POPULARITY
Our guest this week is Bob Stasio, global cyber threat leader at Dupont, a global Fortune 500 company with around 35,000 employees. Bob shares his professional pathway beginning in the U.S. Army, with stops along the way at NSA and U.S. Cyber Command, and at private sector companies like Bloomberg and IBM. In this episode, we get Bob's take on threat intelligence and learn why he thinks automation is one of the key components to future success in securing organizations — both internally and online.
Recorded Future - Inside Threat Intelligence for Cyber Security
Our guest this week is Bob Stasio, global cyber threat leader at Dupont, a global Fortune 500 company with around 35,000 employees. Bob shares his professional pathway beginning in the U.S. Army, with stops along the way at NSA and U.S. Cyber Command, and at private sector companies like Bloomberg and IBM. In this episode, we get Bob’s take on threat intelligence and learn why he thinks automation is one of the key components to future success in securing organizations — both internally and online.
Where can young start-up companies go to find capital and clients to grow their business? If you ask today’s guest, he would say Dream It. Bob Stasio is the Managing Director of Dreamit’s SecureTech. Dreamit Ventures is a fund focused on startups with early traction that are ready to scale. In the last 10 years, Dreamit Ventures has invested in nearly 300 startups now worth over $3B. The fund invests in HealthTech, UrbanTech and smart city technology. In 2018, Dreamit launched SecureTech targeting logical, social and physical security startups. Before joining Dreamit, Bob held multiple roles at IBM Security, leading efforts in Cyber Operations and Threat Hunting. Prior to IBM, Bob worked in the private sector, leading threat intelligence programs at Bloomberg and global financial firms. He also has deep government experience having held positions at NSA’s Cyber Center, U.S. Cyber Command, U.S. Army’s Signals Intelligence Corps, the FAA, and NASA. Bob served as a U.S. Army officer and is a recipient of numerous military awards, including the Bronze Star and Global War on Terrorism Expeditionary Medal. He serves on several advisory boards of multiple startups, holds various technical certifications and is highly regarded in the cybersecurity industry. In this edition of the Drone Radio Show, Bob talks about Dreamit’s SecureTech, it’s unique program to securing funding and clients and how drone start-ups can become part of the next cohort.
This podcast was originally broadcast in November 2017. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn more, read Eric's Security Intelligence blog series on threat hunting [ibm.co/2hQ535Y] and follow both Bob [bit.ly/2haHdAX] and Eric [bit.ly/2znGgNX] on Twitter.
Have questions about what threat hunting is or how and when to use it? Then this is the podcast you've been waiting for. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn even more, read Eric's recent Security Intelligence blog series [https://ibm.co/2hQ535Y] and follow Bob [http://bit.ly/2haHdAX] and Eric [http://bit.ly/2znGgNX] on Twitter.
Have 5 minutes? That’s plenty of time for this episode of Quick Time! Listen now to hear Bob Stasio, Program Director of Cyber Threat Hunting and Analysis at IBM Security, discuss the cognitive security glide path and share his thoughts on the future of cyber threat hunting. To learn more, read Bob’s recent blog on the cognitive security glide path: https://ibm.co/2yKfhuu.
Meet IBM i2, the newest addition to the IBM Security portfolio. i2 has roots in both law enforcement and the intelligence community, where it's been used for nearly three decades. Today, these same tools are becoming a critical component of many organizations' cyber defense operations. In this podcast, host Bob Stasio and his expert panel, consisting of Mike McCracken of IBM and Katie Crotty and Dave Williams of Praescient Analytics, trace the evolution of i2. They also share a variety of fascinating cross-industry use cases that reveal how i2 facilitates analysis of large volumes of data and identifies key patterns and connections that even the most highly skilled analysts would struggle to recognize on their own. To learn more about i2 and see an interactive demo, visit https://ibm.co/2uKWaiu.
This podcast examines a new trend that is seeing private companies turn to people, processes and technologies from the intelligence community as a means of grappling with an increasingly sophisticated threat landscape. Listen now to hear Bob Stasio and Mike McCracken, both of IBM Security, and Mark D. Young of IronNet Cybersecurity discuss the development of this intelligence-led security trend as well as its goals and its potential for success. To view a live demo on how to counter and mitigate cyber threats more quickly, visit http://ibm.co/2nxhB2i.
Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategies. Threat hunting takes advantage of all available data sources to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats. To learn more about cyber threat hunting, listen to this podcast with Bob Stasio, Scott Schober and Morgan Wright. You can also watch the on-demand webinar,"Why You Need to be Hunting Cyber Threats," at http://bit.ly/2oOWNHg.