Audra Streetman

212 Followers
339 Following
119 Posts
Senior Threat Intelligence Analyst at Splunk

In the final episode of season 2 of The Security Detail, hear from past interview guests about the skills they think will be most import in the future for cybersecurity professionals. Here's one excerpt from Adam Pennington who leads the MITRE ATT&CK project.

You can listen to the full episode here: https://thesecuritydetail.podbean.com/e/skills/

#cybersecurity #infosec

Ep. 9: Top Cybersecurity Skills According to Past Interview Guests | The Security Detail

In episode 9 of The Security Detail, hear from past interview guests about what they consider to be the most important cybersecurity skill for future practitioners.   

ICYMI: Episode 8 of The Security Detail features predictions from past interview guests about the future of emerging technologies like generative AI and quantum computing.

You can listen to the full episode here:
https://thesecuritydetail.podbean.com/e/emerging-technology/

#cybersecurity #ai #quantumcomputing

Ep. 8: Emerging Technology Predictions from Past Interview Guests | The Security Detail

In episode 8 of The Security Detail, hear from past interview guests about their predictions for emerging technology, like artificial intelligence and quantum computing.  Resources:  Cipher Brief article: https://www.thecipherbrief.com/how-ai-is-helping-the-u-s-unravel-chinas-dangerous-hacking-operation  

ICYMI: Adam Pennington (@_whatshisface) recently joined The Security Detail to talk about the origins of MITRE ATT&CK and how to leverage the framework for adversary emulation and red teaming. You can listen to the full episode here:
https://thesecuritydetail.podbean.com/e/mitre-attack/

#cybersecurity

Ep. 7: MITRE ATT&CK framework featuring Adam Pennington, MITRE ATT&CK Lead | The Security Detail

The MITRE ATT&CK framework provides a standardized taxonomy and knowledge base of adversary tactics, techniques, and procedures (TTPs), enabling organizations to enhance threat detection, response, and mitigation strategies effectively. In this episode, Adam Pennington tells us about the origins of the ATT&CK project, how organizations can effectively leverage it, and the journey that led Adam to his current role as the project's leader.     Resources:  Mitre ATT&CK website: https://attack.mitre.org/ .conf24 agenda: https://conf.splunk.com/  ATT&CKCon Presentations: https://attack.mitre.org/resources/learn-more-about-attack/ ATT&CK Evaluations Program: https://mitre-engenuity.org/cybersecurity/attack-evaluations/ Adam's BSides Talk (Bringing Intelligence into Cyber Deception with MITRE ATT&CK): https://www.youtube.com/watch?v=eL4iLUw1ee8 Adam's DEF CON Talk (Emulating Adversary w Imperfect Intelligence): https://www.youtube.com/watch?v=cXlWY3OnjO0 David Bianco's Pyramid of Pain: https://www.youtube.com/watch?v=3Xrl6ICxKxI  Dr. Fetterman’s blog: https://www.splunk.com/en_us/blog/security/revisiting-the-big-picture-macro-level-att-ck-updates-for-2023.html

ICYMI: Robert M. Lee joined Madeleine and me on The Security Detail to discuss cyber threats facing the electric sector. You can listen to the full episode here:

https://thesecuritydetail.podbean.com/e/electric/

Ep. 6: Electric featuring Robert M. Lee, CEO and Co-Founder of Dragos | The Security Detail

Cybersecurity is crucial for the electric sector to safeguard critical infrastructure from cyber threats and potential disruptions, ensuring the reliable and secure delivery of electricity to homes, businesses, and essential services. In episode 6, Robert M. Lee, CEO and Co-Founder of Dragos provides an overview of the top cyber threats facing electric utilities and the role that Dragos plays in strengthening ICS and OT resilience.   Resources:  Dragos Community Defense Program: https://www.dragos.com/community/community-defense-program/ Dragos 2023 OT Cybersecurity Year in Review report: https://www.dragos.com/ot-cybersecurity-year-in-review/ SANS Instructor Biography: https://www.sans.org/profiles/robert-m-lee/ Sandworm book: https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405 'U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure': https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical 'Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)': https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian 'A Global Police Operation Just Took Down the Notorious LockBit Ransomware Gang': https://www.wired.com/story/lockbit-ransomware-takedown-website-nca-fbi/ 'Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology': https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology SECURING OPERATIONAL TECHNOLOGY: A DEEP DIVE INTO THE WATER SECTOR: https://homeland.house.gov/hearing/securing-operational-technology-a-deep-dive-into-the-water-sector/

In the latest episode of The Security Detail, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry. You can listen to the full episode here:
https://thesecuritydetail.podbean.com/e/food-and-agriculture/
#cybersecurity
Ep. 5: Food and Agriculture featuring Jonathan Braley, director of the Food and Ag-ISAC | The Security Detail

The food and agriculture industry is a critical sector that represents nearly a fifth of US economic activity. Businesses in this sector also rely on other important industries such as water, transportation, and energy. In this episode, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry, as well as the various services offered through the ISAC.    Resources:  Food and Agriculture ISAC website: https://www.foodandag-isac.org/ Cybersecurity Guide for Food and Ag Small and Medium Enterprises: https://www.foodandag-isac.org/resources CISA publication on Chinese-manufactured UAS: https://www.cisa.gov/resources-tools/resources/cybersecurity-guidance-chinese-manufactured-uas  

Join me and Patrick Coughlin this Thursday at 1pm ET for a discussion about Splunk's security predictions for 2024! We'll cover generative AI use cases, the elevated role of the CISO, and of course, ransomware. Hope you'll join us!

https://discover.splunk.com/Splunk-Security-Predictions-What-To-Expect-in-2024.html
#cybersecurity

Splunk Security Predictions: What To Expect in 2024 | Virtual Event | Splunk

The AI promises of today may become the cybersecurity perils of tomorrow. Discover the emerging opportunities and obstacles Splunk security leaders foresee in 2024.

Today I had the opportunity to tour NATO’s flagship cyber defense exercise in Tallinn, Estonia.

Cyber Coalition 2023 features 1,300 global participants from 35 NATO members and partners as well as the EU.

Stay tuned for interviews in a future episode of The Security Detail.