Security Intelligence Podcast artwork

Security Intelligence Podcast

189 episodes - English - Latest episode: over 3 years ago - ★★★★★ - 34 ratings

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

Technology
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Insights on WannaCry from IBM Security VP, Caleb Barlow, and IBM X-Force IRIS Lead, Kevin Albano

May 15, 2017 15:30 - 5 minutes - 5 MB

Caleb Barlow, Vice President of Threat Intelligence at IBM Security, and Kevin Albano, IBM X-Force IRIS Global Lead for Threat Intelligence, have the information you need on the WannaCry/WanaCrypt0r 2.0 ransomware attack. On Friday, May 12, in the midst of what would become the biggest ever global ransomware attack, they shared their insights on the developing situation and offered recommendations for organizations that may be impacted. RESOURCES: - To learn more about the technical detail...

Certifications and Risk Frameworks for Maritime Security

May 11, 2017 11:50 - 18 minutes - 16.6 MB

In this final episode of our 3-part maritime security podcast series, Cherise Gutierrez joins IBM's Diana Kelley to discuss risk frameworks and certification options in the maritime space. Gutierrez led the world’s first program for offshore drilling rigs to achieve "Achilles Practices Certification" and currently serves as a senior consultant with Meridian.US. To learn more, listen to our complete series on maritime security [http://bit.ly/2r3oVoh] and read more about the Achilles Practice...

A Salute to Our Teachers and Mentors

May 09, 2017 11:56 - 17 minutes - 32.4 MB

In celebration of National Teacher Appreciation Week, currently underway in the U.S., four of IBM Security's top subject matter experts have come together for a special podcast honoring their most memorable teachers and mentors. Listen now to hear Limor Kessem, Pam Cobb, Diana Kelley and Neil Jones reflect on the teachers who shaped their young minds or guided them on the path to their current careers. Visit https://securityintelligence.com/ to read the latest security content from all the ...

On the Complexity of Incident Response in Maritime Security

May 04, 2017 17:22 - 22 minutes - 40.7 MB

Applying modern security concerns to the ancient profession of shipping can be a serious challenge. Capt. David Nichols (ret.) is a veteran of the U. S. Coast Guard officer and served as legal advisor and Chief of Staff to the Federal On Scene Coordinator during the aftermath of the Deepwater Horizon oil spill. Today, Nichols brings his extensive experience in the field of marine safety, security and response to the podcast. To learn more, listen to our complete series on maritime security [...

DTCH 01 Take Back Control of Your Cybersecurity... Again

May 02, 2017 10:38 - 15 minutes - 29.3 MB

If you enjoyed the "Take Back Control of Your Cybersecurity Now" podcast series that concluded earlier this spring, you won’t want to miss this monthly follow-up series, "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" In this premiere episode, they discuss the scourge of ransomware and the importance of endpoint security. For even more security insights from Paul and Chris, listen to the complete "Take Back Control of Your Cybersecurity Now" podcast se...

An Introduction to Maritime Cybersecurity

April 25, 2017 13:44 - 16 minutes - 30.9 MB

Following the attack on the Maersk Alabama in 2009, former Marine Officer Jonathan McConnell founded Meridian.US, which provides security services and consulting for merchant shipping vessels. In a recent conversation with IBM's Diana Kelley, McConnell outlined some of the main security concerns in the maritime environment, emphasizing how these both reflect and differ from the security concerns faced by other industries. To learn more, listen to our complete series on maritime security [bit...

Cyber Beat Live: The Art of Cyber Threat Hunting

April 20, 2017 17:43 - 35 minutes - 66.6 MB

Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategies. Threat hunting takes advantage of all available data sources to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats. To learn more about cyber threat hunting, listen to this podcast with Bob Stasio, Scott Schober and Morgan Wright. You can also watch...

IoT Security Fact #5: As Data Accumulates, Exposure Issues Will Increase

April 18, 2017 16:22 - 15 minutes - 28.3 MB

In this conclusion to the "Five Indisputable Facts about IoT Security" podcast series, we look at Fact #5: As data accumulates, exposure issues will increase. IoT devices are quietly and constantly collecting massive amounts of personal and sensitive data, from audio recordings to GPS locations to heart rate readings. If all this data is not managed, secured and eventually destroyed, the results may lead to loss of privacy and serious issues of data ownership. To learn about all five indis...

IoT Security Fact #4: Weak Configurations Will Persist

April 11, 2017 12:04 - 13 minutes - 24.8 MB

This episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #4: Weak configurations will persist. Changing the default configurations of an IoT device takes thought and effort, and for this very reason it too often does not happen. Rather than leaving security in the hands of the end user, device manufacturers should ensure that security options are enabled either by default or as part of an initial setup process. To learn about all five indisputable facts of IoT ...

IoT Security Fact #3: Shared Secrets Do Not Remain Secret

April 04, 2017 14:04 - 11 minutes - 11 MB

This latest episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #3: Shared secrets do not remain secret. Millions of IoT devices come preloaded with identical passwords. Users who fail to update the default settings and choose a unique password could thus be sharing their secrets with multitudes of strangers and leaving their devices vulnerable to disruption or sabotage. To learn about all five indisputable facts of IoT security, listen to all the podcasts in ...

IoT Security Fact #2: Software Security Will Degrade Over Time

March 28, 2017 12:05 - 12 minutes - 22.2 MB

Today's episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #2: Software security will degrade over time. Managing software updates is always a challenge, but additional difficulties arise when the Internet of Things is involved. Keeping software up-to-date for widely distributed IoT devices can become a never-ending task and the risk of attack only increases with the length of time your connected car or smart refrigerator remains in service. To learn about all...

IoT Security Fact #1: Devices Will Operate in Hostile Environments

March 21, 2017 14:34 - 10 minutes - 20.1 MB

This is the first episode of a new series, "Five Indisputable Facts about IoT Security." Each week a panel of IBM experts will examine one fact that should be considered when building and deploying IoT devices. Today's installment looks at Indisputable IoT Security Fact #1: Devices will operate in hostile environments. Because IoT devices often operate without human supervision, they must be rugged and resistant to physical tampering and must also be able to recover from an attack and fail...

The Insider Threat and Other Hot Topics in Identity and Access Management

March 16, 2017 17:01 - 13 minutes - 24.3 MB

In this podcast three members of IBM Security's Identity and Access Management (IAM) leadership team discuss some of the common themes and concerns they hear most often from customers, including pressure to embrace the digital transformation and the risk of insider threats. Listen now for valuable insights from Jason Keenaghan, Director of Offering Management for IAM and Fraud Portfolios, Sridhar Muppidi, CTO of Information, Risk and Protection Portfolio, and Dustin Hoff, Global Compentency...

TBC 09: Don't Abandon Ship Just Yet

March 14, 2017 17:11 - 18 minutes - 17.2 MB

If you've enjoyed listening to the "Take Back Control of Your Cybersecurity Now" podcast series over the past 8 weeks and learning about topics like cognitive computing, the NIST CyberSecurity Framework and incident response, you definitely will not want to miss this 9th and final episode. In a fitting conclusion to the series, Paul Ferrillo and Chris Veltsos offer their predictions for the future of cybersecurity. If you haven't done so already, please download Paul and Chris' complete book...

Cyber Beat Live: Cybersecurity and the Power Grid

March 13, 2017 16:52 - 50 minutes - 94.5 MB

How do we ensure that our power grids are secure? In this podcast IBM's Bob Stasio discusses this important question with industry experts Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc., Morgan Wright, Cyberterrorism and Cybercrime Analyst at Morgan Wright LLC, and Steven Collier, Director of Smart Grid Strategies at Milsoft Utility Solutions. Listen now to discover the challenges utilities face when trying to secure the power grid and how can they overcom...

TBC 08: If You Can't Measure It, You Can't Manage It

March 07, 2017 14:09 - 16 minutes - 15.1 MB

Are you a CISO who's struggling to translate your latest metrics report into a meaningful update that your board will understand and act on? If so, this 8th episode of the "Take Back Control of Your Cybersecurity Now" podcast series is just what you need. Listen now as featured speakers Paul Ferrillo and Chris Veltsos discuss the value of metrics and dashboards and how they can best be used to communicate cyber risk. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To r...

Data Privacy and the GDPR: What You Need to Know

March 02, 2017 14:15 - 28 minutes - 52.9 MB

Whether you are looking for tips and best practices as you start down the path to GDPR readiness or you want to learn more about today's top client data privacy concerns, this is the podcast for you. Listen now to hear Forrester analyst Fatemeh Khatibloo and IBM Security's Leslie Wiggins discuss one of the most important security topics today: Data privacy and the GDPR. To read the blog post mentioned during the episode, visit http://ibm.co/2lg6azw. To download an IBM solution brief on GD...

TBC 07: Have a Plan, Practice It and Then Practice It Again

February 28, 2017 14:28 - 13 minutes - 25.3 MB

Following up on their discussion of the NIST Cybersecurity Framework in last week’s podcast, in this episode Paul Ferrillo and Christophe Veltsos take a closer look at incident response. Whereas the goal of cybersecurity was once to build enough layers and walls to keep out attackers, in more recent years companies have shifted their focus to detecting bad guys already inside their systems and then responding as quickly and as accurately as possible. This new mentality has elevated the stat...

TBC 06: Lessons from the NIST Cybersecurity Framework

February 21, 2017 12:18 - 15 minutes - 14.5 MB

This episode of the ‘Take Back Control of Your Cybersecurity Now’ podcast focuses on the National Institute of Standards and Technology (NIST) and offers recommendations for organizations looking to adopt the latest version of its Cybersecurity Framework (CSF). To download Paul Ferrillo and Chris Veltsos' complete book, visit bit.ly/2k9Fboi. To learn more about the NIST CSF, visit http://bit.ly/2kUpWvo.

The Biggest Security Risks in Health Care IT Systems

February 20, 2017 15:58 - 29 minutes - 26.6 MB

Should health care organizations be mandated to have more sophisticated security programs than other industries? Does HIPAA compliance have any security merit? In this exclusive podcast Shahid Shah, CEO of Netspective, discusses these and other thought-provoking questions about the state of health care security with David Chou, Chief Information and Digital Officer at Children's Mercy Hospital in Kansas City, Missouri. To learn more about health care security, visit http://ibm.co/2ledABQ.

The Future and Present of IoT Security

February 17, 2017 18:44 - 17 minutes - 20.3 MB

When it comes to the Internet of Things (IoT), a standard set of security precautions and practices has yet to be developed. In this podcast, Charles Henderson of IBM's X-Force Red discusses the present and future of IoT security. Charles draws on his own experience with connected cars and home automation devices to draw conclusions about the state of IoT security, particularly as it relates to secondhand devices, and to offer solutions for manufacturers, sellers and consumers. To learn mor...

TBC 05: What Makes IBM Watson the Whole Package

February 14, 2017 11:52 - 14 minutes - 13 MB

After broadly discussing the capabilities and benefits of cognitive security in our previous episode (http://ibm.co/2lIP6Pa), this week the "Take Back Control of Your Cybersecurity Now" podcast looks more closely at IBM Watson. Listen now to learn how the ability to ingest and understand both structured and unstructured data sets Watson apart from other cybersecurity solutions. To download Paul Ferrillo and Chris Veltsos' complete book, visit bit.ly/2k9Fboi. To read the IBM report on cyberse...

TBC 04: The Cognitive Transformation is for Everyone

February 07, 2017 14:50 - 25 minutes - 23.2 MB

This fourth episode of the "Take Back Control of Your Cybersecurity Now" tackles one of today's hottest topics: cognitive security. Featured guests Paul Ferrillo and Christophe Veltsos give substance to buzzwords like artificial intelligence and machine learning and then go on to explain why cognitive solutions are necessary in the current threat landscape. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To read the Forbes article mentioned during the podcast, visit ht...

Help Conquer Childhood Cancer at RSA 2017

February 02, 2017 11:58 - 10 minutes - 19.7 MB

IBM Security's Diana Kelley and Rapid7's David Etue will be doing more than talking security at this year's RSA Conference. Both Diana and David are participating in the 'Shaves That Save' fundraising event to benefit the St. Baldrick’s Foundation and lifesaving children’s cancer research. Listen to this short podcast to learn more about this very special RSA event and the important work that St. Baldrick's does. To get involved with the fundraiser or to make a donation, please visit http:/...

TBC 03: Tell It Like It Is… But in Plain English

January 31, 2017 20:03 - 12 minutes - 11.3 MB

To run an effective organization, all members of the C-suite must work together toward common business goals. In this episode of the "Take Back Control of Your Cybersecurity Now" podcast series, featured guests Paul Ferrillo and Christophe Veltsos discuss how CISOs can be most effective in their internal communications with other C-suite members. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To read the IBM Institute for Business Value's study on securing the C-Suite...

TBC 02: Directors Are From Mars, CISOs Are From Venus

January 24, 2017 12:55 - 14 minutes - 13 MB

In this second episode of the "Take Back Control of Your Cybersecurity Now" podcast series, featured guests Paul Ferrillo and Christophe Veltsos highlight the role that communication plays in security and offer recommendations for how to bridge the communications gap that too often exists between CISOs and boards of directors. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. If you missed it you can also listen to Episode 1 of this series at http://ibm.co/2jme8EF, and d...

TBC 01: One Hack Away From Disaster

January 17, 2017 13:57 - 21 minutes - 20.1 MB

In their recently released book, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos illustrate today’s perilous threat landscape and build a convincing case for why cybersecurity must be a key business priority. This exclusive podcast series will feature Ferrillo and Veltsos discussing some of the most important topics in their book. In this first episode they explain why they wrote the book and introduce some of the challenges faced by today's CISO. To do...

Avoiding the Blindside: Protecting Against Encrypted Attacks and Evasion Techniques

January 05, 2017 15:49 - 12 minutes - 17.7 MB

In this podcast Jordan Carlson of IBM Security talks with Kevin Tolly about the results of Tolly Group’s recent evaluation of the IBM Security Network Protection XGS 7100. The independent testing put the IBM XGS 7100 through its paces, testing its security efficacy against encrypted threats and barraging the XGS with nearly 4 million evasion-based attacks. Spoiler Alert: XGS 7100 had a block rate of 100% and stopped all attacks. To learn more, download the complete test report from Tolly Gro...

It Came From Inside The Network (and Other Horror Stories in Security)

October 26, 2016 11:29 - 28 minutes - 26.2 MB

In this especially spooky Halloween podcast you'll discover tales of creeping malware, ectoplasmic entitlements and voracious vulnerabilities — as well as recommendations for how you can protect your network and assets from such ghastly fates. To view all episodes of the Security Intelligence podcast, visit http://ibm.co/2eL4c4d.

Threatening Trends to the Banking Industry

October 18, 2016 12:20 - 16 minutes - 15.3 MB

In this exclusive podcast, we chat with IBM’s Rhett Hardy, subject matter expert and member of the Red Cell Financial Crimes Intelligence team, to discuss the threat landscape of 2016 and projections for 2017 within the financial services industry. For more information on IBM’s offerings in the financial space, visit http://ibm.co/2eMdnDL.

Is Cybercrime the Mafia of the 21st Century?

October 06, 2016 14:51 - 6 minutes - 5.54 MB

In this exclusive podcast IBM Security Advisor Limor Kessem discusses some of the top fraud threats facing enterprise organizations. Currently standing out among the vast array of threats is ransomware, which spread rapidly in 2016. To learn more download the Ransomware Response Guide from IBM X-Force: http://ibm.co/2cyujYL

A Look at Today’s Cybercrime Threats in Asia-Pacific and Beyond

September 23, 2016 14:01 - 19 minutes - 17.4 MB

In this podcast IBM Executive Security Advisor Etay Maor and X-Force Threat Research Team Leader Tal Darsan discuss some of the cybercrime threats and trends they’ve seen in recent months, with a special emphasis placed on the Asia-Pacific region. To learn more, read all the latest Security Intelligence blogs on fraud prevention: http://ibm.co/2d5y789

You Don't Have to Outrun the Bear: Data Security Insights from a Health Care Insider

September 18, 2016 12:17 - 22 minutes - 20.8 MB

In this podcast Dr. Michael Ash uses his distinct viewpoint as a former oral surgeron and a current Associate Partner for Security, Strategy, Risk, and Compliance at IBM to illustrate the need for better security practices in the health care industry. Listen now – or download and listen on the go – to hear Michael's data security insights and his actionable advice on what organizations can do to address their PHI protection challenges. To learn more about health care security visit: http://ib...

What's So Great About Collaborative Defense?

September 06, 2016 08:51 - 11 minutes - 10.3 MB

In this podcast IBM's Pam Cobb talks collaborative defense and how the streamlining of process for threat intelligence and solution integrations can allow security practitioners to focus on actual protection of the enterprise. To learn more, watch this on-demand webinar with IBM X-Force Exchange Chief Architect Ron Williams: http://ibm.co/2cjz2zQ

Today's Fraud Trends, From the Dark Web to Pokemon Go

September 02, 2016 11:34 - 7 minutes - 6.5 MB

In this short podcast, IBM Executive Security Advisor ​Etay Maor shares his thoughts on the current state of cyber fraud, including how cybercrime has become a low risk, high reward activity and why it's easier to be a cybercriminal today than ever before. For more of Etay's insights, visit http://ibm.co/2c9ZCLU.

Identifying Internal Risks and Insider Threats with IBM QRadar

August 23, 2016 12:47 - 8 minutes - 8.15 MB

In this short podcast Ken Washburn, Team Lead for IBM QRadar App Development, explains how the new user behavior analytics (UBA) app provides new ways of tracking and analyzing typical QRadar data, giving organizations improved awareness of risky behaviors and malicious activities. To learn more, visit http://ibm.co/2aARHrs

Emerging Security Trends at Black Hat and Beyond

August 15, 2016 12:45 - 10 minutes - 9.59 MB

In this short podcast IBM Executive Security Advisor Diana Kelley highlights some of the security trends that were on display at Black Hat USA 2016.

Live at Black Hat USA 2016 with IBM's Etay Maor

August 15, 2016 09:02 - 4 minutes - 4.04 MB

Couldn’t make it to Las Vegas this year for Black Hat USA? Listen to this short interview with IBM Executive Security Advisor Etay Maor to learn about the hottest sessions and how the highly-anticipated annual event has adapted to changes in the security industry.

The Intersection between Cybersecurity and Victims of Violence: An Interview with Dr. Kelley Misata

July 26, 2016 20:39 - 35 minutes - 32 MB

In this exclusive podcast, IBM Executive Security Advisor Diana Kelley talks with Dr. Kelley Misata about her research on the intersection between cybersecurity and victims of violence. Dr. Misata recently completed her Ph.D at Purdue University Center for Education and Research in Information Assurance and Security (CERIAS), and her dissertation examined ways to help organizations working with victims of online abuse. For more great insights from Dr. Misata, visit http://ibm.co/2aobYj3.

Guests

Eric Cole
1 Episode