Security Weekly Podcast Network (Audio)

Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409


Listen Later

Segment 1

CTG Interview

Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure.

Cyber Resilience in Action: A Guide for Mid-Market Firms

This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them!

Nightwing Interview

Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today’s threat landscape.

This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them!

Segment 2

Libraesva Interview

Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message.

This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them!

IRONSCALES Interview

Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception.

  • Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking
  • Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people
  • Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images

IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes.

  • Assessing Organizational Readiness in the Face of Emerging Cyber Threat
  • Using AI to Enhance Defensive Cybersecurity white paper
  • The Hidden Gaps of SEG Protection white paper

This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them!

Segment 3

Illumio Interview

In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph.

Segment Resources:

  • Rethinking Threat Detection in a Decentralized World
  • Illumio Insights Announcement
  • More information about Illumio Insights

This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview!

ESET Interview

The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats.

Segment Resources:

  • https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/
  • https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/

This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw-409

...more
View all episodesView all episodes
Download on the App Store

Security Weekly Podcast Network (Audio)By Security Weekly Productions

  • 4.4
  • 4.4
  • 4.4
  • 4.4
  • 4.4

4.4

206 ratings


More shows like Security Weekly Podcast Network (Audio)

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,973 Listeners

Risky Business by Patrick Gray

Risky Business

361 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

628 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

366 Listeners

Hacked by Hacked

Hacked

182 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,007 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

311 Listeners

Click Here by Recorded Future News

Click Here

402 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,869 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

170 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

76 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

129 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners