
Detection at Scale
Podcast by Panther Labs
The Detection at Scale Podcast is dedicated to helping security practitioners and their teams succeed at managing and responding to threats at a modern, cloud scale. Every episode is focused on actionable takeaways to help you get ahead of the curve and prepare for the trends and technologies shaping the future.
90 vrk ilmainen kokeilu
Kokeilun jälkeen 7,99 € / kuukausi.Peru milloin tahansa.
Kaikki jaksot
64 jaksot
In this episode of Detection at Scale, Jack speaks with Erik Bloch [https://www.linkedin.com/in/erikbloch/], VP of Security, Illumio [https://www.illumio.com/], about why most security operations teams aren't ready for AI tools and what fundamental processes must be in place first. Erik challenges the industry's obsession with new technologies, sharing stories from his experience transforming underperforming security teams at major companies like Cisco, Salesforce, and Atlassian. His conversation with Jack [https://www.linkedin.com/in/jacknaglieri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAmvNvcBAgsSm1DUoZEsYc0NYx-V2ri87Mg&lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQxkNNqOUShCAJmVXVaoeVQ%3D%3D] explores how to measure what actually matters in security operations, from team capacity utilization to business outcome dispositions, and why proper ticketing systems and actionable metrics are prerequisites for any advanced tooling to be effective. Topics discussed: * The importance of establishing fundamental processes like ticketing systems and metrics before implementing AI tools in security operations. * How to measure team capacity utilization and resource allocation to identify when security operations teams are operating beyond sustainable levels. * Why traditional security metrics like mean time to detect are often vanity metrics that don't provide actionable business intelligence. * The critical need for security leaders to communicate in business language with concrete data rather than anecdotal risk assessments. * How managed service providers will likely be the first to successfully adopt AI tools due to their standardized processes. * The challenge of proving AI tool effectiveness when most organizations lack baseline metrics to measure improvement against established benchmarks. * Why security teams gravitate toward building custom tools and how this impacts their approach to adopting commercial AI solutions. * The role of MCP in enabling security teams to create their own agents and integrate multiple tools. * How AI should focus on eliminating routine tasks like phishing email analysis rather than trying to catch advanced persistent threats. * The framework for implementing AI tools by starting with business outcomes, defining metrics, identifying capabilities, and then inserting automation. Listen to more episodes: Apple [https://podcasts.apple.com/us/podcast/detection-at-scale/id1582584270] Spotify [https://open.spotify.com/show/6xa9t5dty4eH0UXDQXIew9?si=1df5eac89b294b14] YouTube [https://youtube.com/playlist?list=PLjYWlPBgNuD4f-hPjTyq3iPC-nT64ckFr&feature=shared] Website [https://panther.com/resources/podcasts]

Drawing from his experience building enterprise SOCs and teaching thousands of security professionals, John Hubbard [http://linkedin.com/in/johnlhubbard/], Cyber Defense Curriculum Lead at SANS Institute [https://www.sans.org/] and host of the Blueprint [http://blueprint.buzzsprout.com] podcast, tells Jack [https://www.linkedin.com/in/jacknaglieri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAmvNvcBAgsSm1DUoZEsYc0NYx-V2ri87Mg&lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQxkNNqOUShCAJmVXVaoeVQ%3D%3D] about how AI is revolutionizing security operations centers, including balancing AI automation with fundamental analyst skills. They also explore practical AI applications in alert contextualization, team performance analysis, and the future vision of natural language interfaces for complex security tasks. John emphasizes the importance of teaching both traditional methods and AI-enhanced approaches, ensuring security teams can leverage technology while maintaining critical thinking capabilities. He also discusses considerations around local versus cloud-based AI models and offers actionable advice for security professionals looking to future-proof their careers in an increasingly automated landscape. Topics discussed: * How AI transforms alert contextualization by dynamically incorporating business context and asset information for better triage decisions. * The educational challenge of teaching both foundational security methods and AI-enhanced approaches to maintain analyst skills. * Practical applications of AI in SOC operations, including automated phishing triage and mass analysis of analyst performance data. * The evolution toward natural language interfaces that could enable complex security tasks like packet analysis through conversational commands. * Custom agent development versus relying on vendor-provided AI solutions, including the technical challenges and coding requirements involved. * Future SOC architecture predictions featuring interconnected agents, MCP protocols, and the abstraction of traditional security analyst tasks. * Local versus cloud-based AI model considerations, including data privacy concerns, computational requirements, and trust implications. * The critical question of oversight in automated security operations and who monitors AI agents in increasingly autonomous systems. * Performance analysis capabilities enabled by AI's ability to process written text and logs at scale for team improvement insights. * Practical advice for security professionals to embrace discomfort, invite AI into problem-solving, and establish mentoring relationships for career growth. Listen to more episodes: Apple [https://podcasts.apple.com/us/podcast/detection-at-scale/id1582584270] Spotify [https://open.spotify.com/show/6xa9t5dty4eH0UXDQXIew9?si=37dda55f5cb64d0b] YouTube [https://youtube.com/playlist?list=PLjYWlPBgNuD4f-hPjTyq3iPC-nT64ckFr&feature=shared] Website [https://panther.com/resources/podcasts]

Elliot Colquhoun [https://www.linkedin.com/in/elliot-colquhoun-21335b50/], VP of Information Security + IT at Airwallex [https://www.airwallex.com/us], has built what might be the most AI-native security program in fintech, protecting 1,800 employees with just 9 security engineers by building systems that think like the best security engineers. His approach to contextualizing every security alert with institutional knowledge offers a blueprint for how security teams can scale exponentially without proportional headcount growth. Elliot tells Jack [https://www.linkedin.com/in/jacknaglieri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAmvNvcBAgsSm1DUoZEsYc0NYx-V2ri87Mg&lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQxkNNqOUShCAJmVXVaoeVQ%3D%3D] his unconventional path from Palantir's deployed engineer program to leading security at a Series F fintech, emphasizing how his software engineering background enabled him to apply product thinking to security challenges. His insights into global security operations highlight the complexity of protecting financial infrastructure across different regulatory environments, communication platforms, and cultural contexts while maintaining unified security standards. Topics discussed: * The strategic approach to building security teams with 0.5% employee ratios through AI automation and hiring engineers with entrepreneurial backgrounds rather than traditional security-only experience. * How to architect internal AI platforms that contextualize security alerts by analyzing historical incidents, documentation, and company-specific knowledge to replicate senior engineer decision-making at scale. * The methodology for navigating global regulatory compliance across different jurisdictions while maintaining development velocity and avoiding the trap of building security programs that slow down business operations. * Regional security strategy development that accounts for different communication platform preferences, cultural attitudes toward privacy, and varying attack vectors across global markets. * The framework for continuous detection refinement using AI to analyze false positive rates, true positive trends, and automatically iterate on detection strategies to improve accuracy over time. * Implementation strategies for mixing and matching frontier AI models based on specific use cases, from using Claude for analysis to O1 for initial assessments and Gemini for deeper investigation. * "Big bet" security investments where teams dedicate 30% of their time to experimental projects that could revolutionize security operations if successful. * How to structure data and human-generated content to support future AI use cases, including training security engineers to document their reasoning for model improvement. * The transition from traditional security tooling to agent-based systems that can control multiple security tools while maintaining business-specific context and institutional knowledge. * The challenge of preserving institutional knowledge as AI systems replace human processes, including considerations for direct AI-to-regulator communication and maintaining human oversight in critical decisions. Listen to more episodes: Apple [https://podcasts.apple.com/us/podcast/detection-at-scale/id1582584270] Spotify [https://open.spotify.com/show/6xa9t5dty4eH0UXDQXIew9?si=37dda55f5cb64d0b] YouTube [https://youtube.com/playlist?list=PLjYWlPBgNuD4f-hPjTyq3iPC-nT64ckFr&feature=shared] Website [https://panther.com/resources/podcasts]

In this episode of Detection at Scale, Jack [https://www.linkedin.com/in/jacknaglieri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAmvNvcBAgsSm1DUoZEsYc0NYx-V2ri87Mg&lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQxkNNqOUShCAJmVXVaoeVQ%3D%3D] speaks with Jacob DePriest [https://www.linkedin.com/in/jacobdepriest/], VP of Security/CISO at 1Password [https://1password.com/?utm_medium=social&utm_source=linkedin&utm_campaign=Link-in-bio], who shares insights from his 15-year journey from the NSA to leading security at GitHub through his current role. Jacob discusses his framework for assessing security programs with fresh eyes, emphasizing business objectives first, then addressing risks, and finally implementing the right security measures. He also explores how generative AI can enhance security operations while maintaining that human expertise remains essential for understanding threat intent. As 1Password transforms from a password manager to a multi-product security platform, Jacob outlines his approach to scaling security through engineering partnerships and automation, while offering practical leadership advice on building relationships, maintaining work-life balance, and aligning security initiatives with business goals. Topics discussed: * Transitioning from engineering to security leadership and how that technical background provides empathy when implementing security controls. * Approaching security program assessment by first understanding business objectives, then identifying risks, and finally implementing appropriate measures. * Exploring 1Password's evolution from a password management product to a multi-product security company with extended access management. * Balancing generative AI's capabilities with human expertise in security operations, recognizing AI's limitations in understanding intent. * Leveraging AI to enhance incident response through automated summaries and context gathering to speed up triage processes. * Implementing AI applications in GRC functions like vendor reviews and third-party questionnaires to increase efficiency and reduce tedium. * Building sustainable security operations by ensuring security tools have proper access to data through education and partnership. * Addressing the varying security postures across the vendor landscape through a risk-based approach focusing on access and visibility. * Scaling security teams by clearly connecting their work to business objectives and ensuring team members understand why their tasks matter. * Three pillars of security leadership: building a trusted network, establishing sustainable work-life balance, and connecting security to business goals. Listen to more episodes: Apple [https://podcasts.apple.com/us/podcast/detection-at-scale/id1582584270] Spotify [https://open.spotify.com/show/6xa9t5dty4eH0UXDQXIew9?si=e4d73b2c5c744fb2] YouTube [https://youtube.com/playlist?list=PLjYWlPBgNuD4f-hPjTyq3iPC-nT64ckFr&feature=shared] Website [https://panther.com/resources/podcasts]

In this episode of Detection at Scale, Matthew Martin [https://www.linkedin.com/in/mattmartin/], Founder of Two Candlesticks [https://www.two-candlesticks.com/], shares practical approaches for implementing AI in security operations, particularly for smaller companies and those in emerging markets. Matthew explains how AI chatbots can save analysts up to 45 minutes per incident by automating initial information gathering and ticket creation. Matthew’s conversation with Jack [https://www.linkedin.com/in/jacknaglieri?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAmvNvcBAgsSm1DUoZEsYc0NYx-V2ri87Mg&lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BQxkNNqOUShCAJmVXVaoeVQ%3D%3D] explores critical implementation challenges, from organizational politics to data quality issues, and the importance of making AI decisions auditable and explainable. Matthew emphasizes the essential balance between AI capabilities and human intuition, noting that although AI excels at analyzing data, it lacks understanding of intent. He concludes with valuable advice for security leaders on business alignment, embracing new technologies, and maintaining human connection to prevent burnout. Topics discussed: * Implementing AI chatbots in security operations can save analysts approximately 45 minutes per incident through automated information gathering and ticket creation. * Political challenges within organizations, particularly around AI ownership and budget allocation, often exceed technical challenges in implementation. * Data quality and understanding are foundational requirements before implementing AI in security operations to ensure effective and reliable results. * The balance between human intuition and AI capabilities is crucial, as AI excels at data analysis but lacks understanding of intent behind actions. * Security teams should prioritize making AI decisions auditable and explainable to ensure transparency and accountability in automated processes. * Generative AI lowers barriers for both attackers and defenders, requiring security teams to understand AI capabilities and limitations. * In-house data processing and modeling are preferable for sensitive customer data, with clear governance frameworks for privacy and security. * Future security operations will likely automate many Tier 1 and Tier 2 functions, allowing analysts to focus on more complex issues. * Security leaders must understand their business thoroughly to build controls that align with how the company generates revenue. * Technology alone cannot solve burnout issues; leaders must understand their people at a human level to create sustainable efficiency improvements.
90 vrk ilmainen kokeilu
Kokeilun jälkeen 7,99 € / kuukausi.Peru milloin tahansa.
Podimon podcastit
Mainoksista vapaa
Maksuttomat podcastit