Preview Mode Links will not work in preview mode

Defense in Depth


Jun 30, 2022

All links and images for this episode can be found on CISO Series

How are nefarious actors using our own data (and metadata) against us? And given that, in what way have we lost our way protecting data that needs to be course corrected?

Check out this post for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is John Ayers (@cyberjohn1747), vp of advanced detection and response office of the CTO, Optiv.

Thanks to our podcast sponsor, Optiv

Optiv

The modern enterprise needs a solution as unique as its business.
 
Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutter and find the ideal security solutions for your business. ADR delivers tailored detection and response backed by technology, real-time intel and deep expertise applied at touch. Bottom line: ADR finds and neutralizes threats fast, so you can focus on what matters.

In this episode:

  • How are nefarious actors using our own data (and metadata) against us?
  • In what way have we lost our way protecting data that needs to be corrected?
  • We examine how our interconnectedness is both a blessing and a curse.
  • Is there already far too much sensitive data in essentially open source intelligence?