Security Intelligence Podcast

Security Intelligence Podcast

IBM Security

Description: Welcome to the Security Intelligence Podcast, whe…

Browse Archive

Are You Prepared to Respond to a Destructive Malware Attack?

Play Download media
What’s the difference between a destructive attack and a traditional breach? “Destructive malware is malicious software that has the capability to render an effective system inoperable and also challenges reconstitution,” explains Charles DeBeck, a senior cyber threat intelligence researcher a...

Adapting to Evolving Data Privacy Regulations

Play Download media
As regulations such as GDPR and CCPA go into effect around the world, organizations are seeing the impact of data privacy laws on their businesses. As recent headlines show, fines are one possible impact, but they shouldn't be the only impetus to review privacy compliance and run through incident re...

What Factors Contribute to the Cost of a Data Breach?

Play Download media
On average, according to the 2019 Cost of a Data Breach Report, it takes 279 days to contain a data breach, up from 266 days last year. "I think it's true we're getting better identifying data breaches," says Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. However, at the same time...

The Evolving Security Operations Center

Play Download media
"I think we've really seen the concept of a SOC grow and evolve over the past 10 years or so," says Emma Bickerstaffe, Senior Research Analyst at the Information Security Forum. As your business and the threat landscape change, how do you keep pace with your security operations center (SOC)? 

 ...

Reducing Third Party Risk

Play Download media
"We, as CISOs, and as risk management practitioners, and as risk executives, have to be aware that a risk rating vendor isn't the entire answer to our risk posture," says Shamla Naidoo, a Managing Partner at IBM Security who was most recently the global CISO for IBM. "It is a part of the answer, not...

Development Agility and Open Source Vulnerability Prioritization

Play Download media
"Open source is increasingly being acknowledged as an indispensable means for promoting and driving innovation," says Rami Elron, Senior Director of Product Management at WhiteSource. But at the same time, there's been a proliferation in open source security vulnerabilities. ...

Lateral Movement: Combating High-Risk, Low-Noise Threats

Play Download media
"What I like to tell people is that when you have one computer that's infected, that's annoying," says Charles DeBeck, a member of IBM Security's Threat Intelligence Production team. "When you have 1,000 computers that's infected, that's a problem."...

Travel Security: Why Data Safety Doesn't Get a Day Off

Play Download media
Sunscreen? Check. Boarding pass? Got it. The resolve not to connect to the airport WiFi? Getting there.  

This summer, add cyber hygiene best practices to your travel checklist. Caleb Barlow, Vice President of X-Force Threat Intelligence for IBM Security, shares insights on travel and transportati...

Lessons from a Gray Beard: Transitioning from the Military to Cybersecurity

Play Download media
With thirty years of experience in the military, JC Vega now shares his experiences as a "gray beard" in the role of a cyber range coach. When asked about transitioning from the military to cybersecurity, JC offers advice that applies across fields: consider a path that lets you prioritize quality o...

Foundations for a Winning Operational Technology (OT) Security Strategy

Play Download media
Conversations about operational technology (OT) security have been bubbling up more and more, and justifiably so. The term may not be as well known as it should be " or even entirely settled upon yet " but the consequences of risk in operational technology environments impact our daily lives...
viewing 1 - 10 (131 total)

Subscribe & Follow