Data Security Decoded

Breaking the Intelligence-Defense Divide with Scott Scher


Listen Later

Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Scott Scher⁠, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

What You’ll Learn:

  • The mindset shift from cyber threat intelligence to cyber counter-threat intelligence
  • Why threat intel must not just inform, but recommend actions for defenders
  • How intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisions
  • Why we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forces
  • How Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependency
  • Episode Highlights:

    [00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity

    [03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula

    [08:19] What CTI and defenders really need to understand about each other

    [12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions

    [17:45] How CTI helps organizations protect their most sensitive data

    Episode Resources:

    • Caleb Tolin on LinkedIn
    • Scott Scher on LinkedIn
    • ...more
      View all episodesView all episodes
      Download on the App Store

      Data Security DecodedBy Rubrik

      • 5
      • 5
      • 5
      • 5
      • 5

      5

      14 ratings


      More shows like Data Security Decoded

      View all
      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,026 Listeners

      Smashing Security by Graham Cluley

      Smashing Security

      318 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      315 Listeners

      Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

      Threat Vector by Palo Alto Networks

      39 Listeners