Cyber Talk Radio: Cyber Forensics and Threat Intelligence
Cyber Forensics and Threat Intelligence with Coherent Cyber - Week 32 of Cyber Talk Radio
Show Summary
This past Saturday, May 6, episode 32 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio streaming. I was joined by Nicolas Hollis and Jacob Stauffer at Coherent Cyber, to discuss cyber forensics and threat intelligence.
In the first half of the show, we kick off by having Nicolas and Jacob give us background on their experience in cybersecurity, cyber forensics and threat intelligence. What should you be doing to keep your business safe from cyberattacks? One of the biggest things companies can do is focus on training employees on security best practices. For example, don’t pick up a USB drive at a conference and plug it into your computer. Social engineering of employees is the easiest way for an attacker to get into a company’s network. On average, intruders are inside your network for at least 180 days - that is a frightening stat. It is not uncommon for a company to be under attack for a long period of time before finding out. In the first half, learn why companies need to harden the border. The people in front of the work stations are the threat and most vulnerable to the attackers.
In the second half of the show, we go over log management strategies for forensics. When it comes to cybersecurity, why do physical risks get more attention than digital risks? Cyber crime has now surpassed physical crime in the amount of dollars stolen. The biggest challenge is that there are not enough cybersecurity professionals being trained. What should SMBs be thinking about to keep their business safe? Quick tips include configure your servers with security in mind, maintain password management, implement employee training, have some form of anti-virus, run backups and have a consultant come in to do a scan of your security posture. Many businesses are stockpiling bitcoins to pay off ransomware instead of taking the measures to block it in the first place or pay for backups to fall back on should your computer get infected. What’s the next big thing? The Internet of Things landscape has opened us up to more potential exploits.
To hear more about Coherent Cyber, cyber forensics and threat intelligence, watch the replay here!
Upcoming episode – Saturday nights from 11:00 p.m. to Midnight -
- Episode 33, May 13: Cyber Recruiting for the Air Force with Technical Sergeant Dyamie Baker
Listen to a replay of this episode or past episodes on a Cyber Talk Radio Podcast stream. Replays are available via the below podcast services:
Recent episodes – available to stream from our YouTube channel -
- Cybersecurity Legislation with Congressman Will Hurd
- Creating a “Culture of Security” with Dr. Greg White of University of Texas San Antonio
- Developing Youth Cyber Talent with Debi Pfitzenmaier, founder at Youth Code Jam
- CyberPatriot Program at Business Careers High School with Juan Guerrero, technology certification instructor
- Open Cloud Academy and its Cybersecurity Track with Deborah Carter and Johnny Carrera
- Attracting Cyber Businesses to Bexar County with Commissioner Calvert
- 2017 San Antonio Mayor’s Cyber Cup Luncheon hosted by CyberTexas Foundation
- Codeup’s Approach to Developing Responsible Programmers with Ryan Orsinger
- Voice and Unified Communication Security with Mark Collier of SecureLogix
- CAST Tech High School in San Antonio
- Career Matching for Military Cyber Jobs with Cyber Warrior Network
Have an idea for a topic or want to be a guest?
Contact Cyber Talk Radio via our request a topic or be a guest form.