Security Intelligence Podcast

Security Intelligence Podcast
By IBM Security
About this podcast
Welcome to the Security Intelligence Podcast, where security experts share analysis and insights about the industry. Join security influencers, IBM thought leaders, business partners and other industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.

For even more security content, visit
In this podcast
Latest episodes
Feb. 15, 2018
If you're looking to bring greater awareness to data risk management practices within your organization and among your C-suite, don't miss this podcast, moderated by Paula Musich, of Enterprise Management Associates, and featuring Dan Goodes and Nev Zunic, both of IBM Security. To learn more about data risk management, read Paula’s 3 part blog series, What Data Risk Management Means for the Enterprise in 2018:
Feb. 8, 2018
Heather Ricciuto, Academic Outreach Leader at IBM Security, joins the podcast today to discuss why women are vastly underrepresented in the cybersecurity industry. She also shares examples of the programs and initiatives IBM runs and supports to help close the gender gap. To apply for the Women in Cybersecurity Seminar for College Women, taking place Feb. 15 in Dallas, TX, please send your resume and a cover letter to Heather at [email protected] To learn more about the 5th annual Women in Cybersecurity (WiCys) Conference, happening March 23-24 in Chicago and sponsored by IBM, please visit And to read the article “5 reasons why having women in leadership benefits your entire company,” visit
Feb. 1, 2018
Beginning on Feb. 22 of this year, new data breach and response amendments to the Australia Privacy Act will impact thousands of organizations in Australia and around the world. In this podcast, Chris Hockings, Chief Technology Officer and Master Inventor for IBM Security, talks about the implications of the changes to the Privacy Act in Australia, how organizations can prepare, and what steps they can take to build a best practice incident and response plan. To learn more about the Privacy Act in Australia and to book a complimentary review workshop, visit
Jan. 30, 2018
Episode 8 of the monthly "Deciphering the Cyber Headlines with Paul Ferrillo and Chris Veltsos" series. Just in time for the US president's annual State of the Union address, Paul and Chris are back to deliver a cybersecurity state of the union. Listen now to discover why Paul is pessimistic, why Chis is optimistic, and what two pieces of advice they'd each give C-level executives planning for 2018. RESOURCES: Read Chris' blog on NACD’s 2018 Governance Outlook: Read Chris' blog on the WEF's 2018 Global Risks Report: Download the CyberAvengers' Playbook: Listen to other episodes in the "Deciphering the Cyber Headlines" podcast series:
Jan. 23, 2018
Is your enterprise falling victim to one of the top data security mistakes? In this podcast Rob Westervelt, Research Manager within IDC’s Security Products group [], talks with IBM Security’s Leslie Wiggins about trends in data security, the biggest mistakes today’s organizations are making and, perhaps most importantly, how to avoid common data security pitfalls. To learn more, view the IDC infographic, “Unified Data Encryption: Reduce the Risk of Costly Breaches and Compliance Pain” at
Jan. 16, 2018
Think, IBM’s new premier conference, will take place March 19-22 in Las Vegas, NV. In this podcast, Mitch Mayne and Pam Cobb discuss how Think differs from previous IBM events and preview what participants can expect to experience (innovation speakers, client stories, demos, technical deep dives, guided and open labs, user groups) and achieve (product certifications and more). Read Pam's blog [] for even more event details, and don't forget to register to attend [].
Jan. 9, 2018
In our first podcast of 2018, IBM X-Force Exchange Public Information Officer and frequent host Mitch Mayne talks with Loren Dealy Mahler, president and founder of Dealy Mahler Strategies [], about the one thing that always seems to go wrong during a data breach: Communications. Listen now to their list of five New Year's resolutions that C-level executives should embrace in order to improve their incident response strategies in 2018. To read more from Loren, visit To learn more about the IBM X-Force Command Center and cyber range, visit
Dec. 14, 2017
No one knows for certain what the future holds; however, when it comes to forecasting security trends for the year ahead, the researchers on the IBM X-Force team certainly have the resources and expertise to make some sound predictions. In this podcast, IBM Security VP of Threat Intelligence Caleb Barlow discusses the top five trends that emerged from a recent poll of X-Force experts. The list includes AI vs. AI battles and a new plague of ransomware, but you'll have to tune in to hear the rest. Listen now and leave a comment letting us know which predictions you agree with and what additional trends you expect to see in the new year. And if you're interested in emerging threats, bookmark the IBM X-Force Security Research homepage [] for all the latest reports and thought leadership.
Dec. 12, 2017
Data encryption does not need to be difficult, but there's admittedly more to it than just turning on the encryption faucet. If you’re working toward GDPR readiness, considering cloud migration or just looking for best practices to get encryption right, take 13 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intelligent IBM Encryption" [].
Dec. 7, 2017
In episode 9, Paul Ferrillo and Chris Veltsos conclude the “Take Back Control of Your Cybersecurity Now” podcast series with predictions about the future of cybersecurity. In addition to returning to some of their favorite subjects, such as cognitive computing and the NIST Cybersecurity Framework, they also share their thoughts on cloud security and the Internet of Things (IoT). For more insights from Paul and Chris, listen to their ongoing follow-up podcast series, “Deciphering the Cyber Headlines” []. You can also buy their book [] as a perfect holiday gift for your favorite security practitioner.