Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Breakpoint Security Podcast - Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.

Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.

04/14/23 • 71 min

Breakpoint Security Podcast

TOPIC: Proactive Threat Prevention with Threat Intelligence

In this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks.

Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Labs

Avkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, and Threat Intelligence. Apart from leading the research and innovation at Cyware, Avkash is also a globally well-known speaker at various security conferences in India and abroad. He is also a visiting faculty member at IIIT, Sri City, and a Cyber Threat Intelligence Committee member at OASIS, a global non-profit consortium that works on the development, convergence, and adoption of open standards for cybersecurity.
Glossary
We might be frequently using some common terminologies in our conversation, the way they're used in the industry, so those new to this can refer to the quick glossary given below before you start

  • CTI: Cyber Threat Intel
  • TTPs: tactics, techniques, and procedures
  • APT: advanced persistent threats- in which an attacker gains access and stays without being detected for long time.
  • SIEM: Security Info Event Management
  • SOC: Security Operations Center
  • IoC: Indicators of Compromise
  • IoA: Indicators of Attack

Recommended reading/viewing, Paper(in this topic) for practitioners

  1. https://github.com/hslatman/awesome-threat-intelligence
  2. https://oasis-open.github.io/cti-documentation/stix/intro.html
  3. https://cyware.com/educational-guides/cyber-threat-intelligence
  4. https://cyware.com/blog/4-steps-to-expand-threat-intelligence-sharing-in-2023-f786
  5. https://www.youtube.com/watch?v=I9pjBrN1dUA

I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

  • Twitter: @NeeluTripathy
  • LinkedIn: neelutripathy
plus icon
bookmark

TOPIC: Proactive Threat Prevention with Threat Intelligence

In this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks.

Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Labs

Avkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, and Threat Intelligence. Apart from leading the research and innovation at Cyware, Avkash is also a globally well-known speaker at various security conferences in India and abroad. He is also a visiting faculty member at IIIT, Sri City, and a Cyber Threat Intelligence Committee member at OASIS, a global non-profit consortium that works on the development, convergence, and adoption of open standards for cybersecurity.
Glossary
We might be frequently using some common terminologies in our conversation, the way they're used in the industry, so those new to this can refer to the quick glossary given below before you start

  • CTI: Cyber Threat Intel
  • TTPs: tactics, techniques, and procedures
  • APT: advanced persistent threats- in which an attacker gains access and stays without being detected for long time.
  • SIEM: Security Info Event Management
  • SOC: Security Operations Center
  • IoC: Indicators of Compromise
  • IoA: Indicators of Attack

Recommended reading/viewing, Paper(in this topic) for practitioners

  1. https://github.com/hslatman/awesome-threat-intelligence
  2. https://oasis-open.github.io/cti-documentation/stix/intro.html
  3. https://cyware.com/educational-guides/cyber-threat-intelligence
  4. https://cyware.com/blog/4-steps-to-expand-threat-intelligence-sharing-in-2023-f786
  5. https://www.youtube.com/watch?v=I9pjBrN1dUA

I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

  • Twitter: @NeeluTripathy
  • LinkedIn: neelutripathy

Previous Episode

undefined - Building a 100% Open DevSecOps Stack | Abhisek Datta

Building a 100% Open DevSecOps Stack | Abhisek Datta

TOPIC: Building a 100% Open Source DevSecOps Stack for Product Teams

GUEST: Abhisek Datta
He has been a Security researcher in the past. Currently he is dabbling more on the development & product side of things. He is an OSS contributor and Platform & Security engineer. Can still read/write C & x86 ASM.
Episode Summary:
In this episode we dive deep into the challenges and opportunities of creating and maintaining a 100% open source DevSecOps stack. Tune in as to find a store house of information for Product teams on how to approach security automation for their products using only open source security tools & products.
Recommended reading/viewing, Paper(in this topic) for practitioners:

https://medium.com/chargebee-engineering/building-appsec-pipeline-for-continuous-visibility-d430beb0a78f

https://medium.com/chargebee-engineering/building-policy-gate-for-devsecops-using-open-policy-agent-999dd734744a

I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

  • Twitter: @NeeluTripathy
  • LinkedIn: neelutripathy

Next Episode

undefined - Season 01 | It's a Wrap! | Neelu Tripathy

Season 01 | It's a Wrap! | Neelu Tripathy

We're wrapping up season 01 and will be back soon in Season 02!!
A big THANK YOU!
To all our listeners who have been listening to the episodes for this first season of BP :)
To all our Guests for sharing interesting stories & practical takeaways.
In this cast, we wrap up Season 01 and share a quick glimpse of what was discussed in each episode, so that listeners know and can choose whatever they want to listen. Do check out all the episodes, a quick outline below:
Episode 01: Securing your Security product with Sharukh Ahmed
Episode 02: Secrets Management with Ankit Khasgiwale
Episode 03: OT Security Vendor Risk Management with Vikash Tiwari
Episode 04: Cloud Security for SaaS Companies with Jayesh Chauhan
Episode 05: Building a 100% Open Source DevSecOps Stack for Product Teams with Abhisek Datta
Episode 06: Proactive Threat Prevention with Threat Intelligence with Avkash Kathiriya

If you have any specific questions in these areas you want answered, new areas you want to hear about, please share your suggestions in BP Podcast Suggestions here.
If you enjoy practical security conversations and stories, remember to Subscribe & share further.

I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

  • Twitter: @NeeluTripathy
  • LinkedIn: neelutripathy

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/breakpoint-security-podcast-312962/proactive-threat-prevention-with-threat-intelligence-avkash-kathiriya-45162956"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to proactive threat prevention with threat intelligence | avkash kathiriya | full ep. on goodpods" style="width: 225px" /> </a>

Copy