cyint_dude @[email protected]

3.8K posts

cyint_dude @cyint_dude@infosec.exchange banner
cyint_dude @cyint_dude@infosec.exchange

cyint_dude @[email protected]

@CYINT_dude

Technical Director of #threatintel @thomsonreuters | rock climber & boulderer | tweets and views are my own | Mastodon:@[email protected]

Katılım Mayıs 2014
2.4K Takip Edilen5.3K Takipçiler
cyint_dude @cyint_dude@infosec.exchange
@_John_Doyle You have a bouldering area in your office?!?! Who sets the problems? My climbing gym is very close but an office gym is another level!
English
1
0
2
147
Joshua Coppola
Joshua Coppola@T1l2L3n·
@CYINT_dude Just curious, i noticed it is marked as hybrid. Is there an FT remote potential with this one or does it require the hybrid part?
English
1
0
0
110
hogfly 🌻
hogfly 🌻@4n6ir·
No one cares about your #CTI Nostradamus quotient. Your confidence ratings and predictions and judgements are meaningless and won’t influence a decision if you don’t have a recommendation, you or they can’t act on it, and if you can’t associate a cost.
English
3
3
10
1.8K
cyint_dude @cyint_dude@infosec.exchange
cyint_dude @[email protected]@CYINT_dude·
@KyleTDavis1 Keep a list of topics/issues customers care about and review if/how your team can address them. Collect sources and change processes where needed to fulfill requirements. And don't mention "PIRs" to stakeholders (because they don't care and that's okay). #threatintel
English
0
1
1
273
cyint_dude @cyint_dude@infosec.exchange
cyint_dude @[email protected]@CYINT_dude·
@KyleTDavis1 PIR's in the #threatintel space IMO have been mostly over-engineering and intellectualized, drawing too much from .mil in the overly prescriptive development and management, leading to overhead that most teams can't handle...
English
1
1
3
384
A Beacon Of Wisdom In These Ignorant Times
Somebody: You think PIRs are overrated? Me: Yes. Somebody: And threat intel platforms too? Me: OMG, yes. Somebody: And daily reports? Me: Particularly early on, but guilty as charged. Somebody: Is there anything you like? Me: Yes, useful stuff.
English
1
0
6
662
JD Work
JD Work@HostileSpectrum·
For anyone still unclear on the point, X Twitter is not a medium for delivery of finished intelligence. It may be useful in exhortations for attention to tradecraft, or to highlight lines of analysis that may be further developed in product. A shop may also use it to highlight contract / case BLUF or specific KJ, this is however dependent on underlying analysis & production outside of this platform. Do not confuse the two
English
2
0
7
1.2K
cyint_dude @cyint_dude@infosec.exchange
My colleague has identified a valid ChatGPT use case for security operations. Watch out for those 4625 logs poppin' off skrrt skrrt.
cyint_dude @cyint_dude@infosec.exchange tweet media
English
0
2
8
1.2K
cyint_dude @cyint_dude@infosec.exchange
If your company is using AI internally, or developing customer-facing AI products, then #threatintel teams will be expected to start answering questions about the related risks (like, right now). This is going to be a very challenging requirement IMO.
English
1
0
0
383
cyint_dude @cyint_dude@infosec.exchange
Re: #2 - there's no escaping it: we need to understand how AI systems work, their flaws, the threats, and the risks. Emerging frameworks from NIST, and MITRE ATLAS are providing helpful taxonomies. There is a rich corpus of academic research in AML (via arxiv.org)..
cyint_dude @cyint_dude@infosec.exchange tweet media
English
1
0
1
480
cyint_dude @cyint_dude@infosec.exchange
Re: #1 - Executives will be closely watching how other companies are responding to the SEC's new "4 day disclosure" rule. The SEC Edgar search allows you to create an RSS feed of 8-K filings and it includes the "Items" filed. Pay attention to the "Item 1.05" filings.
cyint_dude @cyint_dude@infosec.exchange tweet media
English
1
1
0
366
cyint_dude @cyint_dude@infosec.exchange
Two collection requirements I anticipate #threatintel teams needing to prioritize this year: 1) SEC 8-K filings with the new "Item 1.05" for disclosures of possible material breaches and 2) adversarial machine learning TTP
English
1
3
13
3K