The CyberWire Daily

Security operations centers: around the Hash Table.


Listen Later

Four members of the CyberWire’s Hash Table of experts:
Don Welch: Interim CIO of Penn State University
Helen Patton: CISO for Ohio State University
Bob Turner: CISO for the University of Wisconsin at Madison
Kevin Ford: CISO for the State of North Dakota
discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.
...more
View all episodesView all episodes
Download on the App Store

The CyberWire DailyBy The CyberWire