We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode How Is Our Data Being Weaponized Against Us?

How Is Our Data Being Weaponized Against Us?

2022/6/30
logo of podcast Defense in Depth

Defense in Depth

Shownotes Transcript

All links and images for this episode can be found on CISO Series)

How are nefarious actors using our own data (and metadata) against us? And given that, in what way have we lost our way protecting data that needs to be course corrected?

Check out this post) for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark) (@dspark)), the producer of CISO Series), and Geoff Belknap) (@geoffbelknap)), CISO, LinkedIn). Our sponsored guest is John Ayers) (@cyberjohn1747)), vp of advanced detection and response office of the CTO, Optiv).

Thanks to our podcast sponsor, Optiv

)

The modern enterprise needs a solution as unique as its business.   Optiv’s Advanced Detection and Response) (ADR) works with your organization to comb through the D&R clutter and find the ideal security solutions for your business. ADR delivers tailored detection and response backed by technology, real-time intel and deep expertise applied at touch. Bottom line: ADR finds and neutralizes threats fast, so you can focus on what matters.

In this episode:

  • How are nefarious actors using our own data (and metadata) against us?
  • In what way have we lost our way protecting data that needs to be corrected?
  • We examine how our interconnectedness is both a blessing and a curse.
  • Is there already far too much sensitive data in essentially open source intelligence?