Lateral Movement: Combating High-Risk, Low-Noise Threats
Security Intelligence Podcast
by IBM Security
3y ago
"What I like to tell people is that when you have one computer that's infected, that's annoying," says Charles DeBeck, a member of IBM Security's Threat Intelligence Production team. "When you have 1,000 computers that's infected, that's a problem." Lateral movement is one way threat actors escalate annoyances into problems. "Lateral movement consists of a series of techniques that enable an adversary to access and control remote systems in a network," Joey Victorino, a consultant for IBM X-Force IRIS, explains. In some cases, all it takes is four seconds for an adversary to pivot across a net ..read more
Visit website
Lessons from a Gray Beard: Transitioning from the Military to Cybersecurity
Security Intelligence Podcast
by IBM Security
3y ago
With thirty years of experience in the military, JC Vega now shares his experiences as a "gray beard" in the role of a cyber range coach. When asked about transitioning from the military to cybersecurity, JC offers advice that applies across fields: consider a path that lets you prioritize quality of life, career advancement, and job satisfaction however best suits your personal goals. JC explains why military veterans possess innate security training, shares lessons learned from participants in the cyber range, and suggests resources for embarking on a career in cybersecurity (including getti ..read more
Visit website
"You Can Never Have Too Much Encryption"
Security Intelligence Podcast
by IBM Security
3y ago
Data encryption can feel like the enterprise version of a kid's least favorite chore: cleaning their room. "One of the biggest challenges," says Stephanie Balaouras, "is just the inertia against getting started." Considering the ways in which a holistic encryption strategy can reduce security and privacy concerns, breaking through the inertia is worth it. Balaouras, Research Director at Forrester Research, joins Pam and David for a conversation on how to get started on your data encryption strategy; why the cloud is a major use case for encryption; and why the savviest companies prioritize dat ..read more
Visit website
Muscle Memory and Cyber Fitness Training
Security Intelligence Podcast
by IBM Security
3y ago
Just as physical training improves strength and health, cyber fitness training keeps security professionals in shape to handle a breach at a moment's notice—prepared to duck "that virtual cyber punch in the face."  Caleb Barlow, Vice President of IBM Security's X-Force Threat Intelligence group, discusses the importance of going beyond tabletop exercises when training teams to respond to breaches: "The more we can immerse people into what that's going to look like, the better we can train them to be resilient during that event." Barlow explains the importance of building incident response ..read more
Visit website
Digital Identity Trust, Part 3: Powering Digital Growth With Digital Identity Trust
Security Intelligence Podcast
by IBM Security
3y ago
Accelerating growth without sacrificing security — this may be the holy grail of digital transformation. Jason Keenaghan, director of offering management for IBM's identity and access management (IAM) and fraud portfolio, joins this episode of our digital identity trust series to discuss how organizations can effectively identify and authenticate end users without introducing extra complexity or friction. Listen to the complete series at ibm.co/2M2Ixol and learn more about IBM Trusteer at ibm.co/2pGNmt2. We also invite you to play our online game at bit.ly/2QDwtuz ..read more
Visit website
X-Force Red In Action 011: Spotlight on Password Security With Evil Mog
Security Intelligence Podcast
by IBM Security
3y ago
As we prepare to enter 2019, are passwords on their way to obsolescence? Dustin Heywood, a.k.a. Evil Mog, says no. Heywood brings his expertise as a penetration tester and password cracker to this episode of the X-Force Red in Action series [ibm.co/2lUG2YQ]. Listen in for valuable tips on how to improve password security in your organization ..read more
Visit website
Demystifying the Role of AI in Cybersecurity
Security Intelligence Podcast
by IBM Security
3y ago
Artificial intelligence (AI) has been making headlines for several years now, but what's the story behind the hype? And what opportunities and risks does AI present for the security industry in particular? In this episode we're demystifying AI in cybersecurity with the help of three IBM experts: Carma Austin, Worldwide Sales Leader, Security Intelligence SaaS; Doug Lhotka, Executive CyberSecurity Architect, CISSP-ISSAP; and Jeff Crume, IT Security Architect, Distinguished Engineer and IBM Master Inventor. Listen now, and visit http://ibm.co/2kGtZyx to learn more about QRadar Advisor with Watso ..read more
Visit website
X-Force IRIS' Kat Tasiopoulou Envisions the Future of Incident Response
Security Intelligence Podcast
by IBM Security
3y ago
Meet Kat Tasiopoulou. For the past year, Kat has worked on the IBM X-Force Incident Response and Intelligence Services (IRIS) team as a client engagement lead, helping clients train and prepare for proactive incident response. In this episode, Kat discusses her multifaceted X-Force IRIS role, shares how it felt to win the British Computer Society (BCS) 2018 'Young IT Professional of the Year' award, and makes predictions for the future of incident response. To learn more about X-Force IRIS, visit https://ibm.co/2L421re and watch the on-demand webinar, "5 Ways X-Force IRIS Can Help You Manage Y ..read more
Visit website
X-Force Red In Action 010: Spotlight on Phishing Awareness With Chris Sethi
Security Intelligence Podcast
by IBM Security
3y ago
Worried about phishing attacks this holiday season? Senior security consultant Chris Sethi joins this episode of our ongoing X-Force Red in Action series [ibm.co/2lUG2YQ] to discuss how companies like yours can promote phishing awareness to limit overall risk and protect critical data and assets. For more information on X-Force Red, visit ibm.com/xforcered, and check https://securityintelligence.com/xforcered regularly for new X-Force Red in Action podcast episodes ..read more
Visit website
Digital Identity Trust, Part 2: Security Without Sacrificing Customer Experience
Security Intelligence Podcast
by IBM Security
3y ago
How can enterprises deliver the frictionless experience customers demand without compromising security? This is one of the critical questions IBM Trusteer sales leader Shaked Vax takes on in part 2 of our digital identity trust podcast series (find the rest of the series at https://ibm.co/2M2Ixol). Listen in to learn how your organization can establish the foundation it needs to create effective threat prevention logic without under- or overburdening users along their digital experience journeys. Stay tuned for the concluding episode of this series, and in the meantime learn more about IBM Tru ..read more
Visit website

Follow Security Intelligence Podcast on FeedSpot

Continue with Google
Continue with Apple
OR