Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
mnemonic security podcast - Isolate first, Triage second, and the tools to help you do it.

Isolate first, Triage second, and the tools to help you do it.

06/17/24 • 45 min

mnemonic security podcast

Operationalising threat intelligence is back on topic for the mnemonic security podcast!

Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.

The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.

Send us a text

plus icon
bookmark

Operationalising threat intelligence is back on topic for the mnemonic security podcast!

Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Critical Infrastructure Threat Intelligence. Also joining is Jeff Schiemann, an industry veteran and CISO at one of the world's first crypto banks.

The conversation ventures across how security teams are currently using threat intelligence, the importance of frameworks and standardisation, and the role AI and automation may play for defenders and adversaries. The trio also share their thoughts on a future where threat intelligence decisions can be automated in real-time, and what might take to get us there.

Send us a text

Previous Episode

undefined - Guidance for High-Risk Individuals

Guidance for High-Risk Individuals

When we talk about securing an organisation’s assets, we most often mean its data, devices, servers, or accounts, but are we doing enough to secure the group of people leading the company? Or the ones doing high risk work on behalf of the organisation?

To discuss the importance of securing high-risk individuals, like journalists, politicians and executives, Robby is joined by an expert in this field, Runa Sandvik, journalist, security researcher and founder of Granitt. At Granitt, Runa works with digital security for journalists and other at-risk people, building on her experiences working at The New York Times, Freedom of the Press Foundation and The Tor Project.

During the conversation, they talk about how to secure devices when travelling to high-risk countries, what tools to use and at what time, and how threat actors usually target individuals. Runa also shares how she works to secure accounts and devices for her clients.

Send us a text

Next Episode

undefined - ML Engineers these days

ML Engineers these days

Have you ever worked alongside a machine learning engineer? Or wondered how their world will overlap with ours in the "AI" era?

In this episode of the podcast, Robby is joined by seasoned expert Kyle Gallatin from Handshake to enlighten us on his perspective on how collaboration between security professionals and ML practitioners should look in the future. They discuss the typical workflow of an ML engineer, the risks associated with open-source models and machine learning experimentation, and the potential role of "security champions" within ML teams. Kyle provides insight into what has worked best for him and his teams over the years, and provides practical advice for companies aiming to enhance their AI security practices.

Looking back at our experience with "DevSecOps" - what can we learn from and improve for the next iteration of development in the AI era?

Send us a text

mnemonic security podcast - Isolate first, Triage second, and the tools to help you do it.

Transcript

Speaker 1

From our headquarters in Oslo , norway , and on behalf of our host , robbie Perelta . Welcome

Speaker 1

to the Mnemonic Security Podcast .

Speaker 2

In a parallel utopian universe , marketing isn't allowed to name threat actors . There's only one naming convention for tracking and attribution of them , and all the

Episode Comments

Featured in these lists

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/mnemonic-security-podcast-242077/isolate-first-triage-second-and-the-tools-to-help-you-do-it-54655283"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to isolate first, triage second, and the tools to help you do it. on goodpods" style="width: 225px" /> </a>

Copy