Nisos Podcast

Subscribe to Podcast on Apple      Subscribe to Podcast on Google Podcast     Subscribe to Podcast on Spotify

Subscribe via your favorite podcast provider

Episode 54:

Personal Information Exposure Can Lead to Disaster >>

Episode 6:

Supply Chain Attacks Escalation and Evolution by Foreign Nation States >>

Episode 53:

Thinking about Cybersecurity Challenges in the Geopolitical and World Economic Context >>

Episode 52:

Evolution of Nisos Over the Last Six Years from the Operators>>

Episode 51:

Building and Implementing Security Programs within Fast Growing Technology Companies >>

Episode 50:

Intelligence Management: Translating Biden’s Executive Order for Public and Private Enterprise >>

Episode 49:

Building a Security Program for a Fast Growth Technology Company >>

Episode 5:

Nisos Attributes and Unmasks Insider Threat Saboteurs Who Caused $1M in Business Loss >>

Episode 48:

Using Intelligence Analysis in InfoSec: Think Globally and Act Locally >>

Episode 47:

Security Enabling the Business During Periods of Fast Growth >>

Episode 4:

Attribution to Russian GRU During 2016 Ukraine Cyber Attacks >>

Episode 46:

Navigating the Complex Challenges of Trust and Safety Teams >>

Episode 45:

Different Motivations Between Espionage and Crime Actors >>

Episode 44:

Automating Cyber Threat Intelligence 101 >>

Episode 3:

The World of Online Platform Abuse and Fraud >>

Episode 43:

Mastercard’s Cybersecurity Strategy to Secure the Digital Ecosystem >>

Episode 42:

Building an Enterprise Intel Program >>

Episode 2:

Selling Backdoor Access to a Managed Service Provider >>

Episode 41:

Scaling a Cyber Fusion Center Using Threat Intelligence >>

Episode 40:

Forensic Cyberpsychology: How Anonymity Normalizes the Abnormal >>

Episode 1:

The Attribution, Arrest, and Sentencing of Spyeye Malware Developers Alexander Panin and Hamza Bendellaj >>

Episode 39:

External Threat Hunting & Active Defense with Intuit’s Shannon Lietz >>

Episode 38:

Digital Identity Reduction for Executive Protection >>

Episode 37:

Exploring the Intelligence Differentiator: The Nisos Dogpile >>

Episode 36:

Attributes of a Robust Third Party Risk Management Program >>

Episode 35:

Creation, Maintenance, and Ethics of Sock Puppets >>

Episode 34:

Defending Against Chinese State-Sponsored Espionage >>

Episode 33:

Defending a Cloud-based Remote Workforce >>

Episode 32:

Consuming Intelligence >>

Episode 31:

Legal Options for Disinformation and Deepfakes >>

Episode 30:

State of the Cyber Threat Intelligence Market >>

Episode 28:

Governance and Risk in the Board Room >>

Episode 27:

Defining Selectors in the World of Digital Crime >>

Episode 26:

Appropriate Security Tools and Log Aggregation at Scale For Medium Size Enterprise >>

Episode 25:

Cybersecurity Blocking, Tackling, and Intelligence Use for Medium Enterprise >>

Episode 24:

How Much Intelligence a CISO Needs >>

Episode 23:

Using Automation for Stronger SOC Collaboration >>

Episode 22:

Ransomware Negotiations and Risk Management >>

Episode 21:

The Evolution of Disinformation in the US and UK >>

Episode 20:

Legal Ramifications of Vulnerability Disclosure >>

Episode 19:

Third Party Risk Management in the View of Medium Size Businesses >>

Episode 18:

Using Threat Intelligence Throughout the Enterprise >>

Episode 17:

Using Threat Intelligence Against Platform Abuse >>

Episode 16:

Managing Cyber Risk Through Data Flow Accountability >>

Episode 15:

Analysis of Betterment and Exclusions of Cyber Insurance >>

Episode 14:

Moving OSINT Data to Intelligence >>

Episode 13:

Uber’s Dan Williams >>

Episode 12:

Tesla’s Charles Finfrock >>

Episode 11:

Square’s Alan Orlikoski >>

Episode 10:

RMS’ Dave Ruedger >>

Bonus Episode:

Deepfakes (Part 2) >>

Bonus Episode:

Deepfakes (Part 1) >>

Episode 9:

AVX’s Zach Moody >>

Episode 8:

Mars’ Andrew Stanley >>

Episode 7:

Control Risk Group’s Michael Rohrs >>

Episode 6:

Nisos’ Tyler Robinson >>

Episode 5:

Crowell & Moring’s Gabe Ramsey >>

Episode 4:

Delve Risk’s Anthony Johnson >>

Episode 3:

Nisos’ Cindy Otis >>

Episode 2:

LogMeIn’s Gerald Beuchelt >>

Episode 1:

Cooley’s Randy Sabett >>

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks