
Sign up to save your podcasts
Or


Four members of the CyberWire’s Hash Table of experts: Don Welch: Interim CIO of Penn State University Helen Patton: CISO for Ohio State University Bob Turner: CISO for the University of Wisconsin at Madison Kevin Ford: CISO for the State of North Dakota discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks5
1515 ratings
Four members of the CyberWire’s Hash Table of experts: Don Welch: Interim CIO of Penn State University Helen Patton: CISO for Ohio State University Bob Turner: CISO for the University of Wisconsin at Madison Kevin Ford: CISO for the State of North Dakota discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.
Learn more about your ad choices. Visit megaphone.fm/adchoices

4,420 Listeners

651 Listeners

1,028 Listeners

113,121 Listeners

8,077 Listeners

73 Listeners

5,576 Listeners

3,538 Listeners

1,480 Listeners