Nisos Podcast

Subscribe to Podcast on Apple      Subscribe to Podcast on Google Podcast     Subscribe to Podcast on Spotify

Subscribe via your favorite podcast provider

Episode 44:

Automating Cyber Threat Intelligence 101 >>

Episode 3:

The World of Online Platform Abuse and Fraud>>

Episode 43:

Mastercard’s Cybersecurity Strategy to Secure the Digital Ecosystem >>

Episode 42:

Building an Enterprise Intel Program >>

Episode 2:

Selling Backdoor Access to a Managed Service Provider >>

Episode 41:

Scaling a Cyber Fusion Center Using Threat Intelligence >>

Episode 40:

Forensic Cyberpsychology: How Anonymity Normalizes the Abnormal >>

Episode 1:

The Attribution, Arrest, and Sentencing of Spyeye Malware Developers Alexander Panin and Hamza Bendellaj >>

Episode 39:

External Threat Hunting & Active Defense with Intuit’s Shannon Lietz >>

Episode 38:

Digital Identity Reduction for Executive Protection >>

Episode 37:

Exploring the Intelligence Differentiator: The Nisos Dogpile >>

Episode 36:

Attributes of a Robust Third Party Risk Management Program >>

Episode 35:

Creation, Maintenance, and Ethics of Sock Puppets >>

Episode 34:

Defending Against Chinese State-Sponsored Espionage >>

Episode 33:

Defending a Cloud-based Remote Workforce >>

Episode 32:

Consuming Intelligence >>

Episode 31:

Legal Options for Disinformation and Deepfakes >>

Episode 30:

State of the Cyber Threat Intelligence Market >>

Episode 28:

Governance and Risk in the Board Room >>

Episode 27:

Defining Selectors in the World of Digital Crime >>

Episode 26:

Appropriate Security Tools and Log Aggregation at Scale For Medium Size Enterprise >>

Episode 25:

Cybersecurity Blocking, Tackling, and Intelligence Use for Medium Enterprise >>

Episode 24:

How Much Intelligence a CISO Needs >>

Episode 23:

Using Automation for Stronger SOC Collaboration >>

Episode 22:

Ransomware Negotiations and Risk Management >>

Episode 21:

The Evolution of Disinformation in the US and UK >>

Episode 20:

Legal Ramifications of Vulnerability Disclosure >>

Episode 19:

Third Party Risk Management in the View of Medium Size Businesses >>

Episode 18:

Using Threat Intelligence Throughout the Enterprise >>

Episode 17:

Using Threat Intelligence Against Platform Abuse >>

Episode 16:

Managing Cyber Risk Through Data Flow Accountability >>

Episode 15:

Analysis of Betterment and Exclusions of Cyber Insurance >>

Episode 14:

Moving OSINT Data to Intelligence >>

Episode 13:

Uber’s Dan Williams >>

Episode 12:

Tesla’s Charles Finfrock >>

Episode 11:

Square’s Alan Orlikoski >>

Episode 10:

RMS’ Dave Ruedger >>

Bonus Episode:

Deepfakes (Part 2) >>

Bonus Episode:

Deepfakes (Part 1) >>

Episode 9:

AVX’s Zach Moody >>

Episode 8:

Mars’ Andrew Stanley >>

Episode 7:

Control Risk Group’s Michael Rohrs >>

Episode 6:

Nisos’ Tyler Robinson >>

Episode 5:

Crowell & Moring’s Gabe Ramsey >>

Episode 4:

Delve Risk’s Anthony Johnson >>

Episode 3:

Nisos’ Cindy Otis >>

Episode 2:

LogMeIn’s Gerald Beuchelt >>

Episode 1:

Cooley’s Randy Sabett >>

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks