Go offline with the Player FM app!
Isolate first, Triage second, and the tools to help you do it.
Manage episode 424029309 series 2805538
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Chapters
1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)
2. Cyber Security in the Crypto Industry (00:00:03)
3. Evolving Threat-Informed Defense Strategies (00:09:44)
4. Advancements in Cyber Threat Intelligence (00:13:30)
5. Innovations in Cybersecurity Technology (00:25:27)
6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)
7. Enhancing Defender Resilience in Cybersecurity (00:39:19)
124 episodes
Manage episode 424029309 series 2805538
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Chapters
1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)
2. Cyber Security in the Crypto Industry (00:00:03)
3. Evolving Threat-Informed Defense Strategies (00:09:44)
4. Advancements in Cyber Threat Intelligence (00:13:30)
5. Innovations in Cybersecurity Technology (00:25:27)
6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)
7. Enhancing Defender Resilience in Cybersecurity (00:39:19)
124 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.