To learn mor...

DTCH 08 The 2018 Cybersecurity State of the Union

January 30, 2018 14:35 - 20 minutes - 28.5 MB

Episode 8 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Just in time for the US president's annual State of the Union address, Paul and Chris are back to deliver a cybersecurity state of the union. Listen now to discover why Paul is pessimistic, why Chis is optimistic, and what two pieces of advice they'd each give C-level executives planning for 2018. RESOURCES: Read Chris' blog on NACD’s 2018 Governance Outlook: https://ibm...

Avoiding Common Data Security Mistakes: A Conversation with IDC's Rob Westervelt

January 23, 2018 13:36 - 28 minutes - 39 MB

Is your enterprise falling victim to one of the top data security mistakes? In this podcast Rob Westervelt, Research Manager within IDC’s Security Products group [http://bit.ly/2F7QMe1], talks with IBM Security’s Leslie Wiggins about trends in data security, the biggest mistakes today’s organizations are making and, perhaps most importantly, how to avoid common data security pitfalls. To learn more, read the recent blog, "Five Epic Fails in Data Security: Do You Know How to Avoid Them?" [h...

Let’s Think Together: A New Take on the Security Conference Experience

January 16, 2018 10:51 - 19 minutes - 18 MB

Think, IBM’s new premier conference, will take place March 19-22 in Las Vegas, NV. In this podcast, Mitch Mayne and Pam Cobb discuss how Think differs from previous IBM events and preview what participants can expect to experience (innovation speakers, client stories, demos, technical deep dives, guided and open labs, user groups) and achieve (product certifications and more). Read Pam's blog [https://ibm.co/2B4ymZe] for even more event details, and don't forget to register to attend [http...

Get Smarter About Disaster Response — Five Resolutions For 2018

January 09, 2018 13:50 - 34 minutes - 47 MB

In our first podcast of 2018, IBM X-Force Exchange Public Information Officer and frequent host Mitch Mayne talks with Loren Dealy Mahler, president and founder of Dealy Mahler Strategies [http://bit.ly/2Dbq9Fo], about the one thing that always seems to go wrong during a data breach: Communications. Listen now to their list of five New Year's resolutions that C-level executives should embrace in order to improve their incident response strategies in 2018. To read more from Loren, visit http...

New Year, New Threats: 5 Security Predictions That Will Take Hold in 2018

December 14, 2017 12:07 - 16 minutes - 15.4 MB

Wondering what lies ahead for cybersecurity in 2018? In this podcast Caleb Barlow, VP of Threat Intelligence at IBM Security, discusses the top 5 security predictions that emerged from a recent poll of the IBM X-Force experts. The list includes AI vs. AI battles and a new plague of ransomware, but you'll have to tune in to hear the rest. Listen now and leave a comment letting us know which predictions you agree with and what additional trends you expect to see in the new year. And if you...

What You Need to Know about Data Encryption Right Now

December 12, 2017 12:23 - 16 minutes - 15.5 MB

Data encryption does not need to be difficult, but there's admittedly more to it than just turning on the encryption faucet. If you’re working toward GDPR readiness, considering cloud migration or just looking for best practices to get encryption right, take 13 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intel...

[Encore] TBC 09: Don’t Abandon Ship Just Yet

December 07, 2017 14:33 - 19 minutes - 18.2 MB

In episode 9, Paul Ferrillo and Chris Veltsos conclude the “Take Back Control of Your Cybersecurity Now” podcast series with predictions about the future of cybersecurity. In addition to returning to some of their favorite subjects, such as cognitive computing and the NIST Cybersecurity Framework, they also share their thoughts on cloud security and the Internet of Things (IoT). For more insights from Paul and Chris, listen to their ongoing follow-up podcast series, “Deciphering the Cyber He...

[Encore] TBC 08: If You Can't Measure It, You Can't Manage It

December 06, 2017 12:18 - 17 minutes - 15.8 MB

In episode 8 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos talk metrics and reporting. Listen now to learn how to translate numbers into meaningful cyber risks that boards of directors will understand and feel confident to act on. Come back tomorrow for the final episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. You can also re-listen or find any episodes you missed at http://bit.ly/2B4ZyLY.

[Encore] TBC 07: Have A Plan, Practice It And Then Practice It Again

December 05, 2017 12:03 - 13 minutes - 12.2 MB

In episode 7 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos emphasize the importance of incident response. The goal of cybersecurity was once to build enough walls to keep out attackers, but in more recent years the focus has shifted to detecting bad guys already inside the network. This change has elevated the status of incident response teams and crisis management planning. Come back tomorrow for the next episode in this 9-part series, ...

[Encore] TBC 06: Lessons from the NIST Cybersecurity Framework

December 04, 2017 12:32 - 16 minutes - 15.3 MB

In episode 6 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos offer recommendations for organizations looking to adopt the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To learn more about the NIST CSF and its five phases, visit bit.ly/2kUpWvo.

Guests

Eric Cole
1 Episode