Security Intelligence Podcast

Welcome to the Security Intelligence Podcast, where security experts share analysis and insights about the industry. Join security influencers, IBM thought leaders, business partners and other industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. Our podcast topics range from application, cloud and mobile security to data, fraud and endpoint protection, as well as analysis of the latest research and vulnerability discoveries. Listen to or download our podcasts to understand how current trends may affect your business and how to best prepare for worst case scenarios. For even more security content, visit https://securityintelligence.com.

https://securityintelligence.com

subscribe
share


 
 

    WannaCry Ransomware: State of the Attack


    In this short podcast, IBM X-Force Manager John Kuhn shares the latest updates on the WannaCry/WanaCrypt0r 2.0 ransomware attack and highlights some of the lessons companies should take away from this incident. RESOURCES: - To learn more about the technical details of the WannaCry attack, visit the IBM X-Force Exchange [http://bit.ly/2qjEs6l]. - To watch the on-demand webinar, "WannaCry Ransomware Attack: What to Do Now," visit http://bit.ly/2pTiNOs. - To download the Ransomware Response...


    share





    5m
     

    Insights on WannaCry from IBM Security VP, Caleb Barlow, and IBM X-Force IRIS Lead, Kevin Albano


    Caleb Barlow, Vice President of Threat Intelligence at IBM Security, and Kevin Albano, IBM X-Force IRIS Global Lead for Threat Intelligence, have the information you need on the WannaCry/WanaCrypt0r 2.0 ransomware attack. On Friday, May 12, in the midst of what would become the biggest ever global ransomware attack, they shared their insights on the developing situation and offered recommendations for organizations that may be impacted. RESOURCES: - To learn more about the technical...


    share





    5m
     

    Certifications and Risk Frameworks for Maritime Security


    In this final episode of our 3-part maritime security podcast series, Cherise Gutierrez joins IBM's Diana Kelley to discuss risk frameworks and certification options in the maritime space. Gutierrez led the world’s first program for offshore drilling rigs to achieve "Achilles Practices Certification" and currently serves as a senior consultant with Meridian.US. To learn more, listen to our complete series on maritime security [http://bit.ly/2r3oVoh] and read more about the Achilles...


    share





    18m
     

    A Salute to Our Teachers and Mentors


    In celebration of National Teacher Appreciation Week, currently underway in the U.S., four of IBM Security's top subject matter experts have come together for a special podcast honoring their most memorable teachers and mentors. Listen now to hear Limor Kessem, Pam Cobb, Diana Kelley and Neil Jones reflect on the teachers who shaped their young minds or guided them on the path to their current careers. Visit https://securityintelligence.com/ to read the latest security content from all the...


    share





    17m
     

    On the Complexity of Incident Response in Maritime Security


    Applying modern security concerns to the ancient profession of shipping can be a serious challenge. Capt. David Nichols (ret.) is a veteran of the U. S. Coast Guard officer and served as legal advisor and Chief of Staff to the Federal On Scene Coordinator during the aftermath of the Deepwater Horizon oil spill. Today, Nichols brings his extensive experience in the field of marine safety, security and response to the podcast. To learn more, listen to our complete series on maritime security...


    share





    22m
     

    Take Back Control of Your Cybersecurity... Again


    If you enjoyed the "Take Back Control of Your Cybersecurity Now" podcast series that concluded earlier this spring, you won’t want to miss this follow-up conversation in which Paul Ferrillo and Chris Veltsos discuss the scourge of ransomware and the importance of endpoint security. For even more security insights from Paul and Chris, listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [http://bit.ly/2p0OC7G] or download their e-book of the same name...


    share





    15m
     

    An Introduction to Maritime Cybersecurity


    Following the attack on the Maersk Alabama in 2009, former Marine Officer Jonathan McConnell founded Meridian.US, which provides security services and consulting for merchant shipping vessels. In a recent conversation with IBM's Diana Kelley, McConnell outlined some of the main security concerns in the maritime environment, emphasizing how these both reflect and differ from the security concerns faced by other industries. To learn more, listen to our complete series on maritime security...


    share





    16m
     

    The Art of Cyber Threat Hunting


    Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategies. Threat hunting takes advantage of all available data sources to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats. To learn more about cyber threat hunting, listen to this podcast with Bob Stasio, Scott Schober and Morgan Wright. You can also...


    share





    35m
     2017-04-20

    IoT Security Fact #5: As Data Accumulates, Exposure Issues Will Increase


    In this conclusion to the "Five Indisputable Facts about IoT Security" podcast series, we look at Fact #5: As data accumulates, exposure issues will increase. IoT devices are quietly and constantly collecting massive amounts of personal and sensitive data, from audio recordings to GPS locations to heart rate readings. If all this data is not managed, secured and eventually destroyed, the results may lead to loss of privacy and serious issues of data ownership. To learn about all five...


    share





    15m
     2017-04-18

    IoT Security Fact #4: Weak Configurations Will Persist


    This episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #4: Weak configurations will persist. Changing the default configurations of an IoT device takes thought and effort, and for this very reason it too often does not happen. Rather than leaving security in the hands of the end user, device manufacturers should ensure that security options are enabled either by default or as part of an initial setup process. To learn about all five indisputable facts of IoT...


    share





    13m
     2017-04-11