Security Intelligence Podcast-logo

Security Intelligence Podcast

Technology Podcasts >

More Information


United States




[Encore] Peeling Back The Onion On Threat Hunting

This podcast was originally broadcast in November 2017. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn more, read Eric's Security Intelligence blog series on threat hunting [] and follow both Bob [] and Eric [] on Twitter.


Social Engineering 101: How to Hack a Human

In this podcast, IBM Senior Security Architect Joe Gray outlines the basics of social engineering, including what it is, why it can be so dangerous and what companies can do protect themselves, their employees and their assets. Listen now for a firsthand account of Joe's vast experience with Open Source Intelligence (OSINT) collection and social engineering. For more from Joe, attend his RSA Conference session, "Compromising a Fortune 500 Business without Hacking a Thing!" at 9:15 a.m. on...


Millennials, Baby Boomers and the Future of Identity

IBM's recently released "Future of Identity Study" reveals global and generational preferences on authentication. Among the study's many interesting findings, it was discovered that consumers of different generations have different preferences on authentication and take substantially different approaches to cybersecurity overall. IBM Security's Dillon Townsel recently interviewed Payton, a 24 year-old community manager, and Susan, a 68 year-old grandmother and retired schoolteacher about...


Collaboration: The Secret to More Effective Security

In the world of cybersecurity, collaboration is much more than a buzzword. In this podcast, Mitch Mayne, Public Information Officer for IBM X-Force Exchange, talks with George Mina, Program Director of IBM Security Strategic Alliances, about the importance of collaboration among different security products and even between different security vendors. To learn more about collaborative defense in depth, read this recent blog: To view the IBM Security App Exchange,...


How to Ensure That Your Cybersecurity Project Stays on Track

When it comes to cybersecurity, there's no such thing as a simple project. There's also no "one size fits all" approach. In this podcast, IBM Security consultants Katrina Avila and Vanja Kulic address these challenges head-on and offer actionable tips for keeping your cybersecurity project on track. To learn more, visit or listen to our 6-part podcast series, "A CISO’s Guide to Obtaining Budget" [].


Eric Cole And Shira Rubinoff Get Excited for IBM Think 2018

IBM Think 2018 kicks off in Las Vegas on March 19 — less than a week from now. In this short podcast, Eric Cole [] and Shira Rubinoff [] discuss why they’re excited to attend Think, what sessions they’re most looking forward to and what hot trends and topics they expect to dominate the conversation. For more Think content, visit or register to attend at and save $300 with promo code TK18SECCOM.


Take The Risk: New IBMer Bridgette Pepper Begins Her Cybersecurity Journey

As we approach International Women’s Day on March 8, Bridgette Pepper joins IBM Security Academic Outreach Leader Heather Ricciuto to discuss her unexpected entrance into the cybersecurity field and her experience first as an IBM intern and now as a full-time team member. Bridgette’s passion for both security and for bringing greater gender diversity to the industry shine through her story and offer inspiration to other girls and women interested in pursuing security careers. To learn more...


The Future of Identity: Examining Authentication Practices in Asia-Pacific and Beyond

In order to better understand the latest trends in consumer identity protection, IBM Security recently commissioned a global research study to learn more about consumers' views on passwords, biometrics and multifactor authentication. In this podcast, Trilochan Sehgal, IBM Security's APAC Segment Leader for Identity and Access Management, discusses the survey's results and what these findings mean for both consumers and enterprises in the Asia-Pacific region and beyond. Download the...


Five Data Types To Consider When Conducting A Risk Assessment

Following the enthusiastic response to their "Get Smarter About Disaster Response — Five Resolutions For 2018" [], Mitch Mayne and Loren Dealy Mahler are back to take a more in-depth look at the first resolution on their list: conducting a risk assessment. Listen now to learn about the five distinct data types your enterprise may hold or interact with and why performing an effective risk assessment means widening your lens to view how a data breach might affect your...


Data Risk Management In 2018: What to Look For and How to Prepare

If you're looking to bring greater awareness to data risk management practices within your organization and among your C-suite, don't miss this podcast, moderated by Paula Musich, of Enterprise Management Associates, and featuring Dan Goodes and Nev Zunic, both of IBM Security. To learn more about data risk management, read Paula’s 3 part blog series, What Data Risk Management Means for the Enterprise in 2018:


Girls Can't Be What They Can't See: Closing the Gender Gap in Cybersecurity

Heather Ricciuto, Academic Outreach Leader at IBM Security, joins the podcast today to discuss why women are vastly underrepresented in the cybersecurity industry. She also shares examples of the programs and initiatives IBM runs and supports to help close the gender gap. To apply for the Women in Cybersecurity Seminar for College Women, taking place Feb. 15 in Dallas, TX, please send your resume and a cover letter to Heather at To learn more about the 5th annual Women...


What You Need to Know about the Changes to the Australian Privacy Act

Beginning on Feb. 22 of this year, new data breach and response amendments to the Australia Privacy Act will impact thousands of organizations in Australia and around the world. In this podcast, Chris Hockings, Chief Technology Officer and Master Inventor for IBM Security, talks about the implications of the changes to the Privacy Act in Australia, how organizations can prepare, and what steps they can take to build a best practice incident and response plan. To learn more about the...


The 2018 Cybersecurity State of the Union

Episode 8 of the monthly "Deciphering the Cyber Headlines with Paul Ferrillo and Chris Veltsos" series. Just in time for the US president's annual State of the Union address, Paul and Chris are back to deliver a cybersecurity state of the union. Listen now to discover why Paul is pessimistic, why Chis is optimistic, and what two pieces of advice they'd each give C-level executives planning for 2018. RESOURCES: Read Chris' blog on NACD’s 2018 Governance Outlook: Read...


Avoiding Common Data Security Mistakes: A Conversation with IDC's Rob Westervelt

Is your enterprise falling victim to one of the top data security mistakes? In this podcast Rob Westervelt, Research Manager within IDC’s Security Products group [], talks with IBM Security’s Leslie Wiggins about trends in data security, the biggest mistakes today’s organizations are making and, perhaps most importantly, how to avoid common data security pitfalls. To learn more, view the IDC infographic, “Unified Data Encryption: Reduce the Risk of Costly Breaches and...


Let’s Think Together: A New Take on the Security Conference Experience

Think, IBM’s new premier conference, will take place March 19-22 in Las Vegas, NV. In this podcast, Mitch Mayne and Pam Cobb discuss how Think differs from previous IBM events and preview what participants can expect to experience (innovation speakers, client stories, demos, technical deep dives, guided and open labs, user groups) and achieve (product certifications and more). Read Pam's blog [] for even more event details, and don't forget to register to attend...


Get Smarter About Disaster Response — Five Resolutions For 2018

In our first podcast of 2018, IBM X-Force Exchange Public Information Officer and frequent host Mitch Mayne talks with Loren Dealy Mahler, president and founder of Dealy Mahler Strategies [], about the one thing that always seems to go wrong during a data breach: Communications. Listen now to their list of five New Year's resolutions that C-level executives should embrace in order to improve their incident response strategies in 2018. To read more from Loren, visit...


New Year, New Threats: 5 Security Predictions That Will Take Hold in 2018

Wondering what lies ahead for cybersecurity in 2018? In this podcast Caleb Barlow, VP of Threat Intelligence at IBM Security, discusses the top 5 security predictions that emerged from a recent poll of the IBM X-Force experts. The list includes AI vs. AI battles and a new plague of ransomware, but you'll have to tune in to hear the rest. Listen now and leave a comment letting us know which predictions you agree with and what additional trends you expect to see in the new year. And if...


[Encore] TBC 09: Don’t Abandon Ship Just Yet

In episode 9, Paul Ferrillo and Chris Veltsos conclude the “Take Back Control of Your Cybersecurity Now” podcast series with predictions about the future of cybersecurity. In addition to returning to some of their favorite subjects, such as cognitive computing and the NIST Cybersecurity Framework, they also share their thoughts on cloud security and the Internet of Things (IoT). For more insights from Paul and Chris, listen to their ongoing follow-up podcast series, “Deciphering the Cyber...


[Encore] TBC 08: If You Can't Measure It, You Can't Manage It

In episode 8 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos talk metrics and reporting. Listen now to learn how to translate numbers into meaningful cyber risks that boards of directors will understand and feel confident to act on. Come back tomorrow for the final episode in this 9-part series, and find Paul and Chris’ book at You can also re-listen or find any episodes you missed at


[Encore] TBC 07: Have A Plan, Practice It And Then Practice It Again

In episode 7 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos emphasize the importance of incident response. The goal of cybersecurity was once to build enough walls to keep out attackers, but in more recent years the focus has shifted to detecting bad guys already inside the network. This change has elevated the status of incident response teams and crisis management planning. Come back tomorrow for the next episode in this 9-part...


Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads