The Evolution of Cyber Threat Intelligence
Listen now
Description
In this episode of the Big Phish: Adventures in Tech Podcast, host Aileen Ward welcomes Jess Parnell, the Chief Information Security Officer (CISO) of Centripetal, to delve into the evolution of cyber threat intelligence. With a rich background that includes serving as the SOC manager for the US Health and Human Services, Jess brings a unique perspective shaped by his experiences in both government and private sectors. Jess's cybersecurity career launched with a key role in the US government, overseeing security for a major organization. This period, marked by significant learning and challenges, built his foundation in cyber threat intelligence. Now in the private sector at Centripetal, he leads daily operations and teams across IT and network engineering, showcasing his wide-ranging expertise in cybersecurity. Throughout the conversation, Jess explains the concept of cyber threat intelligence, tracing its roots back to traditional intelligence methodologies used in military operations. He highlights the parallels between anticipating challenges on the battlefield and preparing for cyber threats, underscoring the importance of informed, actionable intelligence in crafting effective defense strategies. Leaning on his military background, he elucidates the concept of cyber threat intelligence, tracing its roots back to traditional intelligence methodologies used in military operations. He highlights the parallels between anticipating challenges on the battlefield and preparing for cyber threats, underscoring the importance of informed, actionable intelligence in crafting effective defense strategies. Drawing from extensive experience, Jess examines the evolution of cyber threat intelligence, from its early days of manual report generation to the dynamic, real-time analysis required to combat today's sophisticated threats. He reflects on the challenges of collaboration and information sharing within government agencies, emphasizing the need for trust, efficiency, and adaptability in intelligence operations. He also addresses the implications of emerging technologies and the shifting landscape of cyber threats - advocating for a proactive, intelligence-driven approach to cybersecurity, stressing the importance of continuous learning, cross-sector collaboration, and leveraging a diverse array of intelligence sources.
More Episodes
Published 03/12/24
In this episode of the Big Phish Adventures in Phish podcast, Heath Taylor, an accomplished information security professional, shares his path into cybersecurity. His introduction into security occurred during his time in the United States Navy, where he worked in cryptography. Transitioning to...
Published 10/16/23
Investing in people is often one of the most valuable investments a business can make, but how? Gina Plytas, founder of Pearls of Wisdom Consulting, shares how important retaining exceptional talent is, and often the key to achieving this lies in investing in their personal growth and well-being....
Published 07/07/23