
Isolate first, Triage second, and the tools to help you do it.
06/17/24 • 45 min
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Operationalising threat intelligence is back on topic for the mnemonic security podcast!
Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.
The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.
Previous Episode

Guidance for High-Risk Individuals
When we talk about securing an organisation’s assets, we most often mean its data, devices, servers, or accounts, but are we doing enough to secure the group of people leading the company? Or the ones doing high risk work on behalf of the organisation?
To discuss the importance of securing high-risk individuals, like journalists, politicians and executives, Robby is joined by an expert in this field, Runa Sandvik, journalist, security researcher and founder of Granitt. At Granitt, Runa works with digital security for journalists and other at-risk people, building on her experiences working at The New York Times, Freedom of the Press Foundation and The Tor Project.
During the conversation, they talk about how to secure devices when travelling to high-risk countries, what tools to use and at what time, and how threat actors usually target individuals. Runa also shares how she works to secure accounts and devices for her clients.
Next Episode

ML Engineers these days
Have you ever worked alongside a machine learning engineer? Or wondered how their world will overlap with ours in the "AI" era?
In this episode of the podcast, Robby is joined by seasoned expert Kyle Gallatin from Handshake to enlighten us on his perspective on how collaboration between security professionals and ML practitioners should look in the future. They discuss the typical workflow of an ML engineer, the risks associated with open-source models and machine learning experimentation, and the potential role of "security champions" within ML teams. Kyle provides insight into what has worked best for him and his teams over the years, and provides practical advice for companies aiming to enhance their AI security practices.
Looking back at our experience with "DevSecOps" - what can we learn from and improve for the next iteration of development in the AI era?
mnemonic security podcast - Isolate first, Triage second, and the tools to help you do it.
Transcript
From our headquarters in Oslo , norway , and on behalf of our host , robbie Perelta . Welcome
Speaker 1to the Mnemonic Security Podcast .
Speaker 2In a parallel utopian universe , marketing isn't allowed to name threat actors . There's only one naming convention for tracking and attribution of them , and all the
If you like this episode you’ll love
Episode Comments
Featured in these lists
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/mnemonic-security-podcast-242077/isolate-first-triage-second-and-the-tools-to-help-you-do-it-54655283"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to isolate first, triage second, and the tools to help you do it. on goodpods" style="width: 225px" /> </a>
Copy