Переходьте в офлайн за допомогою програми Player FM !
Isolate first, Triage second, and the tools to help you do it.
Manage episode 424029309 series 2805538
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Розділи
1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)
2. Cyber Security in the Crypto Industry (00:00:03)
3. Evolving Threat-Informed Defense Strategies (00:09:44)
4. Advancements in Cyber Threat Intelligence (00:13:30)
5. Innovations in Cybersecurity Technology (00:25:27)
6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)
7. Enhancing Defender Resilience in Cybersecurity (00:39:19)
129 епізодів
Manage episode 424029309 series 2805538
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Розділи
1. Isolate first, Triage second, and the tools to help you do it. (00:00:00)
2. Cyber Security in the Crypto Industry (00:00:03)
3. Evolving Threat-Informed Defense Strategies (00:09:44)
4. Advancements in Cyber Threat Intelligence (00:13:30)
5. Innovations in Cybersecurity Technology (00:25:27)
6. Risks of Artificial Intelligence in Cybersecurity (00:34:17)
7. Enhancing Defender Resilience in Cybersecurity (00:39:19)
129 епізодів
Усі епізоди
×Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.