Future of Threat Intelligence

Rapyd’s Nir Rothenberg on Breaking the CISO Burnout Cycle Through Focused Priorities


Listen Later

From cleaning up after an insider theft of the notorious Pegasus spyware to safeguarding billions in payment transactions, Nir Rothenberg brings battlefield-tested security leadership to his role as CISO/CIO at Rapyd, and joins David on this episode of The Future of Threat Intelligence to share all his lessons learned. 

In this no-holds-barred conversation , Nir delivers a wake-up call to security leaders still pretending they can defend against everything, offering instead a radical prioritization framework shaped by watching elite hackers routinely break supposedly "unbreakable" systems. 

Nir challenges conventional CISO thinking by ruthlessly eliminating theoretical threats from his roadmap, explaining why even Google-level security can't ultimately stop determined nation-state attackers, and providing practical strategies for focusing resources exclusively on threats that organizations can realistically defend against.

Topics discussed:

  • The challenges of prioritizing security efforts based on attacker capability tiers, focusing resources on threats that can realistically be defended against rather than top-tier nation-state actors.
  • How working with elite offensive security teams fundamentally transforms a defender's understanding of what's feasible in attack scenarios and reshapes security investment decisions.
  • The evolution of breach disclosure practices and why current placative approaches prioritize shareholder confidence over sharing actionable details that would help other defenders.
  • Strategic approaches to developing security capabilities through partnerships rather than building in-house, particularly for specialized functions like threat intelligence.
  • Why even major crypto breaches often stem from preventable issues like social engineering rather than sophisticated technical exploits, and how to prioritize defenses accordingly.
  • Practical strategies for combating CISO burnout through focused prioritization and avoiding the tendency of boiling the ocean that leads to ineffective security programs.
  • Creating collaborative security ecosystems that leverage the numerical advantage defenders have over attackers when working together effectively.
  • How to extract meaningful intelligence from breaches beyond just indicators of compromise, focusing on understanding attacker methodologies and misconfigurations that can be tested and remediated.
  • Key Takeaways: 

    • Prioritize security resources based on attacker capability tiers, focusing efforts on threats that can realistically be defended against rather than top-tier nation-state actors that will find a way in regardless of defenses.
    • Implement a strategic partnership approach with specialized security vendors instead of building capabilities like threat intelligence in-house, leveraging their decades of experience to enhance your security posture more efficiently.
    • Demand more detailed technical information in breach disclosures from vendors and partners, seeking specific misconfigurations and vulnerabilities that were exploited rather than just indicators of compromise.
    • Position your security leadership role within the management team to enable greater impact, reducing bureaucratic barriers to implementing innovative security controls and technologies.
    • Evaluate emerging security startups as design partners before they become widely known, creating a competitive advantage through early access to cutting-edge security capabilities.
    • Challenge theoretical security risks like AI data exposure by comparing them with documented threats that have caused actual damage, allocating resources proportionally to proven rather than hypothetical dangers.
    • Leverage M&A transitions as opportunities to eliminate technical debt and modernize security practices rather than just viewing them as risk events requiring assessment.
    • Adopt comprehensive breach intelligence sources like the Verizon Breach Report to compensate for the limited technical detail in most public breach disclosures.
    • Combat CISO burnout by focusing exclusively on security elements you can control and impact.
    • Create collaborative security ecosystems with partners, vendors, and internal teams to maximize the numerical advantage defenders have over attackers when working together effectively.
    • ...more
      View all episodesView all episodes
      Download on the App Store

      Future of Threat IntelligenceBy Team Cymru

      • 4.5
      • 4.5
      • 4.5
      • 4.5
      • 4.5

      4.5

      11 ratings


      More shows like Future of Threat Intelligence

      View all
      Global News Podcast by BBC World Service

      Global News Podcast

      7,710 Listeners

      WSJ What’s News by The Wall Street Journal

      WSJ What’s News

      4,357 Listeners

      WSJ Tech News Briefing by The Wall Street Journal

      WSJ Tech News Briefing

      1,637 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      637 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,023 Listeners

      The Daily by The New York Times

      The Daily

      112,351 Listeners

      Click Here by Recorded Future News

      Click Here

      415 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,013 Listeners

      Talkin' About [Infosec] News, Powered by Black Hills Information Security by Black Hills Information Security

      Talkin' About [Infosec] News, Powered by Black Hills Information Security

      94 Listeners

      True Spies: Espionage | Investigation | Crime | Murder | Detective | Politics by SPYSCAPE

      True Spies: Espionage | Investigation | Crime | Murder | Detective | Politics

      1,963 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      137 Listeners

      Security Matters by CyberArk

      Security Matters

      22 Listeners

      Bloomberg Tech by Bloomberg

      Bloomberg Tech

      60 Listeners

      Microsoft Threat Intelligence Podcast by Microsoft

      Microsoft Threat Intelligence Podcast

      22 Listeners

      Better Offline by Cool Zone Media and iHeartPodcasts

      Better Offline

      548 Listeners