
Security Intelligence Podcast
1) Monitoring Cybersecurity Trends With Former NSA Deputy Director Bill Crowell
Do you have concerns about election security or other issues of national cybersecurity? If so, don't miss this episode, in which former National Security Agency (NSA) Deputy Director Bill Crowell shar...Show More
2) Developing a Cloud Security Strategy
“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services. Abhijit Chakravorty, Partner & Cloud ...Show More
3) Training with Chaos Engineering
"The idea of chaos engineering is essentially to help test resilience before an accident happens," says Itzik Kotler, co-founder and CTO of SafeBreach. Kotler joins Matthew Dobbs, Chief Integration ...Show More
4) Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report
What are the top findings from the Cost of a Data Breach Report 2020? Charles DeBeck, a cyber threat intelligence expert with IBM X‑Force IRIS, talks about what drives costs higher for some organizati...Show More
5) Security Highlights from IBM Think Digital 2020
The threat landscape has changed as a result of the global pandemic. What does that mean for organizations and their employees? How can leaders "manage through chaos" successfully? Hosts Pam Cobb and ...Show More
6) Contextualizing Zero Trust
As digital transformation accelerates, so does the importance of verification. "I think it's become more important right now to ensure the right person has access to the right data and apps at the rig...Show More
7) Recent Activity from ITG16, a North Korean Threat Group
"APT groups jump at the chance to take advantage of people's emotions," says Ryan Castillo, an analyst on the threat hunt and discovery team within IBM X‑Force IRIS. One such advanced persistent threa...Show More
8) Consumer Identity and Access Management (CIAM): Reducing Friction Without Reducing Security
If you introduced yourself at a dinner party and a short time later the host forgot your name, maybe you'd be confused and a little frustrated. The same goes for consumers when interacting with a bran...Show More
9) Exploring the Impact of the ITG08 Threat Group
ITG08, which shares overlap with the group FIN6, is a financially motivated threat group known for currently targeting e-commerce platforms. Chris Caridi from IBM's Threat Intelligence Production Team...Show More
10) Creating AI Without Bias
Human beings have inherent biases. That's all the more reason to make an effort to be "consciously unbiased" when developing artificial intelligence (AI). "When we build AI technology for mission-crit...Show More