Listen "Getting Ahead Of Your Threat Intelligence Program"
Episode Synopsis
All links and images for this episode can be found on CISO Series. A threat intelligence program sounds like a sound effort in any security program. But, can you pull it off? There are so many phases to execute properly. Blow it with any one of them and your threat intelligence effort is moot. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us today is our special guest Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group. Thanks to our podcast sponsor, Comcast DataBee™, from Comcast Technology Solutions, is a cloud-native security, risk and compliance data fabric platform that transforms your security data chaos into connected outcomes. Built by security professionals for security professionals, DataBee enables users to examine the past, react to the present, and protect the future of the business. In this episode: A threat intelligence program sounds like a sound effort in any security program. But, can you pull it off? Which phase of a threat intelligence program gives you the most trouble, and why? What has been your personal experience, and does it change organization to organization? How do you measure the success of the program to prove the value of the work being done?
More episodes of the podcast Defense in Depth
What Makes a Successful CISO?
08/01/2026
How Should CISOs Talk to the Business
18/12/2025
How Much Cyber Risk Should a CISO Own?
11/12/2025
How to Manage Configuration Drift
13/11/2025
Is Least Privilege Dead?
06/11/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.