
Sign up to save your podcasts
Or


Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.
What You’ll Learn:
Episode Highlights:
[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity
[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula
[08:19] What CTI and defenders really need to understand about each other
[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions
[17:45] How CTI helps organizations protect their most sensitive data
Episode Resources:
By Rubrik5
1414 ratings
Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.
What You’ll Learn:
Episode Highlights:
[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity
[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula
[08:19] What CTI and defenders really need to understand about each other
[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions
[17:45] How CTI helps organizations protect their most sensitive data
Episode Resources:

1,026 Listeners

318 Listeners

315 Listeners

39 Listeners