36:40

Episode 12: Doctor’s Hours: Q&A with Dr. Dark Web

April 13, 2022


Listen on SpotifyListen on Apple Podcasts

As our host, Chris Roberts, says, you must ask questions if you want to learn.
So, in this episode of Dr. Dark Web, we’re having our Q&A session — that we refer to as the Doctor’s Hours — where Chris answers some of the frequently asked questions from our audience regarding threat intelligence.
If you are interested in learning more, keep reading or tune in to this episode of Dr. Dark Web.

Podcast Insights

🎙️ The threat intelligence design process requires everyone in an organization to be involved. The common misconception regarding cybersecurity is that it’s one department’s job. Although you’ll need professionals specializing in this field, you need everyone to be involved because security concerns the entire organization. ”You want a legal and compliance [team] and the rest of IT. By IT, I mean development, operations, network, server, and old database folks. And then leadership, [whoever] is representative of that team needs to be part of it. And the business, especially if you’ve got a diverse business.”

 

🎙️ When purchasing technology, approach it the same way you buy a car. People still look at purchases differently. For instance, few people think about security when buying a computer or smartphone (especially those who purchase it for personal purposes). ”We need to get people into that mindset to ask those same questions when they buy technology. Typically, when people buy a car, they want to know the safety rating. Some of them care about how many pollutants it’s going to give off; some care about various other things. All these other things would count as well with technology. We need to get that same consumer base to go, ‘Hey, is putting this into my home going to increase my risks? Is it going to decrease them? What’s it made of? Where’s the software?”’

🎙️ It’s time for companies to change their approach to cybersecurity. Every organization must have an intel team to help them detect and analyze attacks in a timely manner. How do they do that? They know where to look for clues. ”I’ve got to go out there and go, ‘Hey, is there any chatter about this organization out there on the darker side of the net?’ Now, in this case, there was. We found some ransomware stuff. We found the site; we found the organization, and we’ve done a fair bit of digging. And all of that has been based on doing some threat intelligence work.”