התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 Reuven Bank and Andrew Kim: When the Ocean Lost Its Stars 30:54
What Is Cyber Threat Intelligence and How To Stand Out As Threat Intelligence Analyst
Manage episode 359798677 series 2675076
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments
00:00 - Introduction
01:22 - What is Threat Intelligence?
02:17 - How did you get into Threat Intel?
03:20 - All Source vs Threat Intelligence
04:09 - What was the transition into cyber like?
07:03 - What is the salary potential for Threat Intel analysts?
09:00 - What skills do Threat Intel Analysts need?
10:09 - How to answer tough Threat Intel interview questions
10:47 - What does the first day on the job look like?
12:07 - What are the expectations of a Threat Intel Analyst?
13:18 - What expectations should an Intel Analyst have for their employer?
16:51 - Are threat intel feeds valuable?
18:26 - Chris’ first big threat intel “win”
22:24 - How have you changed as an analyst over the years?
24:22 - How to stand out in cybersecurity
27:24 - Advice for those breaking into Cyber Threat Intel
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
380 פרקים
Manage episode 359798677 series 2675076
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments
00:00 - Introduction
01:22 - What is Threat Intelligence?
02:17 - How did you get into Threat Intel?
03:20 - All Source vs Threat Intelligence
04:09 - What was the transition into cyber like?
07:03 - What is the salary potential for Threat Intel analysts?
09:00 - What skills do Threat Intel Analysts need?
10:09 - How to answer tough Threat Intel interview questions
10:47 - What does the first day on the job look like?
12:07 - What are the expectations of a Threat Intel Analyst?
13:18 - What expectations should an Intel Analyst have for their employer?
16:51 - Are threat intel feeds valuable?
18:26 - Chris’ first big threat intel “win”
22:24 - How have you changed as an analyst over the years?
24:22 - How to stand out in cybersecurity
27:24 - Advice for those breaking into Cyber Threat Intel
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
380 פרקים
כל הפרקים
×
1 The AI That Tried to Escape with Ron Eddings 23:43

1 Zero Trust Isn’t a Tool — It’s Everything with George Finney 40:15

1 Your Two-Year Edge Starts Now with Marco Figueroa 36:34

1 Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg Hatcher & John Stigerwalt 37:31

1 Building Cyber Resilience Through Culture with David Shipley 44:30

1 Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman 29:48

1 Protecting People, Not Just Perimeters with Andrey Suzdaltsev 45:21

1 Digital Clutter and the Death of Passwords with Collin Sweeney & Chase Cunningham 43:26

1 Hackers Have HR Now? featuring Christopher Budd 36:59

1 Staying Ahead in the Age of AI Agents with Marco Figueroa 40:57

1 I Built an AI Version of Myself – Here’s Why with Marcus J. Carey 39:48

1 Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole 41:45

1 The AI Shift You Can’t Ignore with Marco Figueroa 37:35

1 Superhuman Productivity and AI Mastery with Pedram Amini 36:17

1 Cybersecurity Meets AI: The Good, The Bad & The Janky 22:38

1 A Human-Centric Approach to Cybersecurity with Edna Conway 35:40

1 Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam 38:03

1 How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi 35:35

1 Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright 44:49

1 The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa 41:39

1 Understanding the Psychology of Cyber Risk with David Shipley 44:24

1 From Landscaping to Cyber Leadership with Cole Lisko 34:44

1 Think Like a Hacker, Solve Like a Leader featuring Ted Harrington 41:06

1 Hacking Trust with AI and Deepfakes featuring Iain Jackson 25:04

1 Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss 40:21

1 Transforming SOC Operations with AI featuring Roy Halevi 49:04

1 From Shadow IT to Full Asset Visibility with Wes Wright 37:24

1 Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews 41:49

1 Rethinking Cybersecurity Hiring with Naomi Buckwalter 43:40

1 AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter 33:54

1 How to Become a True Security Leader with Nathan Case 36:17

1 AI and the Future of Cyber Defense with John Hubbard 34:12

1 How Adversaries Are Living Off The Dark Web with Jason Haddix 44:55

1 AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan 18:20

1 Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam 31:29

1 Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix 46:02

1 I Failed Over 300 Times Trying To Get Into Security ft. Joe South 40:12

1 Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams 24:39

1 Offensive Security: Unlocking Hidden ROI with Seemant Sehgal 15:15

1 Black Hat 2024 Conference Pre-Game 13:17

1 The Present and Future of AI in Cyber 23:58

1 Leaving an Impression: Strategies for Captivating a Massive Audience 32:29

1 How Can I Best Proactively Secure My SaaS? 34:36

1 What We All Should Be Talking About When It Comes to AI and Security 33:15

1 Navigating AI as a CISO with Whitney Palacios 22:43

1 The Power of AppSec, Cyber Education, and Friendship with Tanya Janca 35:21

1 Networking 2.0: The Future of Decentralized Networking & Access Management 32:18

1 How AI is the Key Turning Point in TPRM with Paul Valente 25:47

1 A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini 40:05

1 Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell 39:41

1 Enterprise Browsers: Work’s Natural Next Step 34:00

1 Building Tech and Adding Value in the Era of AI with Josh Danielson 24:28

1 Building Fast and Not Breaking Things with Shlomi Matichin 32:26

1 Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley 35:45

1 How to Hack your Career: Building a vCISO Business with Ayman Elsawah 31:42

1 Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey 40:18

1 Securing Your SaaS and Cyber Influencer Networking with CRO Bob Horn 30:15

1 From ‘Hand-to-Hand Combat’ To Management in Cyber with Ofer Gayer 35:27

1 How Threat Actors Are Accessing Your SaaS Environments with Jaime Blasco 45:14

1 The Future of Endpoint Threats and Why Zero Trust is the Only Option with Rob Allen 43:42

1 Slugging it Out in the SOC to Find Your Niche in Cyber with Nate Malicoat 16:26

1 Creating Value in the Cyber Industry with Nick Lantuh 31:45

1 AI & Phishing: Fighting Fire with Fire 37:53

1 Andrew Forgie's Path From Apache Mechanic to Cybersecurity Sales Leader and Mastering Cyber Sales 26:58

1 Zinet Kemal's Journey From Ethiopian Immigrant to TEDx Speaker & Cloud Security Engineer at Fortune 38:39

1 Paving the Path for CISOs of the Future with Gary Hayslip 29:13

1 The Untold Story of Browser Risks: Pioneering Enterprise Browser Security with Or Eshed 35:56

1 Cyber Defense Reinvented: The New Era of Attack Surface Management with Isaac Clayton 32:47

1 Cyber Resilience Unpacked: Securing Tomorrow Today with Bill Bernard 37:59

1 Looking Backward to GROW Forward in Cybersecurity in 2024 23:35

1 What’s Lurking In Your Containers? AMBERSQUID Operations, Freejacking, and Microservice Exploitation 23:11

1 Pivotal Policy in the Age of AI with AJ Grotto 24:05

1 Ransomware: How to Use AI to Create a Readiness Kit with Scott Sutherland 28:32
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.