The Cyber5 Podcast

RMS’ Dave Ruedger

Episode 10 of the podcast covers how modern CISOs think about the future of threat intelligence with Dave Ruedger CIO & CISO at RMS.

(0:21) Introductions
(1:55) Question 1: What kind of information do you see threat intel feeds providing, and which ones are most compelling to you?
(4:35) Question 2: Is it unique to have information sharing with other portfolio companies? How does that work programmatically?
(7:01) Question 3: What are the new, hot data sets you’re seeing?
(9:35) Question 4: Are you aware of an increase in adversaries targeting containerized environments?
(11:55) Question 5: Are you thinking about threat intelligence differently as it relates to cloud and containerized environments that support a dispersed workforce?
(17:36) Closing Remarks

Episode 10 | July 24, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks