All Episodes

Displaying 41 - 60 of 70 in total

Episode 41 — Connect malware families to credible campaigns

Connecting individual malware samples to larger, credible campaigns is a vital step in moving from tactical detection to operational intelligence. This episode teaches...

Episode 42 — Prioritize malware-driven tasks for maximum impact

In the high-pressure environment of a breach, an analyst must be able to prioritize their malware-driven tasks to ensure they are providing the most impactful informat...

Episode 43 — Analyze intrusions through the kill chain lens

The Cyber Kill Chain provides a powerful, linear lens for analyzing intrusions and identifying the specific stages where an adversary is most vulnerable to detection a...

Episode 44 — Model intrusions with the diamond for clarity

The Diamond Model of Intrusion Analysis provides a non-linear framework that emphasizes the relationships between the four core facets of every security event: the adv...

Episode 45 — Select courses of action that change outcomes

Choosing the right "course of action" (CoA) is the ultimate goal of the intelligence process, ensuring that technical insights lead to tangible changes in security out...

Episode 46 — Blend multiple models to strengthen conclusions

Relying on a single framework can create analytical blind spots, so the most effective investigators blend multiple models like the Cyber Kill Chain, the Diamond Model...

Episode 47 — Turn abstract models into defender guidance

The true value of analytical frameworks lies in their ability to be translated from abstract concepts into concrete, actionable guidance for frontline defenders and in...

Episode 48 — Pressure-test conclusions before they reach leaders

Before any intelligence product is disseminated to executive leadership, it must undergo a rigorous "pressure-test" to identify logical flaws, unverified assumptions, ...

Episode 49 — Profile campaigns with evidence and restraint

Campaign profiling is the disciplined act of grouping related incidents into a single, cohesive narrative while exercising the technical restraint needed to avoid over...

Episode 50 — Build timelines that expose adversary cadence

Constructing a detailed master timeline of an intrusion is one of the most powerful ways to expose an adversary’s "operational cadence" and identify patterns in their ...

Episode 51 — Track adversary TTPs to anticipate moves

Tracking an adversary's Tactics, Techniques, and Procedures (TTPs) is the most effective way to move from a reactive defensive posture to a proactive, anticipatory one...

Episode 52 — Weigh attribution tradeoffs and avoid overreach

Attribution is a high-stakes analytical exercise that requires a careful weighing of tradeoffs between the need for accountability and the risk of making an incorrect ...

Episode 53 — Calibrate attribution confidence with sober language

The language used to describe attribution must be carefully calibrated to reflect the true level of analytical certainty and to avoid the dangerous misunderstandings t...

Episode 54 — Present attribution responsibly to decision makers

Presenting attribution findings to executive leadership requires a strategic shift in communication, focusing on the business implications of the threat rather than ju...

Episode 55 — Reassess attribution as new signals emerge

Attribution is a dynamic process that must be constantly reassessed as new technical signals and external reporting emerge to challenge old conclusions. This episode f...

Episode 56 — Manage attribution bias and external pressure

Maintaining analytical objectivity is a significant challenge when faced with high-stakes security incidents and intense external pressure from leadership or the media...

Episode 57 — Operationalize intelligence for frontline defenders

The ultimate value of threat intelligence is measured by its ability to be "operationalized" into specific, technical actions that help frontline defenders detect and ...

Episode 58 — Drive detection engineering with intel requirements

Intelligence requirements should be the primary driver for the detection engineering process, ensuring that the organization’s monitoring rules are specifically tuned ...

Episode 59 — Enable proactive threat hunting that finds needles

Proactive threat hunting uses intelligence to search for "hidden" threats that have successfully bypassed automated security controls, requiring a disciplined, human-l...

Episode 60 — Write decision-focused reports leaders actually read

Writing effective intelligence reports requires a "decision-focused" approach, ensuring that busy executive leaders can immediately understand the threat and the speci...

Broadcast by