Artwork

Content provided by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Conor Sherman - Vulnerabilities, threat intelligence and hunting

59:13
 
Share
 

Manage episode 214242047 series 2322514
Content provided by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Conor is currently VP of Security at Clear after recently leaving Apollo Global Management as Director of Cyber Security. Conor has successfully built, redesigned, and reinvigorated cyber security programs for fast paced, high performing companies. By leveraging security orchestration and automation (SOAR), and machine learning techniques, Conor delivers highly effective Security Operation Centers (SOCs), Threat Intelligence and hunting capabilities. The programs are aligned with business objectives, and bring exponential threat reduction with incremental investment. He takes a “hands on” leadership style and builds programs with a first principles mindset following the Agile methodology. Key minutes 07:25 - What Cyber Security Means 08:30 - Defining Confidence 10:30 - Why would a organisation spend more on Cyber Security? 17:50 - How would you go out and assess vulnerabilities within an organisation? 22:15 - Would knowing your vulnerabilities help organisations move forwards 23:50 - The difference between a SOC and a threat intelligence program 27:00 - External vs internal threats 30:10 - Implementing these into any organisation 35:00 - The difference between a threat intelligence and threat hunter program 38:40 - Selecting the right vendors 44:25 - How long does it to build a program? 46:00 - What does success look like? 49:10 - Building the next generation of Investigation centres Key Points - Everything with Cyber Security has to bring integrity, trust and confidence - Security needs to be integrated within everything from day one - Threat intelligence is your lead indicator of an attack. SOC is your response. Threat hunting is you being pro-active before an attack has or is about to happen. You can find: Conor on LinkedIn at: https://www.linkedin.com/in/conordsherman Conor on Twitter at: https://twitter.com/conordsherman?lang=en Conor on Medium at: https://medium.com/@ConorDSherman Follow us: Twitter: @zero_hourpod Instagram: @zerohourexperience Website: www.karlsharman.com This podcast is sponsored by: BeecherMadden - www.beechermadden.com Cyber Security Professionals - www.cybersecurity-professionals.com
  continue reading

53 episodes

Artwork
iconShare
 
Manage episode 214242047 series 2322514
Content provided by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by ZeroHourPodcast - The best in cybersecurity talent and Karl Sharman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Conor is currently VP of Security at Clear after recently leaving Apollo Global Management as Director of Cyber Security. Conor has successfully built, redesigned, and reinvigorated cyber security programs for fast paced, high performing companies. By leveraging security orchestration and automation (SOAR), and machine learning techniques, Conor delivers highly effective Security Operation Centers (SOCs), Threat Intelligence and hunting capabilities. The programs are aligned with business objectives, and bring exponential threat reduction with incremental investment. He takes a “hands on” leadership style and builds programs with a first principles mindset following the Agile methodology. Key minutes 07:25 - What Cyber Security Means 08:30 - Defining Confidence 10:30 - Why would a organisation spend more on Cyber Security? 17:50 - How would you go out and assess vulnerabilities within an organisation? 22:15 - Would knowing your vulnerabilities help organisations move forwards 23:50 - The difference between a SOC and a threat intelligence program 27:00 - External vs internal threats 30:10 - Implementing these into any organisation 35:00 - The difference between a threat intelligence and threat hunter program 38:40 - Selecting the right vendors 44:25 - How long does it to build a program? 46:00 - What does success look like? 49:10 - Building the next generation of Investigation centres Key Points - Everything with Cyber Security has to bring integrity, trust and confidence - Security needs to be integrated within everything from day one - Threat intelligence is your lead indicator of an attack. SOC is your response. Threat hunting is you being pro-active before an attack has or is about to happen. You can find: Conor on LinkedIn at: https://www.linkedin.com/in/conordsherman Conor on Twitter at: https://twitter.com/conordsherman?lang=en Conor on Medium at: https://medium.com/@ConorDSherman Follow us: Twitter: @zero_hourpod Instagram: @zerohourexperience Website: www.karlsharman.com This podcast is sponsored by: BeecherMadden - www.beechermadden.com Cyber Security Professionals - www.cybersecurity-professionals.com
  continue reading

53 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play