You can not miss this! Wes Spencer is a seasoned CISO (Chief Information Security Officer) who’s currently working at Perch Security. In this podcast, we talk about some tips and tricks for security organizations of all sizes. Wes has some invaluable information for security technology buyers, so this is a must hear!
For more information on Wes, and to find items we refer to in the podcast, please feel free to follow the links below.
Over the past 18 months, I’ve had the pleasure of working on a platform that allows companies access to Threat Intelligence in a way they’ve never had before. Instead of using a tool like Soltra Edge to just download intelligence, now, customers can use the Perch solution to also detect and triage any sort of alerts that come from their intelligence communities. Intelligence communities appear in many different forms. From the ‘informal’ e-mail or IRC channel groups that you’ll never know about, to the hyper formal ISACs (Information Sharing and Analysis Center) that are mandated by the US federal government. I’ve written previously about community threat intelligence.
Yet I haven’t touched on a topic that plagues a lot of companies and industries.
What if their industry doesn’t have a sharing center?
What if the companies don’t know about their industry sharing center?
What if the company doesn’t know how to use the intel?
Worst of all, What if the community doesn’t have any intel!?!?!
To help work through some thoughts here, I wanted to invite my first ever guest write on my blog. Curtis Davis. I first met Curtis when he was investigating the Perch security solution. Over time, we got to work together, including co-presenting a talk on Security Automation and Detection at the LegalSec2017 conference. I found it fitting to continue our co-creation of thought provoking (hopefully) content around cybersecurity, with a topic related to this question.