Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2

Data-Driven Defense: Exploring Global Cybersecurity and the Human Factor

This is a podcast episode titled, Data-Driven Defense: Exploring Global Cybersecurity and the Human Factor. The summary for this episode is: <p>Today's cybersecurity landscape is about less about knowing all about hashes and encryption, and more about understanding data, politics, and how adversaries operate in the real world. In this episode, TJ Sayers, Manager of the MS and EI-ISAC’s Cyber Threat Intelligence team at the Center for Internet Security, joins us to talk about data-driven defense and how the human factor plays a much bigger role in cybersecurity defense than we realize. </p><p><br></p><p>Key Takeaways: </p><ul><li>[00:01&nbsp;-&nbsp;01:10] Introduction</li><li>[01:20&nbsp;-&nbsp;03:49] Meet TJ Sayers, Manager of Cyber Threat Intelligence at The Center for internet Security</li><li>[03:50&nbsp;-&nbsp;06:53] Unconventional paths to network engineering</li><li>[06:54&nbsp;-&nbsp;09:29] The most prolific threats happening today, and what we should be worried about</li><li>[09:30&nbsp;-&nbsp;11:19] Criminal syndicate models in the cyber world</li><li>[11:21&nbsp;-&nbsp;15:30] A defense in-depth layered approach to network fires and alerts</li><li>[15:45&nbsp;-&nbsp;21:25] Observing malicious activity on the network and determining incident information</li><li>[21:59&nbsp;-&nbsp;24:55] Comparing tremendous amounts of data, and subjectivity</li><li>[24:56&nbsp;-&nbsp;26:57] Combatting alert fatigue through a Security Information Event Manager platform</li><li>[26:59&nbsp;-&nbsp;29:20] The mission of The Center for Internet Security</li><li>[29:21&nbsp;-&nbsp;30:43] Working with organizations to monitor, audit, defend, and report on cyber threats</li><li>[30:43&nbsp;-&nbsp;33:30] What types of telemetry data TJ and his team use to detect threats</li><li>[33:31&nbsp;-&nbsp;39:43] The focus on improving the cybersecurity landscape</li><li>[39:53&nbsp;-&nbsp;43:09] Punitive measures to combat bad actors</li><li>[43:12&nbsp;-&nbsp;50:09] Threats to our public utilities grid</li></ul>
Introduction
01:01 MIN
Meet TJ Sayers, Manager of Cyber Threat Intelligence at The Center for Internet Security
02:28 MIN
Unconventional paths to network engineering
03:03 MIN
The most prolific threats happening today, and what we should be worried about
02:35 MIN
Criminal syndicate models in the cyber world
01:49 MIN
A defense in-depth layered approach to network fires and alerts
04:08 MIN
Observing malicious activity on the network and determining incident information
05:39 MIN
Comparing tremendous amounts of data, and subjectivity
02:56 MIN
Combatting alert fatigue through a Security Information Event Manager platform
02:01 MIN
The mission of The Center for Internet Security
02:21 MIN
Working with organizations to monitor, audit, defend, and report on cyber threats
01:21 MIN
What types of telemetry data TJ and his team use to detect threats
02:46 MIN
The focus on improving the cybersecurity landscape
06:12 MIN
Punitive measures to combat bad actors
03:16 MIN
Threats to our public utilities grid
06:57 MIN