Artwork

Content provided by mnemonic. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by mnemonic or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Isolate first, Triage second, and the tools to help you do it.

45:44
 
Share
 

Manage episode 424029309 series 2805538
Content provided by mnemonic. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by mnemonic or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Operationalising threat intelligence is back on topic for the mnemonic security podcast!

Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.

The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.

  continue reading

Chapters

1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)

2. Cyber Security in the Crypto Industry (00:00:03)

3. Evolving Threat-Informed Defense Strategies (00:09:44)

4. Advancements in Cyber Threat Intelligence (00:13:30)

5. Innovations in Cybersecurity Technology (00:25:27)

6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)

7. Enhancing Defender Resilience in Cybersecurity (00:39:19)

116 episodes

Artwork
iconShare
 
Manage episode 424029309 series 2805538
Content provided by mnemonic. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by mnemonic or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Operationalising threat intelligence is back on topic for the mnemonic security podcast!

Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.

The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.

  continue reading

Chapters

1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)

2. Cyber Security in the Crypto Industry (00:00:03)

3. Evolving Threat-Informed Defense Strategies (00:09:44)

4. Advancements in Cyber Threat Intelligence (00:13:30)

5. Innovations in Cybersecurity Technology (00:25:27)

6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)

7. Enhancing Defender Resilience in Cybersecurity (00:39:19)

116 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide