How Is Our Data Being Weaponized Against Us?

Published: June 30, 2022, 10 a.m.

b'

All links and images for this episode can be found on CISO Series

How are nefarious actors using our own data (and metadata) against us? And given that, in what way have we lost our way protecting data that needs to be course corrected?

Check out\\xa0this post\\xa0for the discussions that are the basis of our conversation on this week\\u2019s episode co-hosted by me,\\xa0David Spark\\xa0(@dspark), the producer of\\xa0CISO Series, and\\xa0Geoff Belknap\\xa0(@geoffbelknap), CISO,\\xa0LinkedIn. Our sponsored guest is John Ayers (@cyberjohn1747), vp of advanced detection and response office of the CTO, Optiv.

Thanks to our podcast sponsor, Optiv

Optiv

The modern enterprise needs a solution as unique as its business.
\\xa0
Optiv\\u2019s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutter and find the ideal security solutions for your business. ADR delivers tailored detection and response backed by technology, real-time intel and deep expertise applied at touch. Bottom line: ADR finds and neutralizes threats fast, so you can focus on what matters.

In this episode:

  • How are nefarious actors using our own data (and metadata) against us?
  • In what way have we lost our way protecting data that needs to be corrected?
  • We examine how our interconnectedness is both a blessing and a curse.
  • Is there already far too much sensitive data in essentially open source intelligence?
'