Security Intelligence Podcast

By IBM Security

About this podcast   English    United States

Welcome to the Security Intelligence Podcast, where security experts share analysis and insights about the industry. Join security influencers, IBM thought leaders, business partners and other industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security.
For even more security content, visit https://securityintelligence.com.
111 episodes
In this podcast
April 19, 2018
This podcast was originally broadcast in November 2017. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn more, read Eric's Security Intelligence blog series on threat hunting [ibm.co/2hQ535Y] and follow both Bob [bit.ly/2haHdAX] and Eric [bit.ly/2znGgNX] on Twitter.
April 12, 2018
In this podcast, IBM Senior Security Architect Joe Gray outlines the basics of social engineering, including what it is, why it can be so dangerous and what companies can do protect themselves, their employees and their assets. Listen now for a firsthand account of Joe's vast experience with Open Source Intelligence (OSINT) collection and social engineering. For more from Joe, attend his RSA Conference session, "Compromising a Fortune 500 Business without Hacking a Thing!" at 9:15 a.m. on April 19 [http://bit.ly/2Hw1aii] or visit his website, Advanced Persistent Security [http://bit.ly/2GT8aUZ].
April 3, 2018
IBM's recently released "Future of Identity Study" reveals global and generational preferences on authentication. Among the study's many interesting findings, it was discovered that consumers of different generations have different preferences on authentication and take substantially different approaches to cybersecurity overall. IBM Security's Dillon Townsel recently interviewed Payton, a 24 year-old community manager, and Susan, a 68 year-old grandmother and retired schoolteacher about their online preferences. Listen now to discover if Payton and Susan are representative of their respective generations, or if they break the mold. For more content from the "Future of Identity" series, visit https://ibm.co/2t2pnZX. To read the complete report, visit https://ibm.co/2sZdSlV.
March 27, 2018
In the world of cybersecurity, collaboration is much more than a buzzword. In this podcast, Mitch Mayne, Public Information Officer for IBM X-Force Exchange, talks with George Mina, Program Director of IBM Security Strategic Alliances, about the importance of collaboration among different security products and even between different security vendors. To learn more about collaborative defense in depth, read this recent blog: https://ibm.co/2GgyNTR. To view the IBM Security App Exchange, visit http://bit.ly/2uocB8L, and to download the QRadar App for Cisco Firepower mentioned by George, visit http://bit.ly/2GdESAe. Additional podcasts in this series on collaboration will follow in the weeks and months ahead, so stay tuned!
March 20, 2018
When it comes to cybersecurity, there's no such thing as a simple project. There's also no "one size fits all" approach. In this podcast, IBM Security consultants Katrina Avila and Vanja Kulic address these challenges head-on and offer actionable tips for keeping your cybersecurity project on track. To learn more, visit https://www.ibm.com/security or listen to our 6-part podcast series, "A CISO’s Guide to Obtaining Budget" [https://ibm.co/2pqJc95].
March 13, 2018
IBM Think 2018 kicks off in Las Vegas on March 19 — less than a week from now. In this short podcast, Eric Cole [http://bit.ly/2znGgNX] and Shira Rubinoff [http://bit.ly/2p88U1O] discuss why they’re excited to attend Think, what sessions they’re most looking forward to and what hot trends and topics they expect to dominate the conversation. For more Think content, visit https://ibm.co/2FB8KKz or register to attend at https://ibm.co/2p8HoRM and save $300 with promo code TK18SECCOM.
March 6, 2018
As we approach International Women’s Day on March 8, Bridgette Pepper joins IBM Security Academic Outreach Leader Heather Ricciuto to discuss her unexpected entrance into the cybersecurity field and her experience first as an IBM intern and now as a full-time team member. Bridgette’s passion for both security and for bringing greater gender diversity to the industry shine through her story and offer inspiration to other girls and women interested in pursuing security careers. To learn more about the Fifth Annual Women in Cybersecurity conference, taking place in Chicago later this month, visit http://bit.ly/2so4KHp. And if you attend that event, be sure to look for both Bridgette and Heather at the IBM Security booth.
Feb. 27, 2018
In order to better understand the latest trends in consumer identity protection, IBM Security recently commissioned a global research study to learn more about consumers' views on passwords, biometrics and multifactor authentication. In this podcast, Trilochan Sehgal, IBM Security's APAC Segment Leader for Identity and Access Management, discusses the survey's results and what these findings mean for both consumers and enterprises in the Asia-Pacific region and beyond. Download the complete "Future of Identity" Study [https://ibm.co/2sZdSlV]. and for additional insights read the accompanying blog series: https://ibm.co/2t2pnZX.
Feb. 20, 2018
Following the enthusiastic response to their "Get Smarter About Disaster Response — Five Resolutions For 2018" [https://ibm.co/2mc4tAP], Mitch Mayne and Loren Dealy Mahler are back to take a more in-depth look at the first resolution on their list: conducting a risk assessment. Listen now to learn about the five distinct data types your enterprise may hold or interact with and why performing an effective risk assessment means widening your lens to view how a data breach might affect your organization's reputation and business processes as well as its security posture. For more insights from Loren, visit the Communications War Room [http://bit.ly/2ErCswO] and to hear more from Mitch, subscribe to the Security Intelligence podcast [https://apple.co/2FizUmi] and never miss an episode.
Feb. 15, 2018
If you're looking to bring greater awareness to data risk management practices within your organization and among your C-suite, don't miss this podcast, moderated by Paula Musich, of Enterprise Management Associates, and featuring Dan Goodes and Nev Zunic, both of IBM Security. To learn more about data risk management, read Paula’s 3 part blog series, What Data Risk Management Means for the Enterprise in 2018: https://ibm.co/2EumodN.

Podcasts like "Security Intelligence Podcast"   ·   View all

By Charlie Harary: Lawyer turned Entrepreneur, CEO, Professor and Radio Host
Disclaimer: The podcast and artwork embedded on this page are from IBM Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.