Listen "Security operations centers: around the Hash Table."
Episode Synopsis
Four members of the CyberWire’s Hash Table of experts: Don Welch: Interim CIO of Penn State University Helen Patton: CISO for Ohio State University Bob Turner: CISO for the University of Wisconsin at Madison Kevin Ford: CISO for the State of North Dakota discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Learn more about your ad choices. Visit megaphone.fm/adchoices
More episodes of the podcast CISO Perspectives (public)
The existing state of regulation.
23/09/2025
The return of CISO Perspectives.
16/09/2025
Bringing it all together.
08/07/2025
Mid season reflection with Kim Jones.
10/06/2025
Are we a trade or a profession?
22/04/2025
Is the cyber talent ecosystem broken?
15/04/2025
CISO Perspectives is back!
08/04/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.