
Sign up to save your podcasts
Or


Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.
What You’ll Learn:
Episode Highlights:
[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity
[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula
[08:19] What CTI and defenders really need to understand about each other
[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions
[17:45] How CTI helps organizations protect their most sensitive data
Episode Resources:
By Rubrik5
1414 ratings
Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.
What You’ll Learn:
Episode Highlights:
[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity
[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula
[08:19] What CTI and defenders really need to understand about each other
[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions
[17:45] How CTI helps organizations protect their most sensitive data
Episode Resources:

2,009 Listeners

375 Listeners

1,021 Listeners

414 Listeners

8,055 Listeners

178 Listeners

93 Listeners

45 Listeners

22 Listeners