Cybersecurity Where You Are (video)

Episode 147: Actualizing Threat Intel for Effective Defense


Listen Later

In episode 147 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security® (CIS®); and Kaitlin Drape, Hybrid Threat Intelligence Analyst at CIS. Together, they discuss how to actualize threat intel for the purpose of building effective defense programs and operational response plans. Here are some highlights from our episode:

  • 01:27. Which two questions you want to answer when providing intelligence on a threat
  • 05:19. How to avoid underutilizing or misunderstanding the utility of threat intel
  • 13.18. A real-life story from John of when intelligence made a difference in a security incident
  • 17:05. The foundation and building blocks of maturing your threat intelligence program
  • 22:14. The value of working with non-intelligence groups to formulate effective response plans
  • 24:22. CIS's ongoing work to help organizations proactively ingest and use threat intel
  • 28:24. How cross-collaboration across an organization brings threat intel into a lifecycle
  • 31:01. Kaitlin's work as an exemplar of how to make threat intelligence operational
  • 36:20. The ongoing evolution of hybrid threat intel to inform meaningful operational responses

Resources

  • ThreatWA™
  • How Threat Modeling, Actor Attribution Grow Cyber Defenses
  • Countering Multidimensional Threats: Lessons Learned from the 2024 Election
  • Episode 119: Multidimensional Threat Defense at Large Events
  • Sinaloa cartel used phone data and surveillance cameras to find FBI informants, DOJ says

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Hacked by Hacked

Hacked

187 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,007 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

372 Listeners

Risky Business by Patrick Gray

Risky Business

372 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

651 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,019 Listeners

Smashing Security by Graham Cluley

Smashing Security

319 Listeners

Click Here by Recorded Future News

Click Here

417 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,057 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

179 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

188 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners