40 min

Remitly’s Jason Craig on Building Better Strategies for Identity, Logging, and Threat Modeling Detection at Scale

    • Technology

On this week's episode of the Detection at Scale podcast, Jack talks with Jason Craig, Director - Threat Detection & Response at Remitly. They discuss the common TTPs of threat actors and how organizations can better protect against them by adopting hardware-backed authentication, a risk-based approach to logging, and building their threat modeling. They also talk about why organizations should move away from cellular MFA, the need for more behavioral profiling, and advice for security professionals.
Topics discussed:
The common TTPs of threat actors and conglomerates like Lapsus$ and what organizations need to know to protect themselves against them.
Why enterprises should rely on hardware-backed authentication rather than SMS MFA on cellular.
How to take a better approach to identity management by using hardware-backed authentication and behavioral profiling that eliminates background noise.
Why threat modeling begins with knowing what you do as an organization and what you have that's valuable to an attacker.
How to take a risk-based approach to understanding which user data or sensitive information to protect first.
Why an accurate asset inventory is a precursor to detection and response.
Advice to security professionals and organizations on "knowing thyself" and codifying adversary tracking.

On this week's episode of the Detection at Scale podcast, Jack talks with Jason Craig, Director - Threat Detection & Response at Remitly. They discuss the common TTPs of threat actors and how organizations can better protect against them by adopting hardware-backed authentication, a risk-based approach to logging, and building their threat modeling. They also talk about why organizations should move away from cellular MFA, the need for more behavioral profiling, and advice for security professionals.
Topics discussed:
The common TTPs of threat actors and conglomerates like Lapsus$ and what organizations need to know to protect themselves against them.
Why enterprises should rely on hardware-backed authentication rather than SMS MFA on cellular.
How to take a better approach to identity management by using hardware-backed authentication and behavioral profiling that eliminates background noise.
Why threat modeling begins with knowing what you do as an organization and what you have that's valuable to an attacker.
How to take a risk-based approach to understanding which user data or sensitive information to protect first.
Why an accurate asset inventory is a precursor to detection and response.
Advice to security professionals and organizations on "knowing thyself" and codifying adversary tracking.

40 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider