Podcast Platitudes

by | Sep 2, 2020 | Blog, Trust and Safety

Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes its consumers better at their jobs the day they consume it.

It’s not just podcast platitudes, listen to the experts; their suggestions and processes work!

With that in mind, we’d like to congratulate Nisos friend and former Cyber5® Podcast guest Charles Finfrock, the insider threat program manager at Tesla. On the podcast in June, Finfrock highlighted simple and inexpensive steps program managers can take to achieve success, including routine infosec awareness training for all employees.

Tesla publicly confirmed last week that it thwarted an attempted Russian-origin recruitment of a Tesla employee designed to install ransomware on the Tesla network. Tesla was able to take action which resulted not only in its network being protected, but the would-be attacker being arrested by the FBI.

Well done Tesla team!

Listen here to Finfrock’s comments on how to build an employee-centric monitoring program:

Table of Contents

Podcast with Charles Finfrock


Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks