POPULARITY
Are you curious about how organizations detect and respond to cyber threats? In this Audio, we delve into the world of Cyber Threat Hunting and Digital Forensics and Incident Response (DFIR). We'll explore the steps involved in identifying and mitigating malware attacks, and discuss the critical role of DFIR in cybersecurity. Whether you're a beginner or a seasoned professional, this video provides valuable insights into the methodologies used to safeguard digital assets. Stay tuned and learn how to strengthen your organization's defense against cyber threats!
Guests: Jules Okafor, BISO and CEO and Founder of RevolutionCyberOn LinkedIn | https://www.linkedin.com/in/julesmgmt/David Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInOn LinkedIn | https://www.linkedin.com/in/david-meece-cybertech-dave/Jay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerOn LinkedIn | https://www.linkedin.com/in/secopsjay/?originalSubdomain=uk____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesHello to all our listeners out there! Marco and Sean here, and we are thrilled to bring you a special episode today. For the third consecutive year, we've been invited to host a panel for an event that's become a cornerstone for the infosec community. And guess what? We've been involved right from its inception. That's right! We are talking about the SOC Analyst Appreciation Day™, a day designed to shed light on the unsung heroes of the cybersecurity world.Now, for those new to this, let us dive a bit deeper. The life of a SOC analyst isn't always glamorous. They often find themselves caught in the whirlwind of immense workload, sometimes feeling like the weight of the entire digital universe rests on their shoulders. Overworked and, sadly, often underappreciated, these analysts face challenges that can lead to burnout and, ultimately, a high turnover rate.Enter Devo, the brilliant minds behind the establishment of the SOC Analyst Appreciation Day™. Their mission? To offer a hearty shoutout to these hardworking individuals and to prompt organizations globally to step up, recognizing the importance of their analysts' satisfaction and mental well-being.If you've been following the event, you know that this year was jam-packed with on-demand content that was nothing short of enlightening. With presentations from some of the most influential thought leaders in the infosec community, topics ranged from real-life use cases to the intricacies of SOC automation and the critical importance of managing mental well-being in such high-pressure roles.But, listeners, we have a treat for you. Today, we're going to dive deep into one of the event's highlights. We had the privilege of moderating a panel that, trust us, you won't want to miss. So, whether you're a budding SOC analyst, a seasoned pro, or just someone with a keen interest in the world of infosec, sit back, relax, and let's delve into some insightful discussions.This panel will take a look at the ins and outs of SOC life. From the tier one analyst role to leadership positions to everything in between, the day-to-day in each type of SOC can look very different — and this panel will cover all perspectives. Moderated by Sean Martin and Marco Ciappelli from ITSP MagazineJules Okafor, BISO and CEO and Founder of RevolutionCyberDavid Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInJay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerThanks for tuning in to this special episode. Let's get started!____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guests: Jules Okafor, BISO and CEO and Founder of RevolutionCyberOn LinkedIn | https://www.linkedin.com/in/julesmgmt/David Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInOn LinkedIn | https://www.linkedin.com/in/david-meece-cybertech-dave/Jay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerOn LinkedIn | https://www.linkedin.com/in/secopsjay/?originalSubdomain=uk____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesHello to all our listeners out there! Marco and Sean here, and we are thrilled to bring you a special episode today. For the third consecutive year, we've been invited to host a panel for an event that's become a cornerstone for the infosec community. And guess what? We've been involved right from its inception. That's right! We are talking about the SOC Analyst Appreciation Day™, a day designed to shed light on the unsung heroes of the cybersecurity world.Now, for those new to this, let us dive a bit deeper. The life of a SOC analyst isn't always glamorous. They often find themselves caught in the whirlwind of immense workload, sometimes feeling like the weight of the entire digital universe rests on their shoulders. Overworked and, sadly, often underappreciated, these analysts face challenges that can lead to burnout and, ultimately, a high turnover rate.Enter Devo, the brilliant minds behind the establishment of the SOC Analyst Appreciation Day™. Their mission? To offer a hearty shoutout to these hardworking individuals and to prompt organizations globally to step up, recognizing the importance of their analysts' satisfaction and mental well-being.If you've been following the event, you know that this year was jam-packed with on-demand content that was nothing short of enlightening. With presentations from some of the most influential thought leaders in the infosec community, topics ranged from real-life use cases to the intricacies of SOC automation and the critical importance of managing mental well-being in such high-pressure roles.But, listeners, we have a treat for you. Today, we're going to dive deep into one of the event's highlights. We had the privilege of moderating a panel that, trust us, you won't want to miss. So, whether you're a budding SOC analyst, a seasoned pro, or just someone with a keen interest in the world of infosec, sit back, relax, and let's delve into some insightful discussions.This panel will take a look at the ins and outs of SOC life. From the tier one analyst role to leadership positions to everything in between, the day-to-day in each type of SOC can look very different — and this panel will cover all perspectives. Moderated by Sean Martin and Marco Ciappelli from ITSP MagazineJules Okafor, BISO and CEO and Founder of RevolutionCyberDavid Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInJay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerThanks for tuning in to this special episode. Let's get started!____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Adam Lange pracuje jako VP Head of Cyber Threat Hunting w Standard Chartered Bank. Opowiada na czym polega Threat Hunting oraz co to jest phishing. Z wywiadu dowiesz się jak rozpocząć swoją przygodę z bezpieczeństwem a także co zrobić, gdy doszło do ataku na naszą osobę. Rozmawiamy także o PSD2, SIM-swap i metodach działania internetowych przestępców. Transkrypcja wywiadu: https://security.szurek.pl/adam-lange.html 0:16 Kim jesteś, co robisz? 0:42 Na czym polega Threat Hunting? 1:27 Proaktywne podejście do obrony 2:25 Co jest najtrudniejsze w Twojej pracy 3:26 Stosunek zagrożeń do fałszywych alarmów 4:04 Metody działania przestępców 5:25 Czy automatyzacja pracy jest możliwa 6:20 Co z małymi firmami 7:46 Jak zastąpić IOC 10:00 Makra w Office 11:45 Chmura a bezpieczeństwo 13:02 Praca zdalna i własne urządzenia 14:29 Na czym polega phishing 15:48 Edukacja dzieci 17:04 Jak rozpoznać prawdziwą witrynę banku 19:18 Gdzie zgłosić złośliwą witrynę 21:09 Usunięcie strony z Internetu 24:01 Co sądzisz o PSD2 26:16 SIM-swap 28:12 Rada dla początkujących 29:45 Adam Lange programuje w ... 31:40 Ulubiony przykład phishingu 32:51 Metoda picture-in-picture 33:46 Atak homograficzny 34:51 Kto jest odpowiedzialny za kradzież 36:56 Co zrobić gdy padliśmy ofiarą ataku Grupa na Facebooku: https://www.facebook.com/groups/od0dopentestera/ Subskrybuj kanał: https://www.youtube.com/c/KacperSzurek?sub_confirmation=1 Spotify: https://open.spotify.com/show/4qGXKJyJicRJ0PfAX05V9O Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy81M2E4OTNjL3BvZGNhc3QvcnNz Apple Podcasts: https://itunes.apple.com/us/podcast/kacper-szurek/id1410369860?mt=2&uo=4 Anchor: https://anchor.fm/kacperszurek/ #podcast #szurkogadanie #lange
The ever-evolving cyber threat and how to protect ourselves against It continues to be at the top of the list of priorities for most IT Pros and execs. As technology and our data is more crucial than ever to our day to day operations, the threat of disruption to it and the impact that will have grows almost exponentially. As we head into February of 2019, what is the current state of the threat? How is it evolving? And how do we build a plan to handle it? That is the topic of this week's Tech Interviews, as I'm joined by Co-Founder and CPO of Infocyte Inc. Chris Gerritz to discuss the art of Cyber Threat Hunting and taking a more proactive approach to the cybersecurity challenge. In this chat with Chris, we take a look at what we mean by cyber threat hunting, the importance of a proactive approach to cyber threats and why we should "assume breach" when we build our cybersecurity defences. We also discuss current threats, emerging trends from commodity malware to identity theft, as well as avoiding been the "weakest Gazelle in the pack". Chris shares some insights into developing a cyber threat hunting strategy and how to build a secure environment, as well as providing some background on Infocyte's approach to the challenge If you enjoyed the show, then please leave us a review and why not subscribe to ensure you get the latest Tech Interviews episode. Thanks for listening. Full show notes are here : https://wp.me/p4IvtA-1DS
Welcome to the first Tech Interviews Podcast of 2019, we already have a bunch of shows lined up and ready to go over the next few weeks, there’s a wide range of topics including Social Media and the IT Pro, Cloud Native Databases and Cyber Threat Hunting, all coming up soon. But how else do you start a new podcast year than by dusting off the crystal ball and looking ahead to some of the trends and developments that will affect your IT decision making, strategies and day to day work in tech. Our look ahead this year is focused on the world of data management as I’m joined by Dave Russell, VP, Enterprise Strategy at Veeam. Dave’s career of almost 30 years has been predominately focussed on data management, specifically backup and has included working at some of the world’s biggest data management companies as well as a stint as a respected analyst at Gartner. We discuss a wide range of topics and Dave gives some thoughtful insight into the trends he expects to see impact us during 2019. During the show, we discuss, what keeps him so enthusiastic about the data industry, key trends including the increased use of multi-cloud, flash storage becoming more commonplace, the development of predictive analytics, the changing role of people in technology as well as some trends that are likely to continue in 2018 and may well inhibit our ability to adopt some of the technology we'd like. It's a fascinating chat, enjoy the show. For full show notes: https://wp.me/p4IvtA-1CJ
Learn what it takes to be a modern-day threat hunter with senior security researcher Jeremy Martin.
Have 5 minutes? That’s plenty of time for this episode of Quick Time! Listen now to hear Bob Stasio, Program Director of Cyber Threat Hunting and Analysis at IBM Security, discuss the cognitive security glide path and share his thoughts on the future of cyber threat hunting. To learn more, read Bob’s recent blog on the cognitive security glide path: https://ibm.co/2yKfhuu.
Nuix Cyber Threat Analysis Team members Grayson Lenik and Chris Brewer dial in to discuss the concept of Cyber Threat Hunting ahead of our August 29, 2017 webinar on the topic.
Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategies. Threat hunting takes advantage of all available data sources to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats. To learn more about cyber threat hunting, listen to this podcast with Bob Stasio, Scott Schober and Morgan Wright. You can also watch the on-demand webinar,"Why You Need to be Hunting Cyber Threats," at http://bit.ly/2oOWNHg.