Logo

    isac

    Explore " isac" with insightful episodes like "How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin", "How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin", "Jungle Jim Tells the Story of Abraham and Isaac", "Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep." and "Proactive Threat Prevention with Threat Intelligence | Episode Teaser" from podcasts like ""Redefining CyberSecurity", "ITSPmagazine", "I'm Hicksited", "br3akp0int Security Podcast" and "br3akp0int Security Podcast"" and more!

    Episodes (7)

    How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

    How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

    Guest: Sidney Pearl, Executive Director at AI-ISAC

    On Linkedin | https://www.linkedin.com/in/sidney-pearl/

    ____________________________

    Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

    ____________________________

    This Episode’s Sponsors

    Imperva | https://itspm.ag/imperva277117988

    Devo | https://itspm.ag/itspdvweb

    ___________________________

    Episode Notes

    Welcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.

    Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.

    The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.

    Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.

    Key Insights Provided:

    • What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?
    • What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?
    • How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?

    ___________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    ITSPmagazine YouTube Channel:

    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ___________________________

    Resources

    New Artificial Intelligence Information Sharing Analysis Center (AI-ISAC) Launches at Kennedy Space Center: https://world.einnews.com/pr_news/674452892/new-artificial-intelligence-information-sharing-analysis-center-ai-isac-launches-at-kennedy-space-center

    ___________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Are you interested in sponsoring an ITSPmagazine Channel?

    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

    How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Building Cross-Industry Trust and Collaborating with Other ISACs | A Conversation with Sidney Pearl | Redefining CyberSecurity Podcast with Sean Martin

    Guest: Sidney Pearl, Executive Director at AI-ISAC

    On Linkedin | https://www.linkedin.com/in/sidney-pearl/

    ____________________________

    Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

    ____________________________

    This Episode’s Sponsors

    Imperva | https://itspm.ag/imperva277117988

    Devo | https://itspm.ag/itspdvweb

    ___________________________

    Episode Notes

    Welcome to a new episode of Redefining CyberSecurity Podcast. In this episode, Sean Martin is joined by Sidney Pearl to discuss the AI-ISAC (Artificial Intelligence Information Sharing and Analysis Center). They talk about the importance of operationalizing security and how communities, such as CISOs and other business executives, play a vital role in information sharing.

    Sidney Pearl, the newly appointed executive director of AI ISAC, shares his background and experience in cybersecurity. The pair explore the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs. They explain that ISACs were initially formed to develop public and private partnerships between the government and private industry to share information and identify threats to critical infrastructure. Over time, ISACs have evolved into ISAOs, which have members beyond just the government and focus on sharing information across various domains.

    The conversation then shifts to the AI ISAC and its importance in sharing information about artificial intelligence-related threats. They emphasize that the AI-ISAC is neutral and aims to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence. They discuss the challenges of navigating the rapidly evolving field of artificial intelligence, where bad actors can leverage AI tools for malicious purposes.

    Sean and Sidney stress the necessity for organizations to proactively understand the trajectory of AI and make informed decisions. They highlight the importance of accessibility to good information for organizations to stay ahead of threats. Trust plays a crucial role in the success of ISACs, and Sidney invites the audience to engage with the AI-ISAC to foster trust and collaboration. Sidney also expresses the AI-ISAC's commitment to working together with the cybersecurity community to adapt to the changes brought by artificial intelligence. He encourages listeners to reach out and participate in the dialogue, emphasizing that we are all in this together.

    Key Insights Provided:

    • What is the structure of ISAOs (Information Sharing and Analysis Organizations) and ISACs (Information Sharing and Analysis Centers)? How have they evolved over time to develop public and private partnerships and share information to identify threats to critical infrastructure?
    • What is the role of the AI-ISAC ? How does it aim to help all ISACs and ISAOs gain insight into the threat landscape associated with artificial intelligence? What are the challenges in navigating the rapidly evolving field of artificial intelligence?
    • How can organizations proactively understand the trajectory of artificial intelligence and make informed decisions to stay ahead of emerging threats? What is the importance of accessibility to good information in cybersecurity? How does trust play a crucial role in the success of ISACs, and how can the AI-ISAC foster trust and collaboration within the cybersecurity community?

    ___________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    ITSPmagazine YouTube Channel:

    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ___________________________

    Resources

    New Artificial Intelligence Information Sharing Analysis Center (AI-ISAC) Launches at Kennedy Space Center: https://world.einnews.com/pr_news/674452892/new-artificial-intelligence-information-sharing-analysis-center-ai-isac-launches-at-kennedy-space-center

    ___________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Are you interested in sponsoring an ITSPmagazine Channel?

    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Jungle Jim Tells the Story of Abraham and Isaac

    Jungle Jim Tells the Story of Abraham and Isaac

    Oddly insightful(??) theologian Jungle Jim tells stories concerning the childhood and youth of Isaac, son of Abraham.  The stories include the dismissal of Hagar and Ishmael, a move that almost cost them their lives, and the most unusual request ever made by God of any man, the request that Abraham kill the very son of promise for whom he had long waited, Isaac. 

    To see David Hicks on YouTube, click here.

    Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.

    Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.

    TOPIC: Proactive Threat Prevention with Threat Intelligence

    In this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. 


    Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Labs

    Avkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, and Threat Intelligence. Apart from leading the research and innovation at Cyware, Avkash is also a globally well-known speaker at various security conferences in India and abroad. He is also a visiting faculty member at IIIT, Sri City, and a Cyber Threat Intelligence Committee member at OASIS, a global non-profit consortium that works on the development, convergence, and adoption of open standards for cybersecurity.

    Glossary
    We might be frequently using some common terminologies in our conversation, the way they're used in the industry, so those new to this can refer to the quick glossary given below  before you start

    • CTI: Cyber Threat Intel
    • TTPs: tactics, techniques, and procedures
    • APT:  advanced persistent threats- in which an attacker gains access and stays without being detected for long time.
    • SIEM: Security Info Event Management
    • SOC: Security Operations Center
    • IoC: Indicators of Compromise
    • IoA: Indicators of Attack


    Recommended reading/viewing, Paper(in this topic) for practitioners

    1. https://github.com/hslatman/awesome-threat-intelligence
    2. https://oasis-open.github.io/cti-documentation/stix/intro.html
    3. https://cyware.com/educational-guides/cyber-threat-intelligence
    4. https://cyware.com/blog/4-steps-to-expand-threat-intelligence-sharing-in-2023-f786
    5. https://www.youtube.com/watch?v=I9pjBrN1dUA 

    I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

    If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

    • Twitter: @NeeluTripathy
    • LinkedIn: neelutripathy

    Proactive Threat Prevention with Threat Intelligence | Episode Teaser

    Proactive Threat Prevention with Threat Intelligence | Episode Teaser

    TOPIC: Proactive Threat Prevention with Threat Intelligence

    In this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. 


    Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Labs

    Avkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, and Threat Intelligence. Apart from leading the research and innovation at Cyware, Avkash is also a globally well-known speaker at various security conferences in India and abroad. He is also a visiting faculty member at IIIT, Sri City, and a Cyber Threat Intelligence Committee member at OASIS, a global non-profit consortium that works on the development, convergence, and adoption of open standards for cybersecurity.

    Glossary
    We might be frequently using some common terminologies in our conversation, the way they're used in the industry, so those new to this can refer to the quick glossary given below  before you start

    • CTI: Cyber Threat Intel
    • TTPs: tactics, techniques, and procedures
    • APT:  advanced persistent threats- in which an attacker gains access and stays without being detected for long time.
    • SIEM: Security Info Event Management
    • SOC: Security Operations Center
    • IoC: Indicators of Compromise
    • IoA: Indicators of Attack

    I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!

    If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:

    • Twitter: @NeeluTripathy
    • LinkedIn: neelutripathy

    Space Cyber - The New Frontier S1E6

    Space Cyber - The New Frontier S1E6

    This week the Mat and Mike are boldly going to the new frontier, Space Cyber. Purdue University is the first university to join the new Space ISAC! Cyber Tap also breaks down what and why hackers are going after satellites and other critical space infrastructure.

    -------------------------
    Email the Cyber Tap with suggestions (or tips)
    cybertappodcast@purdue.edu

    Follow us on all the things:
    Twitter: @PCyberTAP
    LinkedIn: Purdue cyberTAP
    Instagram: purduecybertap


    To learn more about Purdue's cyberTAP's education and professional services, visit cyber.tap.purdue.edu

    MUSIC IS ART Podcast #15 - enhanced version

    MUSIC IS ART Podcast #15 - enhanced version
    New Music Overview October 2006 An overview of new fall releases from Green Isac, Rudy Adrian, and Patrick O'hearn. • LIsten to Spotted Peccary Radio streaming 24 hours a day --> www.live365.com/stations/gern/ • Shadows of Far Night - from the CD Sleeping on the Edge of the World, by David Helpling • Midnight Fantasy Angel - from the CD MoonWater, by Rudy Adrian • Fisher - from the Download only EP Backwaters, by Green Isac • Home Stretch - from the Download only album The So Flows Sessions, by Patrick O'Hearn feedback: podcast@musicisart.com
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io