Into the Breach by IBM

Follow Into the Breach by IBM
Share on
Copy link to clipboard

Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are pr


    • Feb 16, 2022 LATEST EPISODE
    • infrequent NEW EPISODES
    • 25m AVG DURATION
    • 7 EPISODES


    Search for episodes from Into the Breach by IBM with a specific topic:

    Latest episodes from Into the Breach by IBM

    Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks

    Play Episode Listen Later Feb 16, 2022 34:13


    Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.

    Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape

    Play Episode Listen Later Feb 9, 2022 28:21


    Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn't disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.

    I'd Like to Buy a Vowel: The Price of Poor Communication During a Data Breach

    Play Episode Listen Later Feb 2, 2022 29:15


    When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.

    Cybersecurity Superheroes Next Gen: How Higher-Ed Helps Them Find Their Crime-Fighting Niche

    Play Episode Listen Later Jan 26, 2022 27:04


    Criminals don't seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.

    Lured To The Dark Side The Criminal Hacker Journey Pt. 2

    Play Episode Listen Later Jan 19, 2022 30:32


    Part 2 of this two-part episode looks at the flip side of criminal hacks —the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.

    Lured To The Dark Side: The Criminal Hacker Journey Pt. 1

    Play Episode Listen Later Jan 12, 2022 23:48


    In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.

    Into the Breach - Trailer

    Play Episode Listen Later Dec 24, 2021 2:25


    Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you'll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you'll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty… Join your host Mitch Mayne, IBM X-Force Public Information Officer and former journalist and, together, let's venture into the breach.

    Claim Into the Breach by IBM

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel