
Sign up to save your podcasts
Or


Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.
What You'll Learn:
Key Insights:
Highlights:
[00:00:00] Vulnerability Exploitation Trends
Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities.
[04:30] Supply Chain Security Essentials
Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations.
[07:23] AI in Cybersecurity: Reality vs Hype
Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation.
[14:08] Threat Profile Development
Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile.
Episode Resources:
By Rubrik5
1414 ratings
Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.
What You'll Learn:
Key Insights:
Highlights:
[00:00:00] Vulnerability Exploitation Trends
Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities.
[04:30] Supply Chain Security Essentials
Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations.
[07:23] AI in Cybersecurity: Reality vs Hype
Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation.
[14:08] Threat Profile Development
Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile.
Episode Resources:

2,009 Listeners

375 Listeners

1,021 Listeners

414 Listeners

8,055 Listeners

178 Listeners

93 Listeners

45 Listeners

22 Listeners