Description
Watchdogs in tow, hosts Nic Fillingham and Natalia Godyla are joined by guest Randy Treit, Principal Security Leader at Microsoft, to examine the process of identifying the source of a threat and stopping the spread by protecting “patient zero.” Randy has a few key tricks up his sleeve as a defender, but you can decide if they’re more impressive than the antics he and his identical twin have pulled while working at Microsoft.
In the second segment, Jeremy Dallman, Principal Program Manager at Microsoft, discusses why some bad actors are known in the security world under some of the most seemingly harmless codenames, such as “Fancy Bear” and “Charming Kitten”, and highlights the techniques his team is using to protect Microsoft’s customers from Nation State actors.
In This Episode, You Will Learn:
How Microsoft is defending and protecting patient zero
The history of Defender and antimalware
The process of finding gaps in protections
The importance of protecting customers from Nation State actors
How and why security vendors use codenames to refer to threat activity groups
Some Questions We Ask:
What is different about focusing on patient zero than other aspects of security?
How does Microsoft measure the false positive rate in protecting patient zero?
What tools are being used on a day-to-day basis in defender security?
Why does Microsoft partner with the industry to identify Nation State actors?
How many groups are utilizing AI and ML to enhance their ability to become a threat?
Links
Microsoft Digital Defense Report:
https://www.microsoft.com/en-us/security/business/security-intelligence-report
Randy’s LinkedIn
https://www.linkedin.com/in/rtreit/
Jeremy’s LinkedIn
https://www.linkedin.com/in/jeremydallman/
Nic’s LinkedIn
https://www.linkedin.com/in/nicfill/
Natalia’s LinkedIn
https://www.linkedin.com/in/nataliagodyla/
Microsoft Security Blog:
https://www.microsoft.com/security/blog/
See acast.com/privacy for privacy and opt-out information.
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22