Fraud Protection

Cyber Beat Live: Searching for Intelligence — Understanding a Different Dimension of Security

Play the latest episode
May 23, 2017
17 minutes


Listen to the Security Intelligence Podcast wherever you get your podcasts.

Cyber Beat Live: Searching for Intelligence — Understanding a Different Dimension of Security
May 23, 2017
| |
< 1 min read

In recent years, both public and private organizations have found themselves caught in a seemingly endless battle with cybercriminals. There is certainly no shortage of media reports about small groups of malicious actors stealing millions of dollars through various fraud schemes and cyber attacks. In the past week alone, the WannaCry ransomware attack struck businesses around the world and dominated global headlines.

From this chaos we have seen an interesting solution emerge: Private companies are increasingly turning to people, processes and technologies from the intelligence community in order to grapple with an ever more sophisticated threat landscape.

In this podcast, IBM’s Bob Stasio discusses the intelligence-led security trend with special guests Mark D. Young, Senior Vice President at IronNet Cybersecurity, and Mike McCracken, Senior Intelligence Analyst and Solution Architect at IBM Security.

Listen now to learn:

  • The basic methodology of intelligence (e.g. intel cycle) and how it applies to cybersecurity;
  • How the “intelligence” market is likely to evolve;
  • What types of specific skills the private sector is seeking when recruiting people with intelligence community experience;
  • How an intelligence analyst’s approach to a question differs from a security analyst’s approach;
  • What the ultimate goal of all these intelligence pieces — people, process and technology — should be.

Listen to the podcast

Learn how to counter and mitigate threats more quickly — View the live demo

Bob Stasio
Global Offering Manager, IBM
Bob Stasio is a contributor for SecurityIntelligence.

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
Press play to continue listening
00:00 00:00