178 episodes

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

Security Intelligence Podcast IBM Security

    • Technology

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit https://securityintelligence.com.

095940

    Gender Diversity in Security

    Gender Diversity in Security

    "It's work to put together and come up with a diverse panel," co-host Pam Cobb observes about her work in the cybersecurity industry. "And diversity here is not just male and female. It is backgrounds and ways of thinking, and all of the different ways that we think of diversity."

    Bestselling author and entrepreneur Jane Frankland, whose company Cyber Security Capital focuses on gender inclusion in science, joins the podcast for a discussion about diversity in cybersecurity, particularly recruiting and retaining women. Cobb and Frankland discuss the skills that are needed in the security industry, how professionals can raise awareness about the skills gap, what people can do to get a foot in the door, and the benefits of a more diverse workforce. "I'm obsessional about this," Frankland says, "to be that change agent, and to enable both women coming into it and women already in it so that they can progress through the industry at whatever level that they want to be at."

    For more security stories, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

    • 30 min
    Cyber Resilience for State and Local Governments

    Cyber Resilience for State and Local Governments

    "State and local governments’ IT infrastructure is currently in a state of what we would call transformative change...making information technology now a primary medium for citizens to interact with their local government," explains Claire Zaboeva, an expert in identifying and assessing cyber-based threats for IBM X-Force IRIS. For all the benefits these changes bring, there's a flip side: there are now more vectors for threat actors to conduct malicious activities within government infrastructures. 

    Why are threat actors targeting state and local governments and how can states protect public infrastructure? Melissa Frydrych, who researches cyber threat intelligence for IBM X-Force IRIS, joins Zaboeva in a conversation about the kinds of preventative measures states are taking to protect everything from citizens to utilities to elections. 

    For more security stories and to learn more about the research covered in this episode, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

    • 27 min
    Ransomware and Operating Under Maximum Pressure

    Ransomware and Operating Under Maximum Pressure

    Recovering from a ransomware attack isn't like paying your electric bill; there's no guarantee that the lights suddenly come back on. How, then, should organizations like municipalities and hospitals plan to remediate in the case of a ransomware attack — or better yet, take preventative security measures?

    Matthew DeFir and Robert Gates, both members of the IBM X-Force IRIS team, share their advice on how organizations can prevent ransomware attacks. They discuss why attackers choose moments when they can apply maximum pressure, the importance of backing up systems, insights into taxpayers' views on ransomware, and why organizations should not pay the ransom. Plus, Pam and David discuss how ransomware has impacted the cities they live in. 

    For more security stories, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

    • 32 min
    Cloud Security and the Road to Transformation

    Cloud Security and the Road to Transformation

    Cloud is not the ultimate destination; it's the path to an end goal. "The idea of cloud is to get you a modern architecture," says Vikram Chhabra, who leads product management for IBM Security Services with a focus on cloud and infrastructure security. "The destination is transformation to help you innovate and drive modern experiences for your end customers."

    Chhabra identifies multiple challenges as CISOs steer their businesses down this path to a modern architecture: talent, cloud controls, centralized strategy, compliance. Security — beginning with automation — can act as an enabler in light of these challenges. Chhabra chats with David about types of cloud models, who the CISO should partner with on cloud migration, and how to manage threats and prove continuous compliance in a cloud environment. Plus, Pam and David discuss their opinions on pineapple pizza (it's relevant, promise). 

    For more security stories, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

    • 35 min
    Are You Prepared to Respond to a Destructive Malware Attack?

    Are You Prepared to Respond to a Destructive Malware Attack?

    What’s the difference between a destructive attack and a traditional breach? “Destructive malware is malicious software that has the capability to render an effective system inoperable and also challenges reconstitution,” explains Charles DeBeck, a senior cyber threat intelligence researcher at IBM X-Force IRIS.

    A kind of attack originally associated with nation-states, new research suggests an expanding trend in who is employing destructive attacks, and where. Wendi Whitmore, director of the IBM X-Force Threat Intelligence team, says, “The average cost of one of these attacks — a destructive incident versus a traditional breach — is actually 61 times higher.”

    DeBeck and Whitmore join our hosts for a conversation about the evolution of destructive attacks, how organizations can defend against them, and how to best prepare for remediation.

    For a further look at trends in destructive attacks, visit SecurityIntelligence.com: https://ibm.co/2OFUHs5

    • 37 min

Top Podcasts In Technology

Listeners Also Subscribed To