Security Intelligence Podcast artwork

Security Intelligence Podcast

189 episodes - English - Latest episode: over 3 years ago - ★★★★★ - 34 ratings

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

Technology
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

[Encore] TBC 05: What Makes IBM Watson The Whole Package

December 01, 2017 13:09 - 15 minutes - 13.8 MB

In episode 5 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos discuss why Watson for Cyber Security, with its ability to ingest and understand both structured and unstructured data, is a game changer in the fight against cybercrime. Come back next week for more episodes in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the IBM report on cybersecurity in the cognitive era mentioned during the episode, v...

[Encore] TBC 04: The Cognitive Transformation Is For Everyone

November 30, 2017 13:05 - 26 minutes - 24 MB

In episode 4 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos give substance to buzzwords like artificial intelligence and machine learning and explain why cognitive solutions are a necessity in today's threat landscape. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the Forbes article mentioned during the podcast, visit http://bit.ly/2ll2b0Q. And to read Chri...

[Encore] TBC 03: CISOs, Tell It Like It Is – But in English

November 29, 2017 12:22 - 13 minutes - 11.9 MB

In episode 3 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos discuss how CISOs can be most effective in their internal communications with other C-suite members. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the IBM Institute for Business Value's study on securing the C-Suite, visit http://ibm.co/2jrGYVQ.

[Encore] TBC 02: Directors Are From Mars, CISOs Are From Venus

November 28, 2017 11:59 - 14 minutes - 13.7 MB

In episode 2 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos highlight the role that communication plays in security and offer recommendations for how to bridge the communications gap that too often exists between CISOs and boards of directors. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS.

[Encore] TBC 01: One Hack Away from Disaster

November 27, 2017 12:02 - 23 minutes - 21.4 MB

In episode 1 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos share examples of today’s perilous threat landscape and build a case for why cybersecurity must be a key business priority. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ complete book at http://amzn.to/2xZv2hS.

[Encore] The Hunter Becomes The Hunted — The Value Of Red On Blue Cyber Training

November 21, 2017 16:02 - 10 minutes - 9.39 MB

In this podcast — originally broadcast in August — John Clarke, Jason Flood, Maria Hyland and Trevor McWeeney, all of IBM Ireland, have a spirited conversation about the many benefits of red on blue cyber training. Listen now, and read the accompanying blog [ibm.co/2wodUAD], to learn all about red on blue cyber training, including whether the blue team needs to win in order for the experience to be valuable. You can also download the X-Force research report, "Using Gamification to Enhance S...

DTCH 07: When You Hear the Vultures, It's Too Late: Preparing Your Security Strategy Now

November 14, 2017 13:59 - 19 minutes - 199 MB

Episode 7 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. October 2017 was a scary month for cybersecurity — and Halloween was the least of it. In light of recent attacks like Bad Rabbit, Paul and Chris chose the theme of "changing the game" for this month's podcast. Listen now to learn how businesses like yours can change the dynamic to one where cybersecurity is a business priority rather than an IT afterthought. RESOURCES: R...

Peeling Back the Onion on Threat Hunting

November 07, 2017 15:05 - 17 minutes - 16.3 MB

Have questions about what threat hunting is or how and when to use it? Then this is the podcast you've been waiting for. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn even more, read Eric's recent Security Intelligence blog series [https://ibm.co/2hQ535Y] and follow Bob [http://bit.ly/2haHdAX] and Eric [http://bit.ly/2znGgNX] on...

The World At Risk: Talking E&U Security with the X-Force Research Experts

October 31, 2017 11:55 - 12 minutes - 11.7 MB

In this very timely podcast, Nick Bradley and Michelle Alavarez, both of the X-Force Threat Research team, examine what makes the energy and utility (E&U) industry such an attractive target for attackers. Listen now as they discuss the most notable areas of risk for the E&U sector, why attacks on industrial control systems (ICS) have surged over the past 18 months and where E&U companies should focus their investments and resources when it comes to cybersecurity. To learn more, read the co...

Calling Both Students and Working Professionals! Consider A Career In Cybersecurity

October 24, 2017 13:31 - 20 minutes - 19.1 MB

The shortage of trained cybersecurity professionals, also referred to as the cybersecurity skills gap, is a known problem that is only expected to intensify in the years ahead. In addition to posing a risk to the global economy, the skills gap is also a legitimate security threat. In this podcast, David Jarvis, security and chief information officer (CIO) lead at the IBM Institute for Business Value, talks with Heather Ricciuto, academic outreach leader at IBM Security, and Chris Veltsos, pr...

The Mobility Breakup Hour: From Your Ex To Your Next

October 19, 2017 11:36 - 20 minutes - 19 MB

Security Intelligence is pleased to sponsor this episode of the Mobility Breakup Hour. Listen in as host Rob Patey advises callers on their mobile security woes, ranging from relationships that are no longer fulfilling to those that have devolved into sordid love triangles involving multiple tools and solutions that refuse to communicate with one another. If you're looking for an MDM solution you can call "the one," this is the podcast for you. Listen now, then download the 2017 Gartner Magi...

Quick Take: Vijay Dheap Highlights the Benefits of Cognitive Technology

October 17, 2017 15:43 - 4 minutes - 4.46 MB

This Quick Take podcast features Vijay Dheap, Program Director for Cognitive, Cloud, Analytics at IBM Security. Listen now to learn how cognitive security technologies can solve gaps in information, speed and accuracy. You'll also discover what businesses can expect to achieve when adopting cognitive solutions. To learn more, read Vijay's blog, "IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work" [ibm.co/2x2yPtQ], visit the QRadar Advisor with Watson homepage [ibm...

Cybersecurity Isn't Rocket Science: NCSAM Insights From X-Force Red

October 10, 2017 16:37 - 9 minutes - 8.78 MB

October is National Cyber Security Awareness Month (NCSAM) as well as Halloween season. In honor of this this confluence of events, Space Rogue and Videoman, both of IBM X-Force Red, have come together for a conversation about some scary security blunders and, because we don't want our listeners to have nightmares, some tips for resurrecting your security strategy. To learn more about X-Force Red or to schedule a demo, visit: ibm.co/2wxeb56. Or listen to another podcast on National Cyber Sec...

Quick Take: Bob Stasio Talks Cognitive Security And Threat Hunting

October 05, 2017 12:10 - 3 minutes - 3.28 MB

Have 5 minutes? That’s plenty of time for this episode of Quick Time! Listen now to hear Bob Stasio, Program Director of Cyber Threat Hunting and Analysis at IBM Security, discuss the cognitive security glide path and share his thoughts on the future of cyber threat hunting. To learn more, read Bob’s recent blog on the cognitive security glide path: https://ibm.co/2yKfhuu.

DTCH 06 We're All In This Together: National Cyber Security Awareness Month

October 03, 2017 13:50 - 22 minutes - 223 MB

Episode 6 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. October is National Cyber Security Awareness Month (NCSAM), and this podcast kicks off 4 weeks of Security Intelligence content [https://ibm.co/2hKTBuZ] dedicated to the role we all play in making the internet safer. Listen now to hear a spirited discussion on the various themes of this year's NCSAM campaign, including "Cybersecurity in the Workplace is Everyone’s Busin...

IBM and Senetas: Providing Secure Data Collaboration In An Insecure World

September 28, 2017 14:00 - 13 minutes - 12.3 MB

In this podcast, Julian Fay, CTO of Senetas, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about data protection and secure data collaboration. Listen now to discover the unique capabilities of Senetas' enterprise-grade SureDrop file-sharing platform [http://bit.ly/2xNVtcw], including full encryption, data sovereignty and key management control. You'll also hear about how IBM and Senetas are working together to promote secure d...

[Encore] The 5 Indisputable Facts of IoT Security

September 26, 2017 11:39 - 1 hour - 57.2 MB

For the first time, listen to the complete "5 Indisputable Facts of IoT Security" podcast series from earlier this year as a single hour-long podcast. Fact 1. Devices will operate in hostile environments; Fact 2. Software security will degrade over time; Fact 3. Shared secrets do not remain secret; Fact 4. Weak configurations will persist; Fact 5. As data accumulates, exposure issues will increase. Listen now for the complete insights from our featured panel of IBMers: James Murphy, offe...

[Encore] The Biggest Security Risks In Health Care IT Systems

September 21, 2017 14:24 - 29 minutes - 26.6 MB

Should health care organizations be mandated to have more sophisticated security programs than other industries? Does HIPAA compliance have any security merit? In this podcast Shahid Shah, CEO of Netspective, discusses these and other thought-provoking questions about the state of U.S. health care security with David Chou, Chief Information and Digital Officer at Children's Mercy Hospital in Kansas City, Missouri. To learn more about health care security, visit ibm.co/2ledABQ.

Better Than Mr. Robot: Penetration Testing with X-Force Red

September 19, 2017 13:20 - 11 minutes - 10.8 MB

In this episode of our ongoing series featuring members of the IBM X-Force Red team, North American Regional Lead Steve Ocepek offers a glimpse into the world of elite penetration testing. While he can't reveal all the tricks of the trade, Steve does discuss how the X-Force Red brand has grown and evolved over the past year, what makes an ideal candidate to join the team and why X-Force Red takes a collaborative, team-oriented approach to pen testing. To learn more about X-Force Red or to s...

DTCH 05 Understanding The Media Hacks Of 2017

September 12, 2017 13:28 - 16 minutes - 14.8 MB

Episode 5 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Summer is meant to be a time for blockbuster movies and TV spectaculars, but were hackers the big winner of the 2017 season? In this podcast, Paul and Chris discuss the media hacks of the past few months, emphasizing the role played by third-party vendors. To learn more about how identity and access management solutions can help protect your sensitive data, read the IBM ...

'Cracken' Passwords with EvilMog of IBM X-Force Red

September 05, 2017 14:02 - 8 minutes - 7.81 MB

In this podcast, Dustin Heywood, aka EvilMog, of IBM X-Force Red talks about the latest trends in password hacking. He also discusses his experience creating the Cracken, a powerful password-cracking rig that debuted at Black Hat 2017 and will be used to help organizations discover and defend against cyberattacks. To learn more about X-Force Red or to schedule a demo, visit: ibm.co/2wxeb56. You can also stay up to date by following EvilMog [http://bit.ly/2wBwmZl] and Dillon Townsel [http://b...

A CISO’s Guide To Obtaining Budget: Exploit Pet Projects [6/6]

September 01, 2017 11:53 - 16 minutes - 15 MB

This is episode 6 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit bit.ly/2x0KhZM. In this concluding episode of this series, guest speaker John Dickson, principal and co-founder at Denim Group, focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many s...

A CISO’s Guide To Obtaining Budget: Never Waste A Good Crisis (or Data Breach)[5/6]

August 31, 2017 11:33 - 16 minutes - 15.5 MB

This is episode 5 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit bit.ly/2x0KhZM. Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one's own sector or industry. Today, guest speaker John Dickson, principal and co-founder at Denim Group, looks at how CISOs can take advantage of external breach stori...

A CISO’s Guide To Obtaining Budget: Consciously Cultivating Credibility [4/6]

August 30, 2017 13:25 - 13 minutes - 12 MB

This is episode 4 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit bit.ly/2x0KhZM. Today, guest speaker John Dickson, principal and co-founder at Denim Group, explains why CISOs must be deliberate in their efforts to cultivate credibility. Those who approach the executive team only to ask for money or when a crisis is underway are less likely to have their requests met. To discover what’s impacting today’s CISO, visit the IBM website [ibm.co/2g8nR2r...

A CISO’s Guide To Obtaining Budget: Know Yourself [3/6]

August 29, 2017 13:55 - 13 minutes - 12.4 MB

This is episode 3 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit bit.ly/2x0KhZM. Today, guest speaker John Dickson, principal and co-founder at Denim Group, highlights the value of knowing oneself and one's organization before appealing for funds and resources. Understanding how security fits into the larger corporate culture is crucial, as is cataloging all assets and liabilities that will influence conversations with the executive team. To disco...

A CISO’s Guide to Obtaining Budget: Know Your Audience [2/6]

August 28, 2017 11:49 - 14 minutes - 12.9 MB

This is episode 2 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit bit.ly/2x0KhZM. Today, guest speaker John Dickson, principal and co-founder at Denim Group, offers advice for CISOs and security leaders looking to communicate more effectively and meaningfully with non-technical executives who may not feel fully comfortable making decisions on technical matters. Listen now to learn how successful security leaders translate abstract technical issues ...

A CISO’s Guide to Obtaining Budget: The Nature of the Problem [1/6]

August 24, 2017 13:55 - 11 minutes - 10.2 MB

This is episode 1 of a 6-part series [listen to them all! http://bit.ly/2x0KhZM] examining the difficult task of securing resources for IT and security needs. In each episode, John Dickson [http://bit.ly/2ivrIHE], principal and co-founder at Denim Group, will discuss challenges and share recommendations for how chief information security officers (CISOs) should approach the task of obtaining budget. This first episode introduces the "CISO’s Guide to Obtaining Budget" series and explains wh...

IBM and Check Point: Taking On Security Challenges In Asia Pacific And Around The World

August 22, 2017 11:45 - 16 minutes - 15.4 MB

Organizations around the world confront serious security challenges every day, and companies in the Asia-Pacific region are no exception. In this podcast, Evan Dumas, Head of Emerging Technologies for APAC, Middle East and Africa at Check Point Software, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about the key security challenges facing their clients and best practices for fighting back. Listen now to learn not only how IBM...

Quick Take: Neil Jones Talks Current Developments in Application Security

August 17, 2017 13:08 - 4 minutes - 3.66 MB

How can anyone hope to stay current with rapidly-evolving application security trends and technological advancements in an environment that's increasingly characterized by resource constraints and skills gaps? A good first step is to listen to this short podcast, in which Neil Jones, IBM’s Market Segment Manager for Application Security, discusses major trends in app sec, key client concerns and what’s new in the world of IBM’s application security testing. After listening to the podcast, ...

Cyber Beat Live: More Than Threat Hunting — Identify Connections And Visualize Data With IBM i2

August 15, 2017 11:06 - 27 minutes - 276 MB

Meet IBM i2, the newest addition to the IBM Security portfolio. i2 has roots in both law enforcement and the intelligence community, where it's been used for nearly three decades. Today, these same tools are becoming a critical component of many organizations' cyber defense operations. In this podcast, host Bob Stasio and his expert panel, consisting of Mike McCracken of IBM and Katie Crotty and Dave Williams of Praescient Analytics, trace the evolution of i2. They also share a variety of fa...

Talking Offensive Security With Space Rogue Of X-Force Red

August 10, 2017 12:53 - 5 minutes - 5.48 MB

Cris Thomas, better known within the security community as Space Rogue, joined IBM X-Force Red as global strategy lead earlier this summer. In this podcast, he reflects on how his career has evolved over the past two decades and how events like Black Hack and DEF CON have also changed over the same period. To learn more about X-Force Red or to schedule a demo, visit: https://ibm.co/2wxeb56. You can also stay up to date by following Space Rogue on Twitter: http://bit.ly/2wL9AM4 Recommended f...

Can Cognitive Security Change The Economics Of Cybercrime?

August 08, 2017 12:49 - 22 minutes - 20.4 MB

Cybercrime is a booming business, and today's cybercriminals are better organized and more motivated than ever. In this podcast, Michael Ash, Associate Partner for Cybersecurity at IBM Security, talks about the current cybercrime landscape and why it is so difficult to identify and contain fast-moving threats like WannaCry. After describing the many challenges that security teams face, Michael turns to the good news: Cognitive security has arrived and will be a game changer in terms of helpi...

The Hunter Becomes the Hunted: The Value Of Red On Blue Cyber Training

August 03, 2017 10:44 - 10 minutes - 9.24 MB

A good policeman is able to understand how the criminal carried out the crime. Shouldn't the same be true for security professionals? In this podcast, John Clarke, Jason Flood, Maria Hyland and Trevor McWeeney, all of IBM Ireland, have a spirited conversation about the many benefits of red on blue cyber training. Listen now, and read the accompanying blog [https://ibm.co/2wodUAD], to learn all about red on blue cyber training, including whether the blue team needs to win in order for the ex...

Midyear Threat Landscape with Kevin Albano of IBM X-Force IRIS

August 01, 2017 13:11 - 6 minutes - 6.05 MB

The first half of 2017 passed in a flash, though it may not always have felt that way to members of IBM X-Force Incident Response and Intelligence Services (IRIS). In this podcast, Kevin Albano, X-Force IRIS Global Lead for Threat Intelligence, discusses the major cyber attacks of the past few months, including Shamoon, WannaCry and Petya, and examines some of the trends he and his team have identified so far in 2017. Kevin also make predictions for the months ahead (spoiler alert: ransomwar...

The Evolution of Consumer IoT: The Challenges and the Promise

July 27, 2017 13:35 - 17 minutes - 16.2 MB

In this podcast, IBM Executive Security Advisor Diana Kelley talks with cybersecurity thought leader and SecureMySocial CEO, Joseph Steinberg, about the many challenges associated with securing the Internet of Things (IoT), particularly when it comes to consumer goods like smart refrigerators and connected cars. After discussing why consumer IoT security tends to be relatively lax (spoiler: it relates to evolutionary biology!), Joseph and Diana conclude the podcast with recommendations for i...

Hacking Cars, IoT Devices and Passwords: IBM X-Force Red Turns One

July 24, 2017 13:00 - 18 minutes - 17.3 MB

In this exclusive podcast Charles Henderson, Global Head of IBM's X-Force Red, discusses some of his team's top achievements over the past year and offers a preview of what lies ahead, both at Black Hat this week and beyond. Listen now to hear Charles' take on the challenges of automotive testing and the pitfalls of discrete testing versus solution testing. You'll also learn how the Red Portal, introduced earlier this year, promotes collaboration between testers and developers and how IBM is...

DTCH 04 Nuclear Facilities Under Attack And Cross-Industry Lessons In Cybersecurity

July 20, 2017 12:50 - 19 minutes - 17.6 MB

Episode 4 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Paul and Chris are back this month to talk about the recent targeting of nuclear plants and other energy facilities by cybercriminals. While critical infrastructure systems do face some unique security challenges, many of the lessons learned from these attacks can be applied to other industries as well. For more information on the X-Force Command Center, watch this video...

Fighting Petya at Ground Zero: An Interview with Dmytro Kyselyov of IBM Ukraine

July 18, 2017 13:59 - 16 minutes - 15.4 MB

Dmytro Kyselyov, a Delivery Project Executive at IBM Ukraine, faced the June 27, 2017 Petya variant outbreak from ground zero. In this exclusive podcast, Dmytro talks with IBM Executive Security Advisor Diana Kelley about how he and his team reacted to this zero-day attack. Even in the face of numerous unknowns about what exactly they were up against, IBMers on the ground in Ukraine took immediate action to begin protecting themselves and their clients. For a more technical look at this la...

[Encore] When We Don't Know What We Don't Know: Connected Cars, Smart Homes and IoT Security

July 13, 2017 14:33 - 17 minutes - 15.8 MB

When it comes to the Internet of Things (IoT), a standard set of security precautions and practices has yet to be developed. In this podcast, originally broadcast earlier this year, Charles Henderson of IBM's X-Force Red discusses the present and future of IoT security. Charles draws on his own experience with connected cars and home automation systems to examine the state of IoT security, particularly as it relates to secondhand devices, and to offer solutions for manufacturers, sellers and...

RSA Asia Preview: A Look at the ASEAN Threat Landscape

July 11, 2017 15:32 - 18 minutes - 34.4 MB

With the 2017 RSA Asia Pacific and Japan Conference set to kick off in Singapore in just two weeks, now is the perfect time to take a look at the threat landscape in the Association of Southeast Asian Nations (ASEAN). In this podcast, IBM Executive Security Advisor Diana Kelley talks with Security Sales Specialist Liang Yang Loi about the security challenges organizations in ASEAN are facing today, with a focus on smaller businesses that may not have a dedicated security or incident response...

An Incident Responder's POV: A Brief Overview of the Latest Petya Variant

July 05, 2017 10:17 - 7 minutes - 6.87 MB

Wondering how the latest Petya variant differs from previous Petya attacks or from other recent attacks like WannaCry? In this short podcast Wendi Whitmore and Steve Stone, both of IBM X-Force Incident Response and Intelligence Services (IRIS), provide an overview of the Petya variant that has been impacting organizations primarily in Ukraine and Russia since June 27. [Watch the full webinar: http://bit.ly/2tIGejt] Listen now to gain a better understanding of what makes this attack unique...

DTCH 03 From Cyber-Clumsy to Cybercrime: Examining Why Businesses Underinvest in Cybersecurity

June 27, 2017 13:57 - 18 minutes - 34.4 MB

Episode 3 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Cybercrime is now a full-fledged industry and, like any other successful business, it won't be disappearing any time soon. Listen to this podcast to gain a better understanding of why businesses continue to underinvest in cybersecurity even in the face of increasingly sophisticated and widespread attacks. For more security insights from Paul and Chris, listen to the com...

European X-Force Command Center Tackles Challenges in Fighting Cybercrime, Achieving GDPR Compliance

June 22, 2017 14:00 - 7 minutes - 14.5 MB

In this podcast Kathryn DuPont speaks with Julian Meyrick, Vice President of IBM Security Europe, about the newly expanded X-Force Command Center that opened earlier this week in Wroclaw, Poland. As organizations face growing challenges around fighting cybercrime and meeting regulatory compliance, including the impending General Data Protection Regulation (GDPR), the new X-Force Command Center is uniquely positioned to address the needs of European businesses. To learn more about how IBM X-...

Cyber Beat Live: Analyzing the WannaCry Response — Fact or FUD?

June 20, 2017 13:20 - 30 minutes - 57 MB

Last month's WannaCry malware attack sent both the media and many CEOs into a full-fledged frenzy. In this podcast, IBM Security's Bob Stasio and guests Ronnie Tokazowski, Senior Malware Analyst at Flashpoint, and Matt Lembright, CEO and co-founder at Enabld, examine the extent to which FUD (fear, uncertainty and doubt) colored the WannaCry response. They also discuss whether ransomware is really the type of destructive attack companies should prepare for or if resources are perhaps better ...

Live from the 2017 Gartner Security & Risk Management Summit: IBM Introduces Cloud Identity Connect

June 15, 2017 13:09 - 9 minutes - 92.7 MB

Reporting live from the 2017 Gartner Security and Risk Management Summit in National Harbor, MD, IBM Security's Michelle Waugh and Jason Keenaghan join today's podcast to share some of the trends and insights being discussed at the event and to introduce IBM's new Cloud Identity portfolio of offerings, first announced earlier this week. Listen now to discover how IBM Cloud Identity Connect and MaaS360 with Cloud Identity help customers more securely adopt cloud while proceeding through the d...

[Encore] Data Privacy and the GDPR: What You Need to Know

June 13, 2017 14:03 - 28 minutes - 52.9 MB

With less than one year left until the GDPR comes into force, today we are re-posting one of our most popular podcast episodes to date. Whether you are looking for tips and best practices as you head down the path to GDPR readiness or you want to learn more about today's top client data privacy concerns, this is the podcast for you. Listen now to hear Forrester analyst Fatemeh Khatibloo and IBM Security's Leslie Wiggins discuss one of the most important security topics today: Data privacy an...

[Encore] You Don't Have to Outrun the Bear: Data Security Insights from a Health Care Insider

June 06, 2017 13:57 - 22 minutes - 20.8 MB

Following the chaos that the WannaCry ransomware attack caused the National Health Service (NHS) in the UK, we are re-posting a podcast on health care security that originally aired in late 2016. In this episode Dr. Michael Ash uses his distinct viewpoint as a former oral surgeron and a current Associate Partner for Security, Strategy, Risk, and Compliance at IBM to illustrate the need for better security practices in the health care industry. Listen now to hear Michael's data security insig...

DTCH 02 Brush, Floss, Repeat: How Basic Endpoint Hygiene Can Help Protect You From Ransomware

May 30, 2017 15:17 - 22 minutes - 41 MB

Episode 2 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Why did WannaCry hit so hard, what could have made it even worse and, at least as important, what can companies do now to prepare for the nearly inevitable next round of attacks? Listen to this podcast to discover why basic endpoint hygiene and network maintenance must form the cornerstone of any security program, even in this era of new cognitive technologies. RESOURC...

Cyber Beat Live: Searching for Intelligence — Understanding a Different Dimension of Security

May 23, 2017 11:59 - 35 minutes - 66.9 MB

This podcast examines a new trend that is seeing private companies turn to people, processes and technologies from the intelligence community as a means of grappling with an increasingly sophisticated threat landscape. Listen now to hear Bob Stasio and Mike McCracken, both of IBM Security, and Mark D. Young of IronNet Cybersecurity discuss the development of this intelligence-led security trend as well as its goals and its potential for success. To view a live demo on how to counter and mit...

WannaCry Ransomware: State of the Attack

May 16, 2017 14:26 - 5 minutes - 5.27 MB

In this short podcast, IBM X-Force Manager John Kuhn shares the latest updates on the WannaCry/WanaCrypt0r 2.0 ransomware attack and highlights some of the lessons companies should take away from this incident. RESOURCES: - To learn more about the technical details of the WannaCry attack, visit the IBM X-Force Exchange [http://bit.ly/2qjEs6l]. - To watch the on-demand webinar, "WannaCry Ransomware Attack: What to Do Now," visit http://bit.ly/2pTiNOs. - To download the Ransomware Response Gu...

Guests

Eric Cole
1 Episode