A Conversation with Christine Gadsby from BlackBerry

A Conversation with Christine Gadsby from BlackBerry

In this conversation, I speak with Christine Gadsby, Head of Product Security Operations Team at BlackBerry.

We talk about:

The Role of AI in Cybersecurity:

AI's real advancements, practical applications, and associated challenges, moving beyond the hype.

Enhancing Incident Response and Threat Hunting

Christine highlights AI's significant impact on enhancing incident response and threat hunting, how AI quickly analyzes vast data to identify Indicators of Compromise (IoCs), automates routine tasks, and improves decision-making with actionable insights.

The Evolution of Blackberry in Cybersecurity

Christine discusses Blackberry's shift from mobile devices to cybersecurity, emphasizing their focus on highly regulated environment and how the acquisition of Silence brought advanced AI capabilities, enhancing their security solutions.


Among other topics.


Intro (00:00:00)
AI in Cybersecurity: Hype or Reality? (00:00:06)
Incident Response and Threat Hunting (00:01:12)
Automation in Security Programs (00:02:08)
Industry-Specific AI Needs (00:03:20)
AI's Role in Regulated Environments (00:04:23)
Blackberry's AI Integration (00:04:50)
Perceptions of Blackberry's Evolution (00:06:51)
Trust in Vendor Relationships (00:09:11)
AI's Potential in Monitoring (00:11:12)
Challenges of Staffing in Cybersecurity (00:13:18)
Staff Turnover in Cybersecurity (00:13:54)
Burnout and Job Satisfaction (00:14:18)
Hiring Challenges in Security (00:15:17)
Confusion in Cyber Job Market (00:16:10)
Job Changes Among Cyber Leaders (00:17:10)
Outsourcing Security Functions (00:18:09)
Pressure from Boards (00:18:57)
Evolving Security Needs (00:19:40)
Human Element in Cybersecurity (00:20:46)
Talent Pipeline Issues (00:21:40)
Challenges of Smaller Companies (00:22:32)
Job Satisfaction and Workload (00:24:03)
Pressure Cooker Environment (00:24:43)
Crypto Attacks Resurgence (00:26:16)
Crypto Mining Discussion (00:26:33)
APT 32 Insights (00:27:22)
Employee Training Importance (00:28:41)
Indicators of Crypto Mining (00:29:45)
Detection Challenges (00:30:30)
Normal System Behavior (00:32:13)
Looking Ahead to 2025 (00:32:44)
*Supply Chain Pressures (00:35:08)
Arms Race in Security (00:35:27)
Liability Hot Potato (00:36:27)
Managed Services Growth (00:36:44)
Cyber Insurance Trends (00:37:52)
CISO Evolution (00:39:10)
The Importance of Trust in Supply Chain (00:39:56)
Predictions for Cybersecurity Roles (00:40:46)
Following Blackberry's Work (00:41:00)
Networking and Future Conversations (00:41:05)
Conclusion (00:41:37)

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Episoder(532)

Unsupervised Learning: No. 58

Unsupervised Learning: No. 58

This week's topics: Yahoo!, Shadowbrokers, Building Your Own Honeytrapping Infrastructure, The Power of Newsletters, Project Aristotle, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

19 Des 201614min

Unsupervised Learning: No. 57

Unsupervised Learning: No. 57

This week’s topics: Russia gave us attribution for Christmas, the NSA is shedding talent, the evilest ransomware, how to raise someone's IQ in 2 minutes, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

12 Des 201629min

Unsupervised Learning: No. 56

Unsupervised Learning: No. 56

Gooligan, Korean Game Hacking Law, DoubleFlag Experian Hack, Georgia Tech Attribution Research, Amazon's re:Invent Conference Highlights, recommended links, and more…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

5 Des 201614min

Unsupervised Learning: No. 55

Unsupervised Learning: No. 55

Biowarfare defenses, AI advances, mergers and acquisitions, Facebook and censorship, IoT definitions, the philosophy of Westworld, and more...Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

28 Nov 201624min

The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks

The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks

My essay that clearly separates the differences between the core infosec terms of threat, threat actor, vulnerabilty, and risk.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

27 Nov 20165min

The Difference Between Existentialism, Nihilism, and Absurdism

The Difference Between Existentialism, Nihilism, and Absurdism

For centuries there have been people who believe there is no intrinsic meaning in the universe. Here I’ll summarize the three major branches of this belief, and how each proposes we deal with the situation.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

22 Nov 20168min

Stop Being Proud of Complexity

Stop Being Proud of Complexity

An essay on how complexity often communicates the exact opposite of its desired effect.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

22 Nov 20163min

Unsupervised Learning: No. 54

Unsupervised Learning: No. 54

Britain's new surveillance law, CRISPR biotech, the Army's new Phaser, NIST's new IoT Security guidelines, ML-based facial recognition, and more...Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

21 Nov 201614min

Populært innen Teknologi

romkapsel
rss-avskiltet
teknisk-sett
energi-og-klima
shifter
tomprat-med-gunnar-tjomlid
rss-impressions-2
nasjonal-sikkerhetsmyndighet-nsm
elektropodden
smart-forklart
rss-alt-som-gar-pa-strom
fornybaren
kunstig-intelligens-med-morten-goodwin
rss-snakk-om-sikkerhet
rss-alt-vi-kan
rss-bouvet-bobler
teknologi-og-mennesker
rss-digitaliseringspadden
i-loopen
rss-polypod