<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2432798.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Cyber Threat Intelligence Podcast</title>

  <lastBuildDate>Fri, 13 Mar 2026 20:24:25 -0600</lastBuildDate>
  <link>https://www.cyberthreatintelligencepodcast.com/</link>
  <language>en-us</language>
  <copyright>© 2026 Cyber Threat Intelligence Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
  <podcast:funding url="https://buymeacoffee.com/ctipodcast">Support this Podcast</podcast:funding>
  <podcast:guid>7d948bb4-197b-514e-af56-ef39137f72c2</podcast:guid>
  <podcast:txt purpose="verify">pedro@cyberthreatintelligencepodcast.com</podcast:txt>
  <itunes:author>Pedro Kertzman</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p><b>Welcome to the Cyber Threat Intelligence Podcast</b>—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI.</p><p><br></p><p>In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime.</p><p><br></p><p>Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down complex topics into actionable insights. From ransomware attacks and insider threats to geopolitical cyber risks and AI-driven security solutions, we cover all things CTI.</p><p><br></p><p>Join us biweekly for in-depth interviews with industry leaders and experienced professionals in the Cyber Threat Intelligence space. If, like me, you’re always in <b>learning mode</b>—seeking to understand today’s threats, anticipate tomorrow’s, and stay ahead of adversaries—this podcast is your essential companion.</p><p><br></p><p><b>Stay informed. Stay vigilant. Tune in to the Cyber Threat Intelligence Podcast.</b></p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Pedro Kertzman</itunes:name>
    <itunes:email>pedro@cyberthreatintelligencepodcast.com</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/2wtglqa9zr55vuzcpp7y2oyhtac1?.jpg</url>
     <title>Cyber Threat Intelligence Podcast</title>
     <link>https://www.cyberthreatintelligencepodcast.com/</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/2wtglqa9zr55vuzcpp7y2oyhtac1?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="host" href="https://www.linkedin.com/in/pedrokertzman" img="https://storage.buzzsprout.com/sr9dlvv2utzajnb078ty4pcurfat">Pedro Kertzman</podcast:person>
  <item>
    <itunes:title>How Militarization, Language, And Policy Shape Modern Hacktivism (Anastasia Sentsova &amp; Pedro Kertzman)</itunes:title>
    <title>How Militarization, Language, And Policy Shape Modern Hacktivism (Anastasia Sentsova &amp; Pedro Kertzman)</title>
    <itunes:summary><![CDATA[The moment a “hacktivist” group starts speaking with a state’s voice, the puzzle of attribution changes. We explore how Russian-speaking cybercrime transformed after 2022, why so many crews began to move in sync with national narratives, and what language, targeting, and coordination can reveal about influence without leaning on weak assumptions. Our guest, analyst Anastasia Sentsova, brings deep regional fluency and years of fieldwork to explain how militarization, culture, and policy shape ...]]></itunes:summary>
    <description><![CDATA[<p>The moment a “hacktivist” group starts speaking with a state’s voice, the puzzle of attribution changes. We explore how Russian-speaking cybercrime transformed after 2022, why so many crews began to move in sync with national narratives, and what language, targeting, and coordination can reveal about influence without leaning on weak assumptions. Our guest, analyst Anastasia Sentsova, brings deep regional fluency and years of fieldwork to explain how militarization, culture, and policy shape a pipeline that normalizes digital action and pulls volunteers toward more aggressive operations.<br/><br/>We walk through the rise of coordinated Telegram ecosystems, including bot-driven “cyber squads” that gamify propaganda with ranks, points, and real-world rewards. That may sound harmless, but it builds habits, grows networks, and legitimizes escalation. From there, it’s a short step to DDoS—and increasingly—intrusions that touch critical infrastructure. We also examine the ransomware world’s political boundaries: no-go lists that evolved from domestic targets to BRICS countries, selective law enforcement pressure following diplomatic milestones, and the unspoken bargain that keeps operators productive so long as they toe the line.<br/><br/>Rather than force-fit labels like sponsored or tolerated, we talk about influence as a measurable spectrum. Indicators include state rhetoric in native-language posts, synchronized activity with kinetic events, target selection aligned with policy goals, and public signaling when named individuals “celebrate” sanctions without consequence. For practitioners, we offer concrete ways to avoid Western bias, validate translations, and build multi-source cases with explicit confidence levels. And we look ahead: the proxy model travels, youth pipelines deepen skills, and hybrid operations blur the boundary between hacktivists and APTs.<br/><br/>If this kind of clear-eyed CTI resonates, follow the show, share it with your team, and leave a review so others can find it. Join our LinkedIn group, Cyber Threat Intelligence Podcast, to keep the conversation going and tell us what signals you’re tracking next.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>The moment a “hacktivist” group starts speaking with a state’s voice, the puzzle of attribution changes. We explore how Russian-speaking cybercrime transformed after 2022, why so many crews began to move in sync with national narratives, and what language, targeting, and coordination can reveal about influence without leaning on weak assumptions. Our guest, analyst Anastasia Sentsova, brings deep regional fluency and years of fieldwork to explain how militarization, culture, and policy shape a pipeline that normalizes digital action and pulls volunteers toward more aggressive operations.<br/><br/>We walk through the rise of coordinated Telegram ecosystems, including bot-driven “cyber squads” that gamify propaganda with ranks, points, and real-world rewards. That may sound harmless, but it builds habits, grows networks, and legitimizes escalation. From there, it’s a short step to DDoS—and increasingly—intrusions that touch critical infrastructure. We also examine the ransomware world’s political boundaries: no-go lists that evolved from domestic targets to BRICS countries, selective law enforcement pressure following diplomatic milestones, and the unspoken bargain that keeps operators productive so long as they toe the line.<br/><br/>Rather than force-fit labels like sponsored or tolerated, we talk about influence as a measurable spectrum. Indicators include state rhetoric in native-language posts, synchronized activity with kinetic events, target selection aligned with policy goals, and public signaling when named individuals “celebrate” sanctions without consequence. For practitioners, we offer concrete ways to avoid Western bias, validate translations, and build multi-source cases with explicit confidence levels. And we look ahead: the proxy model travels, youth pipelines deepen skills, and hybrid operations blur the boundary between hacktivists and APTs.<br/><br/>If this kind of clear-eyed CTI resonates, follow the show, share it with your team, and leave a review so others can find it. Join our LinkedIn group, Cyber Threat Intelligence Podcast, to keep the conversation going and tell us what signals you’re tracking next.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18594273-how-militarization-language-and-policy-shape-modern-hacktivism-anastasia-sentsova-pedro-kertzman.mp3" length="33126660" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i0y1u6royewjqkts9jc7n4nupxsx?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18594273</guid>
    <pubDate>Tue, 03 Mar 2026 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18594273/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18594273/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18594273/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18594273/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/18594273/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Season Two Kickoff &amp; Guest Intro" />
  <psc:chapter start="1:21" title="Framing Attribution: Sponsored Or Influenced" />
  <psc:chapter start="3:35" title="Hacktivist Surge After 2022" />
  <psc:chapter start="6:05" title="Coordination, Targeting, And State Objectives" />
  <psc:chapter start="10:40" title="Attribution Caution And Geopolitics" />
  <psc:chapter start="14:30" title="Russian-Speaking Cybercrime, Not Just Russia" />
  <psc:chapter start="18:00" title="Language As A Signal Of State Influence" />
  <psc:chapter start="22:15" title="Militarization And The Domestic Landscape" />
  <psc:chapter start="27:20" title="The State’s Carrot And Stick With Ransomware" />
  <psc:chapter start="32:40" title="Target Rules And Political Boundaries" />
  <psc:chapter start="36:40" title="Named Individuals And Public Signaling" />
  <psc:chapter start="41:20" title="Official Movements And Digital Conscription" />
</psc:chapters>
    <itunes:duration>2756</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Threat Intelligence Podcast - Season 2 Premiere</itunes:title>
    <title>Cyber Threat Intelligence Podcast - Season 2 Premiere</title>
    <itunes:summary><![CDATA[🎙 Season 2 Starts March 3rd  Season 1 was about building foundations. Season 2 is about raising the bar.  We’re diving deeper into the Cyber, Threats, and Intelligence, with practitioners who live it every day.   FULL Video: https://youtu.be/oa2t9GQl6EU   📅 Premiere: March 3rd 🔔 Subscribe now so you don’t miss it.  The threat landscape evolves. So should we.       Send a text Support the show Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave...]]></itunes:summary>
    <description><![CDATA[<p>🎙 Season 2 Starts March 3rd<br/><br/>Season 1 was about building foundations.<br/>Season 2 is about raising the bar.<br/><br/>We’re diving deeper into the Cyber, Threats, and Intelligence, with practitioners who live it every day.</p><p><br/></p><p>FULL Video: https://youtu.be/oa2t9GQl6EU</p><p><br/></p><p>📅 Premiere: March 3rd<br/>🔔 Subscribe now so you don’t miss it.<br/><br/>The threat landscape evolves.<br/>So should we.</p><p><br/></p><p><br/></p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>🎙 Season 2 Starts March 3rd<br/><br/>Season 1 was about building foundations.<br/>Season 2 is about raising the bar.<br/><br/>We’re diving deeper into the Cyber, Threats, and Intelligence, with practitioners who live it every day.</p><p><br/></p><p>FULL Video: https://youtu.be/oa2t9GQl6EU</p><p><br/></p><p>📅 Premiere: March 3rd<br/>🔔 Subscribe now so you don’t miss it.<br/><br/>The threat landscape evolves.<br/>So should we.</p><p><br/></p><p><br/></p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18697159-cyber-threat-intelligence-podcast-season-2-premiere.mp3" length="529199" type="audio/mpeg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18697159</guid>
    <pubDate>Mon, 16 Feb 2026 20:00:00 -0700</pubDate>
    <itunes:duration>40</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 Finale</itunes:title>
    <title>Season 1 Finale</title>
    <itunes:summary><![CDATA[Want fewer fire drills and smarter security moves? This season finale brings together the strongest lessons from our guests on how cyber threat intelligence turns uncertainty into clarity—and clarity into action. We share what actually works when the data is partial, the stakes are high, and leadership wants proof that CTI moves the needle on risk and cost.  We start with the core: prioritization under uncertainty. You’ll hear how teams use intelligence to decide what to patch first, where co...]]></itunes:summary>
    <description><![CDATA[<p>Want fewer fire drills and smarter security moves? This season finale brings together the strongest lessons from our guests on how cyber threat intelligence turns uncertainty into clarity—and clarity into action. We share what actually works when the data is partial, the stakes are high, and leadership wants proof that CTI moves the needle on risk and cost.<br/><br/>We start with the core: prioritization under uncertainty. You’ll hear how teams use intelligence to decide what to patch first, where controls matter most, and how to focus limited resources without missing the threats that can take a business offline or put customer data at risk. We dig into the language of value—money saved, revenue protected, efficiency gained—and why BLUF, clear implications, and stakeholder interviews beat jargon every time. If you’ve wrestled with KPIs, KRIs, or ROI, we unpack practical metrics that reflect real outcomes, not vanity numbers.<br/><br/>From there, we look ahead. Forecasting adversary capabilities, mapping susceptibility, and choosing proactive mitigations can shift a security program from reactive to resilient. You’ll get candid perspectives on building CTI the right way—starting tactically and growing into operational and strategic impact, or choosing a build-vs-buy path aligned to budget and goals. We also talk careers and team shape: why diverse backgrounds thrive in CTI, how small teams can deliver outsized results, and the discipline of deciding what you will not do so you can excel at what matters.<br/><br/>If you want CTI to influence decisions at every level—SOC, IR, red and purple teams, and the board—this wrap-up offers the playbook: stakeholder-first communication, focused scope, useful metrics, and a relentless push toward proactive defense. Follow, share, and leave a review to help more practitioners find these insights—and tell us: what CTI metric best proves your impact?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Want fewer fire drills and smarter security moves? This season finale brings together the strongest lessons from our guests on how cyber threat intelligence turns uncertainty into clarity—and clarity into action. We share what actually works when the data is partial, the stakes are high, and leadership wants proof that CTI moves the needle on risk and cost.<br/><br/>We start with the core: prioritization under uncertainty. You’ll hear how teams use intelligence to decide what to patch first, where controls matter most, and how to focus limited resources without missing the threats that can take a business offline or put customer data at risk. We dig into the language of value—money saved, revenue protected, efficiency gained—and why BLUF, clear implications, and stakeholder interviews beat jargon every time. If you’ve wrestled with KPIs, KRIs, or ROI, we unpack practical metrics that reflect real outcomes, not vanity numbers.<br/><br/>From there, we look ahead. Forecasting adversary capabilities, mapping susceptibility, and choosing proactive mitigations can shift a security program from reactive to resilient. You’ll get candid perspectives on building CTI the right way—starting tactically and growing into operational and strategic impact, or choosing a build-vs-buy path aligned to budget and goals. We also talk careers and team shape: why diverse backgrounds thrive in CTI, how small teams can deliver outsized results, and the discipline of deciding what you will not do so you can excel at what matters.<br/><br/>If you want CTI to influence decisions at every level—SOC, IR, red and purple teams, and the board—this wrap-up offers the playbook: stakeholder-first communication, focused scope, useful metrics, and a relentless push toward proactive defense. Follow, share, and leave a review to help more practitioners find these insights—and tell us: what CTI metric best proves your impact?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18536330-season-1-finale.mp3" length="17209624" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rslzo6phj2fyexc33qkhk9t4n7vu?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18536330</guid>
    <pubDate>Tue, 20 Jan 2026 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18536330/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18536330/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18536330/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18536330/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/18536330/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Season Finale Setup" />
  <psc:chapter start="0:36" title="Host Introduction And Goals" />
  <psc:chapter start="1:25" title="Prioritization Under Uncertainty" />
  <psc:chapter start="2:01" title="CTI As Decision Support" />
  <psc:chapter start="2:31" title="Communicating Value And ROI" />
  <psc:chapter start="3:39" title="Stakeholders, Implications, And Messaging" />
  <psc:chapter start="4:36" title="Capability Maturity And Metrics" />
  <psc:chapter start="5:17" title="Forecasting Threats To Get Proactive" />
  <psc:chapter start="6:14" title="Building CTI Journeys And BLUF" />
  <psc:chapter start="7:08" title="Skills, Passion, And Team Size Myths" />
  <psc:chapter start="8:06" title="Build vs Buy And Scoping Focus" />
  <psc:chapter start="9:24" title="Protecting Availability And Data" />
  <psc:chapter start="10:22" title="Pathways Into CTI And Thanks" />
</psc:chapters>
    <itunes:duration>1430</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 23 (Pedro Kertzman &amp; Alex Keedy)</itunes:title>
    <title>Season 1 - Episode 23 (Pedro Kertzman &amp; Alex Keedy)</title>
    <itunes:summary><![CDATA[Want a front-row seat to how cyber threat intelligence turns noise into decisions that save real money and protect trust? Pedro Kertzman sits down with Alex Keedy, a seasoned CTI leader with experience at Flashpoint, ZeroFox, Intel 471, Deloitte, and Booz Allen Hamilton, to unpack the craft of translating technical signal into business impact. From a political science beginning to profiling actors and advising executives, Alex shows why great intelligence starts with curiosity and ends with c...]]></itunes:summary>
    <description><![CDATA[<p>Want a front-row seat to how cyber threat intelligence turns noise into decisions that save real money and protect trust? Pedro Kertzman sits down with Alex Keedy, a seasoned CTI leader with experience at Flashpoint, ZeroFox, Intel 471, Deloitte, and Booz Allen Hamilton, to unpack the craft of translating technical signal into business impact. From a political science beginning to profiling actors and advising executives, Alex shows why great intelligence starts with curiosity and ends with clarity: here’s what’s happening, what it means for us, and what we should do next.<br/><br/>We dig into the tough question every leader asks: how do you prove ROI for attacks that never landed? Alex breaks down practical models that map blocked activity to benchmark costs, balance tangible savings with brand and trust impacts, and prioritize the few actions that reduce the most risk. For mid-sized organizations, she lays out a pragmatic roadmap: start small, tap managed services, automate the obvious, and use early wins to earn budget. You’ll hear how a$10 stolen credential becomes a$50M outage, why ransomware-as-a-service thrives, and how to disrupt that supply chain before it reaches your environment.<br/><br/>Alex also opens the curtains on dark web tradecraft. Reputation-driven marketplaces demand embedded personas to validate threats, verify leaks, and ask the questions victims can’t. That access helps teams confirm exposure, guide response, and even support law enforcement—with examples spanning financial fraud, takedowns, and human trafficking investigations. Along the way, we share actionable learning paths: SANS webcasts, vendor blogs, Security+ or Network+ for baseline fluency, and community routes like B‑Sides and scholarships that lower barriers for new talent.<br/><br/>If you care about cybersecurity strategy, budget impact, and real-world outcomes, this conversation delivers the playbook: align intelligence to business risk, measure what matters, and communicate in plain language. Subscribe, share with a teammate who needs stronger CTI outcomes, and leave a review telling us the one question you want answered next.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Want a front-row seat to how cyber threat intelligence turns noise into decisions that save real money and protect trust? Pedro Kertzman sits down with Alex Keedy, a seasoned CTI leader with experience at Flashpoint, ZeroFox, Intel 471, Deloitte, and Booz Allen Hamilton, to unpack the craft of translating technical signal into business impact. From a political science beginning to profiling actors and advising executives, Alex shows why great intelligence starts with curiosity and ends with clarity: here’s what’s happening, what it means for us, and what we should do next.<br/><br/>We dig into the tough question every leader asks: how do you prove ROI for attacks that never landed? Alex breaks down practical models that map blocked activity to benchmark costs, balance tangible savings with brand and trust impacts, and prioritize the few actions that reduce the most risk. For mid-sized organizations, she lays out a pragmatic roadmap: start small, tap managed services, automate the obvious, and use early wins to earn budget. You’ll hear how a$10 stolen credential becomes a$50M outage, why ransomware-as-a-service thrives, and how to disrupt that supply chain before it reaches your environment.<br/><br/>Alex also opens the curtains on dark web tradecraft. Reputation-driven marketplaces demand embedded personas to validate threats, verify leaks, and ask the questions victims can’t. That access helps teams confirm exposure, guide response, and even support law enforcement—with examples spanning financial fraud, takedowns, and human trafficking investigations. Along the way, we share actionable learning paths: SANS webcasts, vendor blogs, Security+ or Network+ for baseline fluency, and community routes like B‑Sides and scholarships that lower barriers for new talent.<br/><br/>If you care about cybersecurity strategy, budget impact, and real-world outcomes, this conversation delivers the playbook: align intelligence to business risk, measure what matters, and communicate in plain language. Subscribe, share with a teammate who needs stronger CTI outcomes, and leave a review telling us the one question you want answered next.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18369467-season-1-episode-23-pedro-kertzman-alex-keedy.mp3" length="23944989" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v10fmignyx8dtjqsxgu484xxw27u?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18369467</guid>
    <pubDate>Tue, 06 Jan 2026 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18369467/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18369467/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18369467/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18369467/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/18369467/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome And Guest Background" />
  <psc:chapter start="1:06" title="Breaking Into CTI From Poli-Sci" />
  <psc:chapter start="5:24" title="Early Analyst Work And Malware Basics" />
  <psc:chapter start="8:48" title="From Analyst To Business Impact" />
  <psc:chapter start="12:12" title="Quantifying ROI For Intelligence" />
  <psc:chapter start="16:20" title="CTI For Mid-Sized Enterprises" />
  <psc:chapter start="22:00" title="The Scale And Economy Of Cybercrime" />
  <psc:chapter start="27:10" title="Working With Law Enforcement" />
  <psc:chapter start="31:15" title="Inside Dark Web Tradecraft" />
</psc:chapters>
    <itunes:duration>1991</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 22 (Pedro Kertzman &amp; Valerii Soloninka)</itunes:title>
    <title>Season 1 - Episode 22 (Pedro Kertzman &amp; Valerii Soloninka)</title>
    <itunes:summary><![CDATA[Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Along the way, we unpack how fundamentals like networking, DNS, and OS internals still power great CTI, even as LLMs speed up drafting and research. ...]]></itunes:summary>
    <description><![CDATA[<p>Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Along the way, we unpack how fundamentals like networking, DNS, and OS internals still power great CTI, even as LLMs speed up drafting and research.<br/><br/>Valeri takes us inside Russia’s cybersecurity market—large, regulated, and comparatively closed—where public reporting is scarce and partnerships carry the weight of intelligence sharing. That perspective meets a striking case from the Middle East: identifying Lazarus Group activity tied to Russian-language lures, a reminder that geopolitics and targeting rarely align neatly. Allies still spy, strategic programs demand data, and defenders must follow evidence over assumptions. We break down how to translate adversary tactics into detections, drive incident response with attribution-aware guidance, and help vulnerability teams prioritize what matters.<br/><br/>Thinking about moving from SOC to CTI? Valeri’s playbook emphasizes relentless curiosity, a bias for action, and the technical backbone to make sense of infrastructure, indicators, and behavior at speed. We also talk candidly about the Gulf market—its boom years, current hiring realities, and why safety, services, and zero income tax continue to draw talent. For learners at every stage, you’ll hear practical recommendations on podcasts, YouTube channels, Reddit communities, and books that build lasting baselines.<br/><br/>Join us for a candid, story-driven look at building a meaningful CTI career, spotting threats where others aren’t looking, and becoming the teammate IR and SOC leaders seek out when stakes are high. If this conversation helps you think differently, subscribe, share the show with a colleague, and leave a quick review to help others find it. What topic should we dig into next?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Along the way, we unpack how fundamentals like networking, DNS, and OS internals still power great CTI, even as LLMs speed up drafting and research.<br/><br/>Valeri takes us inside Russia’s cybersecurity market—large, regulated, and comparatively closed—where public reporting is scarce and partnerships carry the weight of intelligence sharing. That perspective meets a striking case from the Middle East: identifying Lazarus Group activity tied to Russian-language lures, a reminder that geopolitics and targeting rarely align neatly. Allies still spy, strategic programs demand data, and defenders must follow evidence over assumptions. We break down how to translate adversary tactics into detections, drive incident response with attribution-aware guidance, and help vulnerability teams prioritize what matters.<br/><br/>Thinking about moving from SOC to CTI? Valeri’s playbook emphasizes relentless curiosity, a bias for action, and the technical backbone to make sense of infrastructure, indicators, and behavior at speed. We also talk candidly about the Gulf market—its boom years, current hiring realities, and why safety, services, and zero income tax continue to draw talent. For learners at every stage, you’ll hear practical recommendations on podcasts, YouTube channels, Reddit communities, and books that build lasting baselines.<br/><br/>Join us for a candid, story-driven look at building a meaningful CTI career, spotting threats where others aren’t looking, and becoming the teammate IR and SOC leaders seek out when stakes are high. If this conversation helps you think differently, subscribe, share the show with a colleague, and leave a quick review to help others find it. What topic should we dig into next?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18070899-season-1-episode-22-pedro-kertzman-valerii-soloninka.mp3" length="20640978" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ejxdhpykgxt9gruy5n4am45qhueu?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18070899</guid>
    <pubDate>Tue, 23 Dec 2025 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18070899/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18070899/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18070899/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18070899/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/18070899/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome And Guest Introduction" />
  <psc:chapter start="1:15" title="Valeri’s Path Into Security" />
  <psc:chapter start="5:35" title="From Engineering To SOC At Scale" />
  <psc:chapter start="8:45" title="Choosing CTI And Its Reality" />
  <psc:chapter start="12:25" title="Inside Russia’s Cyber Market" />
  <psc:chapter start="17:40" title="Allies, North Korea, And Targeting" />
  <psc:chapter start="20:50" title="Moving To The UAE" />
  <psc:chapter start="24:00" title="Middle East Cyber Market Dynamics" />
</psc:chapters>
    <itunes:duration>1716</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 21 (Pedro Kertzman &amp; Charlotte Guiney)</itunes:title>
    <title>Season 1 - Episode 21 (Pedro Kertzman &amp; Charlotte Guiney)</title>
    <itunes:summary><![CDATA[What if your best career move starts where you least expect it? Charlotte joins us to share how a love for global history and policy, a bout of academic burnout, and a train-to-hire detour into agile software set the stage for a thriving path in cyber threat intelligence. Her story shows how curiosity, timing, and a willingness to say yes can turn scattered experiences into a focused CTI career.  We dig into the practical differences between enterprise and vendor CTI: why enterprise teams lea...]]></itunes:summary>
    <description><![CDATA[<p>What if your best career move starts where you least expect it? Charlotte joins us to share how a love for global history and policy, a bout of academic burnout, and a train-to-hire detour into agile software set the stage for a thriving path in cyber threat intelligence. Her story shows how curiosity, timing, and a willingness to say yes can turn scattered experiences into a focused CTI career.<br/><br/>We dig into the practical differences between enterprise and vendor CTI: why enterprise teams learn fast by wearing many hats, how vendor roles sharpen deep specialties, and where each path provides leverage. Charlotte breaks down what she learned reporting into a red team—turning intel into action through adversary emulation, purple teaming, and proactive threat hunting that leads directly to better detections. The theme that ties it together is collaboration: fusion teams that share goals move faster and reduce risk in measurable ways.<br/><br/>Charlotte also opens up about management and maturity. Translating technical wins into business language builds trust with leadership and secures long-term investment. We talk through a simple framework for proof: define the problem, show the intervention, quantify the outcome. On the personal side, we cover sustainable learning—curated news feeds, role-aligned priorities, and thoughtful use of LLMs—to stay sharp without burning out. And the mindset that makes it all work? Embrace the gray, follow the side quests, and keep building toward the bigger picture.<br/><br/>If this conversation sparks an idea, share it with a teammate, subscribe for more, and leave a quick review to help others find the show.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What if your best career move starts where you least expect it? Charlotte joins us to share how a love for global history and policy, a bout of academic burnout, and a train-to-hire detour into agile software set the stage for a thriving path in cyber threat intelligence. Her story shows how curiosity, timing, and a willingness to say yes can turn scattered experiences into a focused CTI career.<br/><br/>We dig into the practical differences between enterprise and vendor CTI: why enterprise teams learn fast by wearing many hats, how vendor roles sharpen deep specialties, and where each path provides leverage. Charlotte breaks down what she learned reporting into a red team—turning intel into action through adversary emulation, purple teaming, and proactive threat hunting that leads directly to better detections. The theme that ties it together is collaboration: fusion teams that share goals move faster and reduce risk in measurable ways.<br/><br/>Charlotte also opens up about management and maturity. Translating technical wins into business language builds trust with leadership and secures long-term investment. We talk through a simple framework for proof: define the problem, show the intervention, quantify the outcome. On the personal side, we cover sustainable learning—curated news feeds, role-aligned priorities, and thoughtful use of LLMs—to stay sharp without burning out. And the mindset that makes it all work? Embrace the gray, follow the side quests, and keep building toward the bigger picture.<br/><br/>If this conversation sparks an idea, share it with a teammate, subscribe for more, and leave a quick review to help others find the show.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/18153615-season-1-episode-21-pedro-kertzman-charlotte-guiney.mp3" length="19356433" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pehtz1gtumsjar9y4z1vnnoymfy6?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18153615</guid>
    <pubDate>Tue, 09 Dec 2025 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18153615/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18153615/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18153615/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/18153615/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/18153615/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome And Guest Disclaimer" />
  <psc:chapter start="1:20" title="From IR Studies To Burnout Abroad" />
  <psc:chapter start="3:20" title="Odd Jobs To Agile And Cyber" />
  <psc:chapter start="4:18" title="Entry Into CTI And Red Team Support" />
  <psc:chapter start="5:45" title="Enterprise Vs Vendor CTI Realities" />
  <psc:chapter start="7:52" title="Fusion, Purple Teaming, And Collaboration" />
  <psc:chapter start="9:46" title="From Analyst Thrill To People Management" />
  <psc:chapter start="11:06" title="Side Quests, Pattern Hunting, And Fit" />
  <psc:chapter start="12:25" title="Proving CTI Value To Leadership" />
  <psc:chapter start="14:07" title="Learning Without Burning Out" />
  <psc:chapter start="16:04" title="Curated Feeds, Networks, And LLMs" />
  <psc:chapter start="17:41" title="Final Advice And Embracing The Gray" />
  <psc:chapter start="19:14" title="Closing And Listener CTA" />
</psc:chapters>
    <itunes:duration>1609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 20 (Pedro Kertzman &amp; Sarah Freeman)</itunes:title>
    <title>Season 1 - Episode 20 (Pedro Kertzman &amp; Sarah Freeman)</title>
    <itunes:summary><![CDATA[Remember when critical infrastructure defenders had to convince people that cyber attacks were even possible? Those days are gone. Today's challenge is prioritizing defenses in a landscape where threats are multiplying faster than resources.  Sarah Freeman, Chief Engineer for Intelligence Modeling and Simulation at MITRE's Cyber Infrastructure Protection Innovation Center, takes us on a journey through the evolution of industrial security. With over a decade of experience protecting the syste...]]></itunes:summary>
    <description><![CDATA[<p>Remember when critical infrastructure defenders had to convince people that cyber attacks were even possible? Those days are gone. Today&apos;s challenge is prioritizing defenses in a landscape where threats are multiplying faster than resources.<br/><br/>Sarah Freeman, Chief Engineer for Intelligence Modeling and Simulation at MITRE&apos;s Cyber Infrastructure Protection Innovation Center, takes us on a journey through the evolution of industrial security. With over a decade of experience protecting the systems that power our world, she offers a refreshing perspective that cuts through both complacency and fear.<br/><br/>The conversation explores how industrial security has matured from basic awareness to strategic defense. Sarah reveals how threat actors have shifted tactics, increasingly targeting third-party providers as a way to compromise multiple critical infrastructure customers simultaneously. &quot;More and more of the actors target those companies deliberately,&quot; she explains. &quot;By compromising this one entity, they have theoretical access to all of these customers.&quot;<br/><br/>We dive into the practical challenges of security in operational technology environments, where the sheer volume of vulnerabilities has become overwhelming. Rather than attempting to patch everything, Sarah advocates for a more targeted approach based on anticipating adversary capabilities—a &quot;cyber forecast&quot; that helps organizations focus limited resources where they matter most.<br/><br/>The discussion also tackles the integration of artificial intelligence into traditionally isolated control systems, offering insights on balancing innovation with security. For threat intelligence professionals looking to specialize in industrial security, Sarah provides guidance on essential resources and community connections.<br/><br/>Whether you&apos;re responsible for critical infrastructure protection or simply interested in understanding the unique challenges of securing systems where digital meets physical, this episode offers valuable perspective from someone who&apos;s been on the front lines since before most people recognized the threat existed.<br/><br/>Listen now to gain insights that will help you think more strategically about protecting the systems that power our modern world. Want to connect with other CTI professionals? Join our LinkedIn group &quot;Cyber Threat Intelligence Podcast&quot; to continue the conversation.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Remember when critical infrastructure defenders had to convince people that cyber attacks were even possible? Those days are gone. Today&apos;s challenge is prioritizing defenses in a landscape where threats are multiplying faster than resources.<br/><br/>Sarah Freeman, Chief Engineer for Intelligence Modeling and Simulation at MITRE&apos;s Cyber Infrastructure Protection Innovation Center, takes us on a journey through the evolution of industrial security. With over a decade of experience protecting the systems that power our world, she offers a refreshing perspective that cuts through both complacency and fear.<br/><br/>The conversation explores how industrial security has matured from basic awareness to strategic defense. Sarah reveals how threat actors have shifted tactics, increasingly targeting third-party providers as a way to compromise multiple critical infrastructure customers simultaneously. &quot;More and more of the actors target those companies deliberately,&quot; she explains. &quot;By compromising this one entity, they have theoretical access to all of these customers.&quot;<br/><br/>We dive into the practical challenges of security in operational technology environments, where the sheer volume of vulnerabilities has become overwhelming. Rather than attempting to patch everything, Sarah advocates for a more targeted approach based on anticipating adversary capabilities—a &quot;cyber forecast&quot; that helps organizations focus limited resources where they matter most.<br/><br/>The discussion also tackles the integration of artificial intelligence into traditionally isolated control systems, offering insights on balancing innovation with security. For threat intelligence professionals looking to specialize in industrial security, Sarah provides guidance on essential resources and community connections.<br/><br/>Whether you&apos;re responsible for critical infrastructure protection or simply interested in understanding the unique challenges of securing systems where digital meets physical, this episode offers valuable perspective from someone who&apos;s been on the front lines since before most people recognized the threat existed.<br/><br/>Listen now to gain insights that will help you think more strategically about protecting the systems that power our modern world. Want to connect with other CTI professionals? Join our LinkedIn group &quot;Cyber Threat Intelligence Podcast&quot; to continue the conversation.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17691344-season-1-episode-20-pedro-kertzman-sarah-freeman.mp3" length="27226342" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a4623qypwjrb8jcommsrbhhusc42?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17691344</guid>
    <pubDate>Tue, 25 Nov 2025 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17691344/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17691344/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17691344/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17691344/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17691344/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Critical Infrastructure at Risk" />
  <psc:chapter start="5:42" title="Evolution of ICS Security Awareness" />
  <psc:chapter start="10:40" title="AI in Industrial Control Systems" />
  <psc:chapter start="16:12" title="Best Practices for OT Security" />
  <psc:chapter start="22:32" title="Supply Chain: The New Attack Vector" />
  <psc:chapter start="28:17" title="From Vulnerability Overload to Strategic Defense" />
  <psc:chapter start="34:47" title="Learning Resources for CTI Professionals" />
</psc:chapters>
    <itunes:duration>2264</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 19 (Pedro Kertzman &amp; Tammy Harper)</itunes:title>
    <title>Season 1 - Episode 19 (Pedro Kertzman &amp; Tammy Harper)</title>
    <itunes:summary><![CDATA[Imagine a criminal enterprise so sophisticated it employs lawyers, creates flashy recruitment videos, and operates its own university. Welcome to the modern ransomware ecosystem, expertly decoded by threat intelligence researcher Tammy Harper in this eye-opening episode.  Harper pulls back the curtain on the surprisingly corporate structure of ransomware operations, revealing a three-tiered hierarchy ranging from invite-only "syndicates" managing millions in cryptocurrency to small "operators...]]></itunes:summary>
    <description><![CDATA[<p>Imagine a criminal enterprise so sophisticated it employs lawyers, creates flashy recruitment videos, and operates its own university. Welcome to the modern ransomware ecosystem, expertly decoded by threat intelligence researcher Tammy Harper in this eye-opening episode.<br/><br/>Harper pulls back the curtain on the surprisingly corporate structure of ransomware operations, revealing a three-tiered hierarchy ranging from invite-only &quot;syndicates&quot; managing millions in cryptocurrency to small &quot;operators&quot; struggling to recruit talent, down to inexperienced &quot;script kiddies&quot; with minimal operational security. The business models are equally fascinating – Ransomware-as-a-Service providers take a 20% cut while offering everything from malware payloads to secure communication channels and victim-shaming blogs.<br/><br/>What&apos;s truly alarming is how these criminal groups continue to innovate their extortion techniques. As fewer victims pay ransoms (just one in twenty pay significant amounts), gangs are escalating pressure tactics. Some offer affiliates legal counsel to identify regulatory pressure points, others implement AI-assisted negotiations to counter traditional stalling tactics, and some are even calling victims&apos; clients directly to orchestrate supply chain attacks.<br/><br/>Harper dispels common misconceptions about attack vectors too. Modern ransomware rarely arrives as an email attachment – instead, attacks begin with phishing emails containing Trojans, followed by extensive reconnaissance lasting weeks or even months. &quot;When you see your systems encrypted,&quot; she warns, &quot;it&apos;s too late.&quot; The longest compromise she witnessed lasted a full year from initial infection to ransomware deployment, despite law enforcement warnings to the victim.<br/><br/>Whether you&apos;re a cybersecurity professional or simply curious about digital threats, this episode provides rare insights into a criminal ecosystem that continues to evolve despite increasing law enforcement pressure. Listen now to understand the tactics that make modern ransomware so persistent and how organizations can better protect themselves.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Imagine a criminal enterprise so sophisticated it employs lawyers, creates flashy recruitment videos, and operates its own university. Welcome to the modern ransomware ecosystem, expertly decoded by threat intelligence researcher Tammy Harper in this eye-opening episode.<br/><br/>Harper pulls back the curtain on the surprisingly corporate structure of ransomware operations, revealing a three-tiered hierarchy ranging from invite-only &quot;syndicates&quot; managing millions in cryptocurrency to small &quot;operators&quot; struggling to recruit talent, down to inexperienced &quot;script kiddies&quot; with minimal operational security. The business models are equally fascinating – Ransomware-as-a-Service providers take a 20% cut while offering everything from malware payloads to secure communication channels and victim-shaming blogs.<br/><br/>What&apos;s truly alarming is how these criminal groups continue to innovate their extortion techniques. As fewer victims pay ransoms (just one in twenty pay significant amounts), gangs are escalating pressure tactics. Some offer affiliates legal counsel to identify regulatory pressure points, others implement AI-assisted negotiations to counter traditional stalling tactics, and some are even calling victims&apos; clients directly to orchestrate supply chain attacks.<br/><br/>Harper dispels common misconceptions about attack vectors too. Modern ransomware rarely arrives as an email attachment – instead, attacks begin with phishing emails containing Trojans, followed by extensive reconnaissance lasting weeks or even months. &quot;When you see your systems encrypted,&quot; she warns, &quot;it&apos;s too late.&quot; The longest compromise she witnessed lasted a full year from initial infection to ransomware deployment, despite law enforcement warnings to the victim.<br/><br/>Whether you&apos;re a cybersecurity professional or simply curious about digital threats, this episode provides rare insights into a criminal ecosystem that continues to evolve despite increasing law enforcement pressure. Listen now to understand the tactics that make modern ransomware so persistent and how organizations can better protect themselves.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17797428-season-1-episode-19-pedro-kertzman-tammy-harper.mp3" length="28946289" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bfqsjvkqs5qvosq4x7xt6ltr31jg?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17797428</guid>
    <pubDate>Tue, 11 Nov 2025 00:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17797428/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17797428/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17797428/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17797428/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17797428/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Episode Introduction &amp; Guest Background" />
  <psc:chapter start="4:35" title="Journey into Threat Intelligence" />
  <psc:chapter start="10:53" title="RansomLook: Tracking Ransomware Operations" />
  <psc:chapter start="17:53" title="Ransomware Gang Hierarchy &amp; Operations" />
  <psc:chapter start="26:29" title="Infrastructure Sharing &amp; Cartel Evolution" />
  <psc:chapter start="32:36" title="The New Extortion Techniques" />
  <psc:chapter start="37:52" title="Attack Vectors &amp; Social Engineering" />
</psc:chapters>
    <itunes:duration>2408</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 18 (Pedro Kertzman &amp; Freddy Murre)</itunes:title>
    <title>Season 1 - Episode 18 (Pedro Kertzman &amp; Freddy Murre)</title>
    <itunes:summary><![CDATA["Basically, everyone just do  whatever they feel like and then call it intelligence." With these provocative words, Freddy Murre cuts straight to the heart of what's wrong with most cyber threat intelligence practices today.  Drawing from 13 years of intelligence experience spanning military operations and private sector work, Freddy exposes the critical disconnect between intelligence methodology and what many CTI teams actually deliver. Most security teams, he argues, are producing cyb...]]></itunes:summary>
    <description><![CDATA[<p>&quot;Basically, everyone just do  whatever they feel like and then call it intelligence.&quot; With these provocative words, Freddy Murre cuts straight to the heart of what&apos;s wrong with most cyber threat intelligence practices today.<br/><br/>Drawing from 13 years of intelligence experience spanning military operations and private sector work, Freddy exposes the critical disconnect between intelligence methodology and what many CTI teams actually deliver. Most security teams, he argues, are producing cyber threat information, not intelligence—pushing technical indicators without context, relevance, or the crucial &quot;so what&quot; that decision-makers need.<br/><br/>The conversation explores how CTI professionals often fall back on their technical comfort zones rather than embracing true intelligence tradecraft. Freddy walks us through the intelligence cycle, explaining how requirements drive collection and analysis to produce actionable insights. He challenges the industry norm of one-directional &quot;data dumps&quot; from vendors to customers, advocating instead for a more tailored approach that considers each organization&apos;s specific technologies, vulnerabilities, and business needs.<br/><br/>Perhaps most valuable is Freddy&apos;s practical guidance on stakeholder engagement—identifying who your intelligence serves, understanding their decision-making needs, and continually validating that your work delivers measurable value. &quot;If they can&apos;t articulate the decisions they made based on your intelligence,&quot; he warns, &quot;you&apos;re in a dark space.&quot; His Ferrari analogy brilliantly illustrates how CTI teams must find the right fit between capabilities and stakeholder requirements.<br/><br/>The episode also tackles AI&apos;s impact on intelligence work, with Freddy offering a sobering assessment of large language models&apos; limitations while acknowledging their potential benefits when properly understood as tools rather than solutions. Whether you&apos;re a seasoned CTI professional or just building your program, this conversation provides an essential framework for elevating your practice from information sharing to true intelligence production.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>&quot;Basically, everyone just do  whatever they feel like and then call it intelligence.&quot; With these provocative words, Freddy Murre cuts straight to the heart of what&apos;s wrong with most cyber threat intelligence practices today.<br/><br/>Drawing from 13 years of intelligence experience spanning military operations and private sector work, Freddy exposes the critical disconnect between intelligence methodology and what many CTI teams actually deliver. Most security teams, he argues, are producing cyber threat information, not intelligence—pushing technical indicators without context, relevance, or the crucial &quot;so what&quot; that decision-makers need.<br/><br/>The conversation explores how CTI professionals often fall back on their technical comfort zones rather than embracing true intelligence tradecraft. Freddy walks us through the intelligence cycle, explaining how requirements drive collection and analysis to produce actionable insights. He challenges the industry norm of one-directional &quot;data dumps&quot; from vendors to customers, advocating instead for a more tailored approach that considers each organization&apos;s specific technologies, vulnerabilities, and business needs.<br/><br/>Perhaps most valuable is Freddy&apos;s practical guidance on stakeholder engagement—identifying who your intelligence serves, understanding their decision-making needs, and continually validating that your work delivers measurable value. &quot;If they can&apos;t articulate the decisions they made based on your intelligence,&quot; he warns, &quot;you&apos;re in a dark space.&quot; His Ferrari analogy brilliantly illustrates how CTI teams must find the right fit between capabilities and stakeholder requirements.<br/><br/>The episode also tackles AI&apos;s impact on intelligence work, with Freddy offering a sobering assessment of large language models&apos; limitations while acknowledging their potential benefits when properly understood as tools rather than solutions. Whether you&apos;re a seasoned CTI professional or just building your program, this conversation provides an essential framework for elevating your practice from information sharing to true intelligence production.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17620405-season-1-episode-18-pedro-kertzman-freddy-murre.mp3" length="48088622" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o2wvqkfms8gpodjri89te8uy72o3?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17620405</guid>
    <pubDate>Tue, 28 Oct 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620405/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620405/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620405/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620405/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17620405/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction and Freddie&#39;s Background" />
  <psc:chapter start="5:25" title="The Gap Between CTI Talk and Practice" />
  <psc:chapter start="14:15" title="Intelligence Methodology and Stakeholder Engagement" />
  <psc:chapter start="24:53" title="Strategic vs. Tactical Intelligence Roles" />
  <psc:chapter start="33:40" title="Standards and Quality in Intelligence Reports" />
  <psc:chapter start="43:27" title="The Intelligence Cycle Explained" />
  <psc:chapter start="53:03" title="AI&#39;s Impact on Cyber Threat Intelligence" />
  <psc:chapter start="1:02:03" title="Resources and Final Thoughts" />
</psc:chapters>
    <itunes:duration>4003</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 17 (Pedro Kertzman &amp; Dr. Jean Nestor Dahj)</itunes:title>
    <title>Season 1 - Episode 17 (Pedro Kertzman &amp; Dr. Jean Nestor Dahj)</title>
    <itunes:summary><![CDATA[Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience analyzing vast datasets naturally evolved into identifying patterns in threat actor behavior.  What sets this episode apart is Dr. Nestor's practical ...]]></itunes:summary>
    <description><![CDATA[<p>Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience analyzing vast datasets naturally evolved into identifying patterns in threat actor behavior.<br/><br/>What sets this episode apart is Dr. Nestor&apos;s practical approach to implementing CTI across organizations. Rather than isolating threat intelligence as a separate function, he advocates for integrating the &quot;CTI mentality&quot; throughout security teams. This revolutionary perspective transforms how security professionals approach their work—from SOC analysts contextualizing alerts with threat data to red teams emulating industry-specific threat actors during penetration tests.<br/><br/>You&apos;ll discover why threat intelligence goes far beyond collecting indicators of compromise. Dr. Nestor breaks down how properly implemented CTI enables proactive defense, prioritizes risks based on context, and provides the narrative needed to justify security investments to executive teams. His framework for evaluating threat intelligence sources ensures you&apos;re getting actionable information rather than noise.<br/><br/>Whether you&apos;re new to the field or looking to enhance your existing CTI program, this episode delivers concrete strategies you can implement immediately. From leveraging open-source feeds to integrating with security tools through STIX/TAXII, Dr. Nestor-Dodge provides a roadmap for organizations at any maturity level. And for those considering a career in threat intelligence, he outlines learning paths from the essential MITRE ATT&amp;CK framework to advanced certifications.<br/><br/>Join us for this insightful conversation that reframes threat intelligence as a continuous journey rather than a destination—and discover why the fusion of data science and security expertise creates the most effective defense against evolving threats.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience analyzing vast datasets naturally evolved into identifying patterns in threat actor behavior.<br/><br/>What sets this episode apart is Dr. Nestor&apos;s practical approach to implementing CTI across organizations. Rather than isolating threat intelligence as a separate function, he advocates for integrating the &quot;CTI mentality&quot; throughout security teams. This revolutionary perspective transforms how security professionals approach their work—from SOC analysts contextualizing alerts with threat data to red teams emulating industry-specific threat actors during penetration tests.<br/><br/>You&apos;ll discover why threat intelligence goes far beyond collecting indicators of compromise. Dr. Nestor breaks down how properly implemented CTI enables proactive defense, prioritizes risks based on context, and provides the narrative needed to justify security investments to executive teams. His framework for evaluating threat intelligence sources ensures you&apos;re getting actionable information rather than noise.<br/><br/>Whether you&apos;re new to the field or looking to enhance your existing CTI program, this episode delivers concrete strategies you can implement immediately. From leveraging open-source feeds to integrating with security tools through STIX/TAXII, Dr. Nestor-Dodge provides a roadmap for organizations at any maturity level. And for those considering a career in threat intelligence, he outlines learning paths from the essential MITRE ATT&amp;CK framework to advanced certifications.<br/><br/>Join us for this insightful conversation that reframes threat intelligence as a continuous journey rather than a destination—and discover why the fusion of data science and security expertise creates the most effective defense against evolving threats.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17620835-season-1-episode-17-pedro-kertzman-dr-jean-nestor-dahj.mp3" length="30451236" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u2yuan42ea4jdrn6wvpno0vvgtp3?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17620835</guid>
    <pubDate>Tue, 14 Oct 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620835/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620835/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620835/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17620835/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17620835/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Dr. Jeem Nestor-Dodge" />
  <psc:chapter start="3:51" title="Journey from Network Engineer to CTI" />
  <psc:chapter start="5:15" title="Mastering Cyber Intelligence Book Insights" />
  <psc:chapter start="8:57" title="Leveraging CTI to Improve Security Posture" />
  <psc:chapter start="14:54" title="CTI Implementation Best Practices" />
  <psc:chapter start="21:49" title="Evaluating Threat Intelligence Sources" />
  <psc:chapter start="32:14" title="Resources for Learning CTI" />
  <psc:chapter start="38:42" title="Closing Thoughts on CTI&#39;s Future" />
</psc:chapters>
    <itunes:duration>2533</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 16 (Pedro Kertzman &amp; Gert-Jan Bruggink)</itunes:title>
    <title>Season 1 - Episode 16 (Pedro Kertzman &amp; Gert-Jan Bruggink)</title>
    <itunes:summary><![CDATA[The cybersecurity industry has a people problem. While we chase after the latest tools and technologies, we're overlooking what Gert-Jan Bruggink calls "the human element" – the critical factor that connects technical solutions with actual security outcomes. In this thought-provoking conversation, Gert-Jan shares his journey from security engineering to pioneering scenario-based threat intelligence, revealing how his curiosity drove him to understand the "why" behind security implementations....]]></itunes:summary>
    <description><![CDATA[<p>The cybersecurity industry has a people problem. While we chase after the latest tools and technologies, we&apos;re overlooking what Gert-Jan Bruggink calls &quot;the human element&quot; – the critical factor that connects technical solutions with actual security outcomes. In this thought-provoking conversation, Gert-Jan shares his journey from security engineering to pioneering scenario-based threat intelligence, revealing how his curiosity drove him to understand the &quot;why&quot; behind security implementations.<br/><br/>Gert-Jan pulls no punches in addressing what he sees as an existential threat to the Cyber Threat Intelligence field. &quot;If the CTI industry does not resolve this situation before 2030, the current commoditized form will become obsolete,&quot; he warns, highlighting the dangerous disconnect between technical intelligence and strategic applications. His work developing the CTI Capability Maturity Model (CTI-CMM) represents a community-driven effort to bridge these gaps through continuous improvement and practitioner leadership.<br/><br/>The discussion takes a fascinating turn when Gert-Jan introduces systems thinking as the missing piece in modern cybersecurity approaches. Rather than viewing security in silos, he advocates for understanding the entire organizational ecosystem and the narratives that connect problems across different departments. This holistic perspective helps explain why even sophisticated security tools often fail to deliver their promised value – they&apos;re implemented without consideration for the broader context.<br/><br/>What sets this conversation apart is Gert-Jan&apos;s balanced view of technology and humanity. He doesn&apos;t reject technological solutions but argues for a hybrid approach that leverages both human intelligence and technological advancements. His insights on tracking subtle adversary trends over time demonstrate the irreplaceable value of human analysis and pattern recognition in threat intelligence.<br/><br/>Ready to transform how you think about cybersecurity? Listen now and discover why the future of CTI depends not just on better tools, but on fundamentally rethinking our approach to the human elements of security. Share your thoughts with us on LinkedIn and join the conversation about building a more resilient cybersecurity community.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>The cybersecurity industry has a people problem. While we chase after the latest tools and technologies, we&apos;re overlooking what Gert-Jan Bruggink calls &quot;the human element&quot; – the critical factor that connects technical solutions with actual security outcomes. In this thought-provoking conversation, Gert-Jan shares his journey from security engineering to pioneering scenario-based threat intelligence, revealing how his curiosity drove him to understand the &quot;why&quot; behind security implementations.<br/><br/>Gert-Jan pulls no punches in addressing what he sees as an existential threat to the Cyber Threat Intelligence field. &quot;If the CTI industry does not resolve this situation before 2030, the current commoditized form will become obsolete,&quot; he warns, highlighting the dangerous disconnect between technical intelligence and strategic applications. His work developing the CTI Capability Maturity Model (CTI-CMM) represents a community-driven effort to bridge these gaps through continuous improvement and practitioner leadership.<br/><br/>The discussion takes a fascinating turn when Gert-Jan introduces systems thinking as the missing piece in modern cybersecurity approaches. Rather than viewing security in silos, he advocates for understanding the entire organizational ecosystem and the narratives that connect problems across different departments. This holistic perspective helps explain why even sophisticated security tools often fail to deliver their promised value – they&apos;re implemented without consideration for the broader context.<br/><br/>What sets this conversation apart is Gert-Jan&apos;s balanced view of technology and humanity. He doesn&apos;t reject technological solutions but argues for a hybrid approach that leverages both human intelligence and technological advancements. His insights on tracking subtle adversary trends over time demonstrate the irreplaceable value of human analysis and pattern recognition in threat intelligence.<br/><br/>Ready to transform how you think about cybersecurity? Listen now and discover why the future of CTI depends not just on better tools, but on fundamentally rethinking our approach to the human elements of security. Share your thoughts with us on LinkedIn and join the conversation about building a more resilient cybersecurity community.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17539218-season-1-episode-16-pedro-kertzman-gert-jan-bruggink.mp3" length="34851172" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c980lkkj3sxannvoxyr9ijjl20ng?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17539218</guid>
    <pubDate>Tue, 30 Sep 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17539218/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17539218/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17539218/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17539218/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17539218/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Gertjan Brugink" />
  <psc:chapter start="6:11" title="Journey into Cyber Threat Intelligence" />
  <psc:chapter start="12:58" title="The CTI Maturity Model Development" />
  <psc:chapter start="22:50" title="Measuring Success in CTI" />
  <psc:chapter start="30:19" title="The Disconnect in CTI Industry" />
  <psc:chapter start="38:02" title="Systems Thinking and Threat Scenarios" />
  <psc:chapter start="43:58" title="Evolution of Threat Actors and Trends" />
</psc:chapters>
    <itunes:duration>2900</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 15 (Pedro Kertzman &amp; Adam Goss)</itunes:title>
    <title>Season 1 - Episode 15 (Pedro Kertzman &amp; Adam Goss)</title>
    <itunes:summary><![CDATA[What does it take to become a cybersecurity "unicorn"? According to Adam Goss, it's the rare combination of threat intelligence expertise with cross-domain skills that truly drives innovation in our industry.  Adam takes us on his unconventional journey from aspiring penetration tester to CTI specialist and educator, revealing the critical mindset shifts required when transitioning between security roles. Most fascinating is his comparison between SOC and CTI approaches to bias - while SOC an...]]></itunes:summary>
    <description><![CDATA[<p>What does it take to become a cybersecurity &quot;unicorn&quot;? According to Adam Goss, it&apos;s the rare combination of threat intelligence expertise with cross-domain skills that truly drives innovation in our industry.<br/><br/>Adam takes us on his unconventional journey from aspiring penetration tester to CTI specialist and educator, revealing the critical mindset shifts required when transitioning between security roles. Most fascinating is his comparison between SOC and CTI approaches to bias - while SOC analysts leverage bias for quick decision-making, CTI professionals must actively combat it, asking deeper questions before jumping to conclusions.<br/><br/>The conversation turns deeply personal when Adam shares how a seemingly successful threat detection of a Cobalt Strike beacon ultimately missed crucial indicators that led to a devastating ransomware outbreak. This painful lesson transformed his entire career trajectory, highlighting why technology alone fails without the right people and processes - ultimately inspiring him to found Craven Security to make CTI education more accessible.<br/><br/>For those looking to develop their own CTI expertise, Adam provides a treasure trove of resources - from hands-on platforms like TryHackMe to industry reports, conferences, and specialized books that bridge tactical and strategic intelligence needs. His recommended reading covers everything from intelligence-driven incident response to honeypot deployment and strategic analysis frameworks.<br/><br/>Perhaps most refreshing is Adam&apos;s closing perspective on maintaining balance in security careers. Despite the high-stakes nature of our work, he reminds us to focus on the aspects we genuinely enjoy, treat work as just work, and prioritize health and family over professional pressures - wisdom that might be the most valuable intelligence shared in the entire conversation.<br/><br/>Connect with us on LinkedIn at Cyber Threat Intelligence Podcast to join the conversation and recommend future guests with unique CTI perspectives to share.</p><p><br/></p><p>Resources:</p><p><a href='https://kravensecurity.com/'>https://kravensecurity.com/</a></p><p><a href='https://www.oreilly.com/library/view/intelligence-driven-incident-response/9781098120672/'>https://www.oreilly.com/library/view/intelligence-driven-incident-response/9781098120672/</a></p><p><a href='https://chrissanders.org/2020/09/idh-release/'>https://chrissanders.org/2020/09/idh-release/</a></p><p><a href='https://collegepublishing.sagepub.com/products/critical-thinking-for-strategic-intelligence-3-265236'>https://collegepublishing.sagepub.com/products/critical-thinking-for-strategic-intelligence-3-265236</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What does it take to become a cybersecurity &quot;unicorn&quot;? According to Adam Goss, it&apos;s the rare combination of threat intelligence expertise with cross-domain skills that truly drives innovation in our industry.<br/><br/>Adam takes us on his unconventional journey from aspiring penetration tester to CTI specialist and educator, revealing the critical mindset shifts required when transitioning between security roles. Most fascinating is his comparison between SOC and CTI approaches to bias - while SOC analysts leverage bias for quick decision-making, CTI professionals must actively combat it, asking deeper questions before jumping to conclusions.<br/><br/>The conversation turns deeply personal when Adam shares how a seemingly successful threat detection of a Cobalt Strike beacon ultimately missed crucial indicators that led to a devastating ransomware outbreak. This painful lesson transformed his entire career trajectory, highlighting why technology alone fails without the right people and processes - ultimately inspiring him to found Craven Security to make CTI education more accessible.<br/><br/>For those looking to develop their own CTI expertise, Adam provides a treasure trove of resources - from hands-on platforms like TryHackMe to industry reports, conferences, and specialized books that bridge tactical and strategic intelligence needs. His recommended reading covers everything from intelligence-driven incident response to honeypot deployment and strategic analysis frameworks.<br/><br/>Perhaps most refreshing is Adam&apos;s closing perspective on maintaining balance in security careers. Despite the high-stakes nature of our work, he reminds us to focus on the aspects we genuinely enjoy, treat work as just work, and prioritize health and family over professional pressures - wisdom that might be the most valuable intelligence shared in the entire conversation.<br/><br/>Connect with us on LinkedIn at Cyber Threat Intelligence Podcast to join the conversation and recommend future guests with unique CTI perspectives to share.</p><p><br/></p><p>Resources:</p><p><a href='https://kravensecurity.com/'>https://kravensecurity.com/</a></p><p><a href='https://www.oreilly.com/library/view/intelligence-driven-incident-response/9781098120672/'>https://www.oreilly.com/library/view/intelligence-driven-incident-response/9781098120672/</a></p><p><a href='https://chrissanders.org/2020/09/idh-release/'>https://chrissanders.org/2020/09/idh-release/</a></p><p><a href='https://collegepublishing.sagepub.com/products/critical-thinking-for-strategic-intelligence-3-265236'>https://collegepublishing.sagepub.com/products/critical-thinking-for-strategic-intelligence-3-265236</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17449293-season-1-episode-15-pedro-kertzman-adam-goss.mp3" length="19874668" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hyxnuhlo3wkb5kqjk57i7z8lyk26?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17449293</guid>
    <pubDate>Tue, 16 Sep 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17449293/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17449293/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17449293/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17449293/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17449293/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction and Guest Background" />
  <psc:chapter start="7:35" title="Journey from SOC to CTI Specialist" />
  <psc:chapter start="11:48" title="Current CTI Work and Upskilling" />
  <psc:chapter start="16:24" title="Technical CTI and Threat Hunting" />
  <psc:chapter start="19:22" title="Learning Resources and Industry Trends" />
  <psc:chapter start="24:38" title="Advice for CTI Professionals" />
</psc:chapters>
    <itunes:duration>1652</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 14 (Pedro Kertzman &amp; Sam Flockhart)</itunes:title>
    <title>Season 1 - Episode 14 (Pedro Kertzman &amp; Sam Flockhart)</title>
    <itunes:summary><![CDATA[How does a military intelligence background translate to cyber threat intelligence? Sam Flockhart, a former UK military intelligence operator who now heads threat management at a global bank, reveals the fascinating journey and powerful parallels between these worlds.  Sam opens up about his transition from conventional military intelligence to the cyber realm despite having "absolutely no cyber knowledge" initially. He shares a critical insight for job seekers: while certifications matter, d...]]></itunes:summary>
    <description><![CDATA[<p>How does a military intelligence background translate to cyber threat intelligence? Sam Flockhart, a former UK military intelligence operator who now heads threat management at a global bank, reveals the fascinating journey and powerful parallels between these worlds.<br/><br/>Sam opens up about his transition from conventional military intelligence to the cyber realm despite having &quot;absolutely no cyber knowledge&quot; initially. He shares a critical insight for job seekers: while certifications matter, demonstrating real knowledge and preparation during interviews often matters more. Sam explains how anticipating common interview questions about threat actors, their methodologies, and recent attacks can set candidates apart.<br/><br/>Drawing from his military expertise on Russia and Ukraine, Sam offers a riveting deep dive into why ransomware predominantly emerges from Russian-speaking regions. He explains the cultural concept of &quot;Kresha&quot; (roof/protection) that allows these groups to operate with impunity and traces how post-Soviet history created the perfect ecosystem for cybercrime to flourish. This cultural understanding adds a crucial dimension to technical threat analysis that many professionals overlook.<br/><br/>The conversation explores how military intelligence frameworks have shaped modern CTI practices. From tactics, techniques, and procedures (TTPs) to intelligence collection plans and priority intelligence requirements - these structured approaches have been adopted by the cyber community. Sam also discusses the nuances of intelligence sharing in private sector environments compared to military settings, where different constraints and opportunities exist.<br/><br/>For aspiring CTI professionals, Sam&apos;s advice is practical and actionable: prepare thoroughly by researching top threats, understand organizational stakeholders who consume intelligence, and familiarize yourself with various intelligence sources. This episode offers invaluable guidance for anyone looking to enter the field or enhance their threat intelligence capabilities through a deeper understanding of the human element behind cyber attacks.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>How does a military intelligence background translate to cyber threat intelligence? Sam Flockhart, a former UK military intelligence operator who now heads threat management at a global bank, reveals the fascinating journey and powerful parallels between these worlds.<br/><br/>Sam opens up about his transition from conventional military intelligence to the cyber realm despite having &quot;absolutely no cyber knowledge&quot; initially. He shares a critical insight for job seekers: while certifications matter, demonstrating real knowledge and preparation during interviews often matters more. Sam explains how anticipating common interview questions about threat actors, their methodologies, and recent attacks can set candidates apart.<br/><br/>Drawing from his military expertise on Russia and Ukraine, Sam offers a riveting deep dive into why ransomware predominantly emerges from Russian-speaking regions. He explains the cultural concept of &quot;Kresha&quot; (roof/protection) that allows these groups to operate with impunity and traces how post-Soviet history created the perfect ecosystem for cybercrime to flourish. This cultural understanding adds a crucial dimension to technical threat analysis that many professionals overlook.<br/><br/>The conversation explores how military intelligence frameworks have shaped modern CTI practices. From tactics, techniques, and procedures (TTPs) to intelligence collection plans and priority intelligence requirements - these structured approaches have been adopted by the cyber community. Sam also discusses the nuances of intelligence sharing in private sector environments compared to military settings, where different constraints and opportunities exist.<br/><br/>For aspiring CTI professionals, Sam&apos;s advice is practical and actionable: prepare thoroughly by researching top threats, understand organizational stakeholders who consume intelligence, and familiarize yourself with various intelligence sources. This episode offers invaluable guidance for anyone looking to enter the field or enhance their threat intelligence capabilities through a deeper understanding of the human element behind cyber attacks.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17396803-season-1-episode-14-pedro-kertzman-sam-flockhart.mp3" length="20415957" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/an647d9gm8ew4jrow9asy1b6139p?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17396803</guid>
    <pubDate>Tue, 02 Sep 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17396803/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17396803/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17396803/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17396803/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17396803/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Sam Flockhart" />
  <psc:chapter start="7:55" title="Military to CTI Career Transition" />
  <psc:chapter start="15:40" title="Russian Cyber Ecosystem Insights" />
  <psc:chapter start="21:57" title="Military Frameworks in CTI" />
  <psc:chapter start="23:08" title="Intelligence Sharing Challenges" />
  <psc:chapter start="27:10" title="Tips for Aspiring CTI Professionals" />
</psc:chapters>
    <itunes:duration>1697</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 13 (Pedro Kertzman &amp; Bianca Miclea)</itunes:title>
    <title>Season 1 - Episode 13 (Pedro Kertzman &amp; Bianca Miclea)</title>
    <itunes:summary><![CDATA[What does it take to build an effective Cyber Threat Intelligence function from scratch? In this eye-opening conversation, Bianca Miclea shatters the myth that cybersecurity is only for those with traditional technical backgrounds.  Bianca shares her remarkable journey from politics student to cybersecurity leader, revealing how her academic background became an unexpected asset in the CTI world. "It was one of those 'this is really cool, but I could never do this' thoughts," she explains, de...]]></itunes:summary>
    <description><![CDATA[<p>What does it take to build an effective Cyber Threat Intelligence function from scratch? In this eye-opening conversation, Bianca Miclea shatters the myth that cybersecurity is only for those with traditional technical backgrounds.<br/><br/>Bianca shares her remarkable journey from politics student to cybersecurity leader, revealing how her academic background became an unexpected asset in the CTI world. &quot;It was one of those &apos;this is really cool, but I could never do this&apos; thoughts,&quot; she explains, describing her initial hesitation before diving into the field. This refreshing perspective demonstrates how diverse educational paths can strengthen cybersecurity teams—an important message for anyone contemplating a career transition.<br/><br/>The conversation explores what makes CTI truly valuable: actionable intelligence that connects directly to security operations. Bianca walks us through her experience establishing a CTI team at a major financial institution, emphasizing the critical difference between information collection and intelligence that drives meaningful security improvements. Her implementation of monthly Mitre ATT&amp;CK exercises brings together cross-functional teams to identify control gaps and assign clear accountability—a practice listeners can immediately adopt to enhance their security posture.<br/><br/>Perhaps most valuable is Bianca&apos;s practical advice for managing the overwhelming information flow in threat intelligence. Her concept of &quot;reporting thresholds&quot; offers a framework for prioritization that helps CTI teams focus on what truly matters while preventing analyst burnout. Combined with her insights on board communication, community engagement, and measuring CTI effectiveness, this episode delivers a masterclass in modern threat intelligence leadership.<br/><br/>Ready to transform how you think about threat intelligence? Subscribe now, share with your network, and join our LinkedIn community to continue the conversation about building CTI programs that deliver genuine security value.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What does it take to build an effective Cyber Threat Intelligence function from scratch? In this eye-opening conversation, Bianca Miclea shatters the myth that cybersecurity is only for those with traditional technical backgrounds.<br/><br/>Bianca shares her remarkable journey from politics student to cybersecurity leader, revealing how her academic background became an unexpected asset in the CTI world. &quot;It was one of those &apos;this is really cool, but I could never do this&apos; thoughts,&quot; she explains, describing her initial hesitation before diving into the field. This refreshing perspective demonstrates how diverse educational paths can strengthen cybersecurity teams—an important message for anyone contemplating a career transition.<br/><br/>The conversation explores what makes CTI truly valuable: actionable intelligence that connects directly to security operations. Bianca walks us through her experience establishing a CTI team at a major financial institution, emphasizing the critical difference between information collection and intelligence that drives meaningful security improvements. Her implementation of monthly Mitre ATT&amp;CK exercises brings together cross-functional teams to identify control gaps and assign clear accountability—a practice listeners can immediately adopt to enhance their security posture.<br/><br/>Perhaps most valuable is Bianca&apos;s practical advice for managing the overwhelming information flow in threat intelligence. Her concept of &quot;reporting thresholds&quot; offers a framework for prioritization that helps CTI teams focus on what truly matters while preventing analyst burnout. Combined with her insights on board communication, community engagement, and measuring CTI effectiveness, this episode delivers a masterclass in modern threat intelligence leadership.<br/><br/>Ready to transform how you think about threat intelligence? Subscribe now, share with your network, and join our LinkedIn community to continue the conversation about building CTI programs that deliver genuine security value.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17362073-season-1-episode-13-pedro-kertzman-bianca-miclea.mp3" length="29869269" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yxvqwbp3c8cmtfbzvfruc4fgfqxo?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17362073</guid>
    <pubDate>Tue, 19 Aug 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17362073/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17362073/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17362073/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17362073/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17362073/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Bianca&#39;s Non-Traditional Journey into CTI" />
  <psc:chapter start="5:31" title="Politics Background&#39;s Impact on Strategic CTI" />
  <psc:chapter start="8:33" title="Building a CTI Team from Scratch" />
  <psc:chapter start="14:40" title="CTI Integration with SOC" />
  <psc:chapter start="22:07" title="Mitre ATT&amp;CK Framework Implementation" />
  <psc:chapter start="26:27" title="Community Resources and CTI Skills" />
  <psc:chapter start="34:51" title="Key Advice: Establish Reporting Thresholds" />
</psc:chapters>
    <itunes:duration>2485</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 12 (Pedro Kertzman &amp; Jason Chan)</itunes:title>
    <title>Season 1 - Episode 12 (Pedro Kertzman &amp; Jason Chan)</title>
    <itunes:summary><![CDATA[What does cybersecurity look like when you're protecting the world's largest streaming service and content studio? Jason Chan, who built and led Netflix's security team for over a decade, takes us behind the scenes of securing one of the most transformative companies in modern history.  From Netflix's humble beginnings as a DVD-by-mail service to its evolution into a global streaming behemoth operating in 200+ countries with hundreds of millions of subscribers, Jason shares the security journ...]]></itunes:summary>
    <description><![CDATA[<p>What does cybersecurity look like when you&apos;re protecting the world&apos;s largest streaming service and content studio? Jason Chan, who built and led Netflix&apos;s security team for over a decade, takes us behind the scenes of securing one of the most transformative companies in modern history.<br/><br/>From Netflix&apos;s humble beginnings as a DVD-by-mail service to its evolution into a global streaming behemoth operating in 200+ countries with hundreds of millions of subscribers, Jason shares the security journey that paralleled this remarkable business transformation. At the heart of Netflix&apos;s approach was strategic storytelling—creating a clear picture for both technical and non-technical stakeholders about not just what needed protection, but who the company needed protection from.<br/><br/>The threats Netflix faced were as unique as its business model. Account takeover schemes where compromised credentials were resold on international black markets. Content protection challenges to prevent pre-release leaks of shows and even physical-digital security concerns around protecting high-profile people like the Obamas. Through it all, Jason&apos;s team developed a pragmatic approach focused on preventing the most catastrophic outcomes: service unavailability and data breaches.<br/><br/>Perhaps most remarkable was Netflix&apos;s commitment to open-source security. At a time when most companies guarded their security practices closely, Netflix released groundbreaking tools that shaped today&apos;s security landscape—including Security Monkey (the first cloud security posture management tool) and Fido (an early security orchestration platform). As Jason explains: &quot;We&apos;re not going to compete on security, we&apos;re going to compete on entertaining the world.&quot;<br/><br/>Whether you&apos;re building a security program from scratch or leading a mature team, Jason&apos;s insights on prioritization, vendor partnerships, and community collaboration offer a masterclass in effective security leadership. Subscribe now to hear the full conversation about securing one of the world&apos;s most innovative companies during its remarkable transformation.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What does cybersecurity look like when you&apos;re protecting the world&apos;s largest streaming service and content studio? Jason Chan, who built and led Netflix&apos;s security team for over a decade, takes us behind the scenes of securing one of the most transformative companies in modern history.<br/><br/>From Netflix&apos;s humble beginnings as a DVD-by-mail service to its evolution into a global streaming behemoth operating in 200+ countries with hundreds of millions of subscribers, Jason shares the security journey that paralleled this remarkable business transformation. At the heart of Netflix&apos;s approach was strategic storytelling—creating a clear picture for both technical and non-technical stakeholders about not just what needed protection, but who the company needed protection from.<br/><br/>The threats Netflix faced were as unique as its business model. Account takeover schemes where compromised credentials were resold on international black markets. Content protection challenges to prevent pre-release leaks of shows and even physical-digital security concerns around protecting high-profile people like the Obamas. Through it all, Jason&apos;s team developed a pragmatic approach focused on preventing the most catastrophic outcomes: service unavailability and data breaches.<br/><br/>Perhaps most remarkable was Netflix&apos;s commitment to open-source security. At a time when most companies guarded their security practices closely, Netflix released groundbreaking tools that shaped today&apos;s security landscape—including Security Monkey (the first cloud security posture management tool) and Fido (an early security orchestration platform). As Jason explains: &quot;We&apos;re not going to compete on security, we&apos;re going to compete on entertaining the world.&quot;<br/><br/>Whether you&apos;re building a security program from scratch or leading a mature team, Jason&apos;s insights on prioritization, vendor partnerships, and community collaboration offer a masterclass in effective security leadership. Subscribe now to hear the full conversation about securing one of the world&apos;s most innovative companies during its remarkable transformation.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17244945-season-1-episode-12-pedro-kertzman-jason-chan.mp3" length="26141259" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/52qw7eazqne7o1x1h6ar91d597rx?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17244945</guid>
    <pubDate>Tue, 05 Aug 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17244945/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17244945/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17244945/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17244945/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17244945/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Jason Chan&#39;s Journey" />
  <psc:chapter start="8:46" title="CISO&#39;s Perspective on Threat Intelligence" />
  <psc:chapter start="24:50" title="Content Protection and Netflix&#39;s Unique Threats" />
</psc:chapters>
    <itunes:duration>2174</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 11 (Pedro Kertzman &amp; Ondra Rojčík)</itunes:title>
    <title>Season 1 - Episode 11 (Pedro Kertzman &amp; Ondra Rojčík)</title>
    <itunes:summary><![CDATA[From nuclear weapons research to reshaping Europe's stance on Chinese technology in critical infrastructure, Andra Rojčík's journey into cyber threat intelligence defies conventional career paths. As a principal CTI analyst who teaches intelligence analysis tradecraft, Andra brings unique perspectives from his experience at NATO, the Czech Intelligence Agency, and now Red Hat.  During his time leading the Strategic Cyber Threat Intelligence function at the Czech National Cybersecurity Agency,...]]></itunes:summary>
    <description><![CDATA[<p>From nuclear weapons research to reshaping Europe&apos;s stance on Chinese technology in critical infrastructure, Andra Rojčík&apos;s journey into cyber threat intelligence defies conventional career paths. As a principal CTI analyst who teaches intelligence analysis tradecraft, Andra brings unique perspectives from his experience at NATO, the Czech Intelligence Agency, and now Red Hat.<br/><br/>During his time leading the Strategic Cyber Threat Intelligence function at the Czech National Cybersecurity Agency, Andra&apos;s team produced analysis on Huawei that transformed the European narrative around technology sovereignty. &quot;Technology is actually a pretty political issue,&quot; Andra explains, challenging the previously accepted notion that technology remains neutral regardless of origin.<br/><br/>The conversation explores fascinating contrasts between government and private sector intelligence work. While government analysts often face unpredictable demands from high-level officials who understand intelligence terminology, private sector CTI requires translating insights into actionable steps for stakeholders who may rarely encounter intelligence products. This demands CTI professionals go beyond assessments to help operationalize findings into concrete security controls.<br/><br/>Andra breaks down the discipline into three essential components that every analyst must develop: Cyber (information security concepts), Threat (adversary operations), and Intelligence (analytical principles). Many technically-skilled professionals overlook the intelligence tradecraft element, which Andra addresses through workshops helping analysts avoid &quot;admiring problems&quot; and instead deliver actionable intelligence. For those looking to develop their skills, he recommends resources like &quot;Thinking Fast and Slow&quot; by Daniel Kahneman and &quot;Critical Thinking for Strategic Intelligence&quot; by Katherine Hibbs Pherson and Randolph H. Pherson.<br/><br/>Whether you&apos;re contemplating a career pivot into cyber threat intelligence or seeking to strengthen your analytical capabilities, this episode offers valuable insights from someone who has successfully navigated both government and corporate intelligence landscapes. Connect with us on LinkedIn to share your thoughts or suggest future guests for the Cyber Threat Intelligence Podcast.</p><p><br/></p><p>References:</p><p><a href='https://www.linkedin.com/in/orojcik/'>https://www.linkedin.com/in/orojcik/</a><br/><a href='https://medium.com/@orojcik'>https://medium.com/@orojcik</a><br/><br/>Books:<br/>Daniel Kahneman: Thinking Fast and Slow<br/>Katherine and Randolph Pherson: Critical Thinking for Strategic Intelligence<br/>Cole Nussebaumer Knaflic: Storytelling With Data <br/><br/>CTI Intro books:<br/>Thomas Roccia: Visual Threat Intelligence <br/>Rebekah Brown and Scott Roberts: Intelligence-Driven Incident Response</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>From nuclear weapons research to reshaping Europe&apos;s stance on Chinese technology in critical infrastructure, Andra Rojčík&apos;s journey into cyber threat intelligence defies conventional career paths. As a principal CTI analyst who teaches intelligence analysis tradecraft, Andra brings unique perspectives from his experience at NATO, the Czech Intelligence Agency, and now Red Hat.<br/><br/>During his time leading the Strategic Cyber Threat Intelligence function at the Czech National Cybersecurity Agency, Andra&apos;s team produced analysis on Huawei that transformed the European narrative around technology sovereignty. &quot;Technology is actually a pretty political issue,&quot; Andra explains, challenging the previously accepted notion that technology remains neutral regardless of origin.<br/><br/>The conversation explores fascinating contrasts between government and private sector intelligence work. While government analysts often face unpredictable demands from high-level officials who understand intelligence terminology, private sector CTI requires translating insights into actionable steps for stakeholders who may rarely encounter intelligence products. This demands CTI professionals go beyond assessments to help operationalize findings into concrete security controls.<br/><br/>Andra breaks down the discipline into three essential components that every analyst must develop: Cyber (information security concepts), Threat (adversary operations), and Intelligence (analytical principles). Many technically-skilled professionals overlook the intelligence tradecraft element, which Andra addresses through workshops helping analysts avoid &quot;admiring problems&quot; and instead deliver actionable intelligence. For those looking to develop their skills, he recommends resources like &quot;Thinking Fast and Slow&quot; by Daniel Kahneman and &quot;Critical Thinking for Strategic Intelligence&quot; by Katherine Hibbs Pherson and Randolph H. Pherson.<br/><br/>Whether you&apos;re contemplating a career pivot into cyber threat intelligence or seeking to strengthen your analytical capabilities, this episode offers valuable insights from someone who has successfully navigated both government and corporate intelligence landscapes. Connect with us on LinkedIn to share your thoughts or suggest future guests for the Cyber Threat Intelligence Podcast.</p><p><br/></p><p>References:</p><p><a href='https://www.linkedin.com/in/orojcik/'>https://www.linkedin.com/in/orojcik/</a><br/><a href='https://medium.com/@orojcik'>https://medium.com/@orojcik</a><br/><br/>Books:<br/>Daniel Kahneman: Thinking Fast and Slow<br/>Katherine and Randolph Pherson: Critical Thinking for Strategic Intelligence<br/>Cole Nussebaumer Knaflic: Storytelling With Data <br/><br/>CTI Intro books:<br/>Thomas Roccia: Visual Threat Intelligence <br/>Rebekah Brown and Scott Roberts: Intelligence-Driven Incident Response</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17248328-season-1-episode-11-pedro-kertzman-ondra-rojcik.mp3" length="25856335" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dhmzyolom9u8wwvdd1bygeqkdlxl?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17248328</guid>
    <pubDate>Tue, 22 Jul 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17248328/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17248328/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17248328/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17248328/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17248328/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Andra Rojcik" />
  <psc:chapter start="9:45" title="Journey From Academia to Intelligence" />
  <psc:chapter start="14:48" title="Pivoting into Cyber Threat Intelligence" />
  <psc:chapter start="18:21" title="Public vs Private Sector Differences" />
  <psc:chapter start="22:56" title="Intelligence Analysis Tradecraft Workshops" />
  <psc:chapter start="28:37" title="Resources for Learning CTI Skills" />
  <psc:chapter start="32:52" title="Final Advice and Episode Closing" />
</psc:chapters>
    <itunes:duration>2150</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 10 (Pedro Kertzman &amp; Kees Pouw) </itunes:title>
    <title>Season 1 - Episode 10 (Pedro Kertzman &amp; Kees Pouw) </title>
    <itunes:summary><![CDATA[Ever wonder how top security teams stay one step ahead of cybercriminals? The answer lies in the ancient wisdom of Sun Tzu: "If you know yourself and know your enemy, you'll win all battles." This principle forms the foundation of effective Cyber Threat Intelligence (CTI).   To celebrate our 10th episode, we had an insightful conversation with Kees Pouw, a veteran CISO with over two decades of cybersecurity experience, where we explore how organizations can build powerful CTI capabilitie...]]></itunes:summary>
    <description><![CDATA[<p>Ever wonder how top security teams stay one step ahead of cybercriminals? The answer lies in the ancient wisdom of Sun Tzu: &quot;If you know yourself and know your enemy, you&apos;ll win all battles.&quot; This principle forms the foundation of effective Cyber Threat Intelligence (CTI).<br/> <br/>To celebrate our 10th episode, we had an insightful conversation with Kees Pouw, a veteran CISO with over two decades of cybersecurity experience, where we explore how organizations can build powerful CTI capabilities that transform their security posture. Drawing from his experience as both a consultant and in-house security leader, Kees breaks down the mystique surrounding threat intelligence and delivers practical insights on implementation.<br/> <br/> &quot;The best battles are won before they&apos;re fought,&quot; Kees explains, highlighting how proper intelligence allows organizations to deter attackers through strategic preparation. By understanding specific attacker techniques—like Lockbit&apos;s targeting of VMware ESXi hosts—security teams can focus limited resources on the most critical defenses.<br/> <br/> We dive deep into the four core domains of comprehensive CTI: threat intelligence feeds, dark web monitoring, digital risk protection, and attack surface management. For organizations just starting their CTI journey, Kees offers a pragmatic roadmap, suggesting which capabilities to prioritize and how to grow organically from existing security operations.<br/> <br/> The conversation takes a fascinating turn when we explore how agentic AI is revolutionizing threat intelligence. Kees shares his &quot;wow moment&quot; realizing how AI agents can automate complex research tasks that previously required specialized human expertise—potentially transforming how organizations process the massive volumes of intelligence data.<br/> <br/> Whether you&apos;re looking to build your first CTI program or enhance existing capabilities, this episode provides a masterclass in making threat intelligence both practical and powerful. Subscribe now to continue learning from cybersecurity leaders who are shaping the future of digital defense.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Ever wonder how top security teams stay one step ahead of cybercriminals? The answer lies in the ancient wisdom of Sun Tzu: &quot;If you know yourself and know your enemy, you&apos;ll win all battles.&quot; This principle forms the foundation of effective Cyber Threat Intelligence (CTI).<br/> <br/>To celebrate our 10th episode, we had an insightful conversation with Kees Pouw, a veteran CISO with over two decades of cybersecurity experience, where we explore how organizations can build powerful CTI capabilities that transform their security posture. Drawing from his experience as both a consultant and in-house security leader, Kees breaks down the mystique surrounding threat intelligence and delivers practical insights on implementation.<br/> <br/> &quot;The best battles are won before they&apos;re fought,&quot; Kees explains, highlighting how proper intelligence allows organizations to deter attackers through strategic preparation. By understanding specific attacker techniques—like Lockbit&apos;s targeting of VMware ESXi hosts—security teams can focus limited resources on the most critical defenses.<br/> <br/> We dive deep into the four core domains of comprehensive CTI: threat intelligence feeds, dark web monitoring, digital risk protection, and attack surface management. For organizations just starting their CTI journey, Kees offers a pragmatic roadmap, suggesting which capabilities to prioritize and how to grow organically from existing security operations.<br/> <br/> The conversation takes a fascinating turn when we explore how agentic AI is revolutionizing threat intelligence. Kees shares his &quot;wow moment&quot; realizing how AI agents can automate complex research tasks that previously required specialized human expertise—potentially transforming how organizations process the massive volumes of intelligence data.<br/> <br/> Whether you&apos;re looking to build your first CTI program or enhance existing capabilities, this episode provides a masterclass in making threat intelligence both practical and powerful. Subscribe now to continue learning from cybersecurity leaders who are shaping the future of digital defense.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17352840-season-1-episode-10-pedro-kertzman-kees-pouw.mp3" length="34185899" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4r6o3nrgt2ywtkhz05pci691a8vu?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17352840</guid>
    <pubDate>Tue, 08 Jul 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17352840/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17352840/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17352840/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17352840/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17352840/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to CTI with Keis Pal" />
  <psc:chapter start="2:27" title="Why Build a CTI Program" />
  <psc:chapter start="8:42" title="Core Domains of Cyber Threat Intelligence" />
  <psc:chapter start="18:11" title="Challenges and Pitfalls of CTI" />
  <psc:chapter start="21:11" title="Starting Your CTI Program" />
  <psc:chapter start="25:30" title="Agentic AI&#39;s Impact on CTI" />
  <psc:chapter start="36:57" title="Valuable CTI Tools and Resources" />
  <psc:chapter start="42:30" title="Final Thoughts and Key Takeaways" />
</psc:chapters>
    <itunes:duration>2844</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 9 (Pedro Kertzman &amp; Scott Scher)</itunes:title>
    <title>Season 1 - Episode 9 (Pedro Kertzman &amp; Scott Scher)</title>
    <itunes:summary><![CDATA[What happens when traditional intelligence methodology meets modern cybersecurity? Scott Scher, CTI Associate Director with expertise in nation-state threat actors and cybercriminal groups, reveals a powerful perspective: successful CTI professionals are intelligence analysts first and cybersecurity specialists second.  Drawing from his background in international security policy and experience across government and private sectors, Scott breaks down the critical distinction between collectin...]]></itunes:summary>
    <description><![CDATA[<p>What happens when traditional intelligence methodology meets modern cybersecurity? Scott Scher, CTI Associate Director with expertise in nation-state threat actors and cybercriminal groups, reveals a powerful perspective: successful CTI professionals are intelligence analysts first and cybersecurity specialists second.<br/><br/>Drawing from his background in international security policy and experience across government and private sectors, Scott breaks down the critical distinction between collecting data and generating actionable intelligence. He unpacks how established intelligence frameworks provide the foundation for effective cyber threat analysis, while the technical cybersecurity knowledge can be built on top of this analytical foundation.<br/><br/>Scott shares practical wisdom on building effective CTI programs, beginning with establishing clear processes, creating functional data pipelines, and most critically, understanding stakeholder needs. He explains that many organizations fall into the trap of overcollection – gathering excessive threat feeds without the capacity to transform them into actionable insights. Instead, he advocates for regular evaluation of intelligence sources using frameworks like the Admiralty Code to assess reliability and value.<br/><br/>The conversation delves into the crucial difference between threat (composed of intent, capability, and opportunity) and risk (which incorporates business impact). This distinction becomes essential when communicating with executives who need to understand potential consequences in business terms. Scott provides concrete examples of how to tailor intelligence for different stakeholders – from tactical information for SOC analysts to strategic insights for CISOs making resource allocation decisions.<br/><br/>Whether you&apos;re building a CTI function from scratch, looking to improve stakeholder engagement, or seeking to make your intelligence more actionable, this episode offers a masterclass in intelligence-driven cybersecurity. Subscribe now to learn how to transform technical threats into business insights that drive meaningful security improvements across your organization.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What happens when traditional intelligence methodology meets modern cybersecurity? Scott Scher, CTI Associate Director with expertise in nation-state threat actors and cybercriminal groups, reveals a powerful perspective: successful CTI professionals are intelligence analysts first and cybersecurity specialists second.<br/><br/>Drawing from his background in international security policy and experience across government and private sectors, Scott breaks down the critical distinction between collecting data and generating actionable intelligence. He unpacks how established intelligence frameworks provide the foundation for effective cyber threat analysis, while the technical cybersecurity knowledge can be built on top of this analytical foundation.<br/><br/>Scott shares practical wisdom on building effective CTI programs, beginning with establishing clear processes, creating functional data pipelines, and most critically, understanding stakeholder needs. He explains that many organizations fall into the trap of overcollection – gathering excessive threat feeds without the capacity to transform them into actionable insights. Instead, he advocates for regular evaluation of intelligence sources using frameworks like the Admiralty Code to assess reliability and value.<br/><br/>The conversation delves into the crucial difference between threat (composed of intent, capability, and opportunity) and risk (which incorporates business impact). This distinction becomes essential when communicating with executives who need to understand potential consequences in business terms. Scott provides concrete examples of how to tailor intelligence for different stakeholders – from tactical information for SOC analysts to strategic insights for CISOs making resource allocation decisions.<br/><br/>Whether you&apos;re building a CTI function from scratch, looking to improve stakeholder engagement, or seeking to make your intelligence more actionable, this episode offers a masterclass in intelligence-driven cybersecurity. Subscribe now to learn how to transform technical threats into business insights that drive meaningful security improvements across your organization.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17206088-season-1-episode-9-pedro-kertzman-scott-scher.mp3" length="40498003" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0yv0ghaxde3vecvcdgt4l3xbkkvv?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17206088</guid>
    <pubDate>Tue, 24 Jun 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17206088/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17206088/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17206088/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17206088/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17206088/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Season 1 - Episode 9 (Pedro Kertzman &amp; Scott Scher)" />
  <psc:chapter start="0:16" title="Journey into Cyber Threat Intelligence" />
  <psc:chapter start="3:46" title="Intelligence-First Approach" />
  <psc:chapter start="6:08" title="Building a CTI Program" />
  <psc:chapter start="10:30" title="Evaluating Intelligence Source Value" />
  <psc:chapter start="17:15" title="Selling CTI to Stakeholders" />
  <psc:chapter start="24:08" title="Understanding Threat vs Risk" />
  <psc:chapter start="33:30" title="Crafting Intelligence for Decision-Makers" />
  <psc:chapter start="38:50" title="Resources for Learning CTI" />
</psc:chapters>
    <itunes:duration>3370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 8 (Pedro Kertzman &amp; Ritu Gill)</itunes:title>
    <title>Season 1 - Episode 8 (Pedro Kertzman &amp; Ritu Gill)</title>
    <itunes:summary><![CDATA[The digital world is full of breadcrumbs that tell our stories - are you carefully tracking who follows them back to you? In this eye-opening conversation with OSINT expert Ritu Gill, we pull back the curtain on the fascinating world of Open Source Intelligence and why proper tool vetting matters more than you might think.  Drawing from her 18 years in Canadian law enforcement and extensive consulting experience, Ritu reveals why careless tool selection could mean someone is "capturing every ...]]></itunes:summary>
    <description><![CDATA[<p>The digital world is full of breadcrumbs that tell our stories - are you carefully tracking who follows them back to you? In this eye-opening conversation with OSINT expert Ritu Gill, we pull back the curtain on the fascinating world of Open Source Intelligence and why proper tool vetting matters more than you might think.<br/><br/>Drawing from her 18 years in Canadian law enforcement and extensive consulting experience, Ritu reveals why careless tool selection could mean someone is &quot;capturing every keystroke&quot; as you conduct investigations. Her practical advice for both beginners and experienced practitioners cuts through the noise in an increasingly crowded OSINT landscape.<br/><br/>&quot;Without analyzing and adding value to the information, it is not intelligence,&quot; Ritu explains, highlighting the crucial distinction between collecting data and producing actionable intelligence. Her emphasis on ethical considerations - the principle of &quot;OSINT for good&quot; - serves as a timely reminder that with great investigative power comes great responsibility.<br/><br/>Whether you&apos;re looking to build your skills through free resources like Sophia Santos&apos; exercises, gamified platforms like GeoGuessr, or real-world missing persons cases with TraceLabs, this episode provides concrete pathways for growth. Networking emerges as a powerful career accelerator, with events like OsmosisCon offering invaluable opportunities to connect with the community.<br/><br/>Ready to enhance your digital intelligence capabilities while maintaining ethical standards? Follow Ritu&apos;s newsletter at forensicosint.com, explore the resources mentioned in our show notes, and join our LinkedIn community to continue the conversation. Your journey into the world of OSINT starts with understanding not just what you can find, but how to find it responsibly.</p><p><br/></p><p>Resources:</p><p><a href='https://www.raebaker.net/'>https://www.raebaker.net</a></p><p><a href='https://www.linkedin.com/in/espen-ringstad-80297464/'>https://www.linkedin.com/in/espen-ringstad-80297464/</a></p><p><a href='https://www.geoguessr.com/'>https://www.geoguessr.com</a></p><p><a href='https://www.tracelabs.org/'>https://www.tracelabs.org</a></p><p><a href='https://www.kasescenarios.com/'>https://www.kasescenarios.com</a></p><p><a href='https://www.forensicosint.com/newsletter'>https://www.forensicosint.com/newsletter</a></p><p><a href='https://gralhix.com/'>https://gralhix.com</a></p><p><a href='https://osmosisinstitute.org/'>https://osmosisinstitute.org</a></p><p><a href='https://www.linkedin.com/feed/update/urn:li:activity:7317909650798977024/'>https://www.linkedin.com/feed/update/urn:li:activity:7317909650798977024/</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>The digital world is full of breadcrumbs that tell our stories - are you carefully tracking who follows them back to you? In this eye-opening conversation with OSINT expert Ritu Gill, we pull back the curtain on the fascinating world of Open Source Intelligence and why proper tool vetting matters more than you might think.<br/><br/>Drawing from her 18 years in Canadian law enforcement and extensive consulting experience, Ritu reveals why careless tool selection could mean someone is &quot;capturing every keystroke&quot; as you conduct investigations. Her practical advice for both beginners and experienced practitioners cuts through the noise in an increasingly crowded OSINT landscape.<br/><br/>&quot;Without analyzing and adding value to the information, it is not intelligence,&quot; Ritu explains, highlighting the crucial distinction between collecting data and producing actionable intelligence. Her emphasis on ethical considerations - the principle of &quot;OSINT for good&quot; - serves as a timely reminder that with great investigative power comes great responsibility.<br/><br/>Whether you&apos;re looking to build your skills through free resources like Sophia Santos&apos; exercises, gamified platforms like GeoGuessr, or real-world missing persons cases with TraceLabs, this episode provides concrete pathways for growth. Networking emerges as a powerful career accelerator, with events like OsmosisCon offering invaluable opportunities to connect with the community.<br/><br/>Ready to enhance your digital intelligence capabilities while maintaining ethical standards? Follow Ritu&apos;s newsletter at forensicosint.com, explore the resources mentioned in our show notes, and join our LinkedIn community to continue the conversation. Your journey into the world of OSINT starts with understanding not just what you can find, but how to find it responsibly.</p><p><br/></p><p>Resources:</p><p><a href='https://www.raebaker.net/'>https://www.raebaker.net</a></p><p><a href='https://www.linkedin.com/in/espen-ringstad-80297464/'>https://www.linkedin.com/in/espen-ringstad-80297464/</a></p><p><a href='https://www.geoguessr.com/'>https://www.geoguessr.com</a></p><p><a href='https://www.tracelabs.org/'>https://www.tracelabs.org</a></p><p><a href='https://www.kasescenarios.com/'>https://www.kasescenarios.com</a></p><p><a href='https://www.forensicosint.com/newsletter'>https://www.forensicosint.com/newsletter</a></p><p><a href='https://gralhix.com/'>https://gralhix.com</a></p><p><a href='https://osmosisinstitute.org/'>https://osmosisinstitute.org</a></p><p><a href='https://www.linkedin.com/feed/update/urn:li:activity:7317909650798977024/'>https://www.linkedin.com/feed/update/urn:li:activity:7317909650798977024/</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17234880-season-1-episode-8-pedro-kertzman-ritu-gill.mp3" length="21165995" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8v1189bb7hzszlcc1rurqhmzb471?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17234880</guid>
    <pubDate>Tue, 10 Jun 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17234880/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17234880/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17234880/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17234880/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17234880/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="OSINT Ethics and Tool Vetting" />
  <psc:chapter start="10:01" title="Ritu&#39;s Journey into OSINT" />
  <psc:chapter start="16:20" title="Learning OSINT: Practice and Resources" />
  <psc:chapter start="22:12" title="Investigations and Ethical Considerations" />
  <psc:chapter start="25:10" title="Practical OSINT Exercises and Communities" />
  <psc:chapter start="28:36" title="Networking and Final Thoughts" />
</psc:chapters>
    <itunes:duration>1760</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 7 (Pedro Kertzman &amp; John Doyle)</itunes:title>
    <title>Season 1 - Episode 7 (Pedro Kertzman &amp; John Doyle)</title>
    <itunes:summary><![CDATA[What does the future of Cyber Threat Intelligence look like beyond basic feeds and reports? Former CIA analyst John Doyle takes us behind the curtain of modern CTI operations, revealing how smart teams are delivering value across entire organizations.  With over 16 years tracking state-sponsored APT groups and now serving as a principal intelligence enablement consultant, Doyle explains how CTI roles are evolving to meet expanding demands. "Organizations use CTI for one of three reasons," he ...]]></itunes:summary>
    <description><![CDATA[<p>What does the future of Cyber Threat Intelligence look like beyond basic feeds and reports? Former CIA analyst John Doyle takes us behind the curtain of modern CTI operations, revealing how smart teams are delivering value across entire organizations.<br/><br/>With over 16 years tracking state-sponsored APT groups and now serving as a principal intelligence enablement consultant, Doyle explains how CTI roles are evolving to meet expanding demands. &quot;Organizations use CTI for one of three reasons,&quot; he shares. &quot;You&apos;ve saved the company money, you&apos;re making the company money, or you&apos;re improving efficiency.&quot; This value-driven approach has transformed how CTI teams position themselves in the security ecosystem.<br/><br/>The conversation explores frameworks revolutionizing how teams measure their impact, including the CTI-CMM with its newly developed metrics system. Doyle also highlights unexpected partnerships forming between threat intelligence and other business units—from security awareness to HR—as threats like North Korean IT workers infiltrating legitimate companies create challenges that span traditional departmental boundaries.<br/><br/>For practitioners seeking growth, Doyle maps out the conference landscape from Washington DC&apos;s CyberWarCon to European events like FIRST CTI, noting that despite the industry&apos;s introverted reputation, these gatherings feature &quot;the smartest people in the world who are super humble&quot; and eager to share knowledge. He also details how AI is transforming intelligence workflows, enabling resource-constrained teams to operate at much higher capacity while maintaining the critical human judgment that separates great analysis from mere data processing.<br/><br/>Whether you&apos;re building a CTI program, looking to prove your team&apos;s value, or simply curious about how intelligence tradecraft translates from government to private sector, this conversation offers practical insights into an industry where collaboration remains the ultimate competitive advantage. As Doyle concludes, &quot;The more opportunity we have to work with each other and grow from one another, the better off we&apos;re going to be.&quot;</p><p><br/></p><p>Resources:</p><p>https://cti-cmm.org/</p><p>https://medium.com/@likethecoins</p><p>https://klrgrz.medium.com/</p><p>https://services.google.com/fh/files/misc/cti-analyst-core-competencies-framework-v1.pdf</p><p><a href='https://www.sans.org/white-papers/2025-cti-survey-webcast-forum-navigating-uncertainty-todays-threat-landscape/'>https://www.sans.org/white-papers/2025-cti-survey-webcast-forum-navigating-uncertainty-todays-threat-landscape/</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What does the future of Cyber Threat Intelligence look like beyond basic feeds and reports? Former CIA analyst John Doyle takes us behind the curtain of modern CTI operations, revealing how smart teams are delivering value across entire organizations.<br/><br/>With over 16 years tracking state-sponsored APT groups and now serving as a principal intelligence enablement consultant, Doyle explains how CTI roles are evolving to meet expanding demands. &quot;Organizations use CTI for one of three reasons,&quot; he shares. &quot;You&apos;ve saved the company money, you&apos;re making the company money, or you&apos;re improving efficiency.&quot; This value-driven approach has transformed how CTI teams position themselves in the security ecosystem.<br/><br/>The conversation explores frameworks revolutionizing how teams measure their impact, including the CTI-CMM with its newly developed metrics system. Doyle also highlights unexpected partnerships forming between threat intelligence and other business units—from security awareness to HR—as threats like North Korean IT workers infiltrating legitimate companies create challenges that span traditional departmental boundaries.<br/><br/>For practitioners seeking growth, Doyle maps out the conference landscape from Washington DC&apos;s CyberWarCon to European events like FIRST CTI, noting that despite the industry&apos;s introverted reputation, these gatherings feature &quot;the smartest people in the world who are super humble&quot; and eager to share knowledge. He also details how AI is transforming intelligence workflows, enabling resource-constrained teams to operate at much higher capacity while maintaining the critical human judgment that separates great analysis from mere data processing.<br/><br/>Whether you&apos;re building a CTI program, looking to prove your team&apos;s value, or simply curious about how intelligence tradecraft translates from government to private sector, this conversation offers practical insights into an industry where collaboration remains the ultimate competitive advantage. As Doyle concludes, &quot;The more opportunity we have to work with each other and grow from one another, the better off we&apos;re going to be.&quot;</p><p><br/></p><p>Resources:</p><p>https://cti-cmm.org/</p><p>https://medium.com/@likethecoins</p><p>https://klrgrz.medium.com/</p><p>https://services.google.com/fh/files/misc/cti-analyst-core-competencies-framework-v1.pdf</p><p><a href='https://www.sans.org/white-papers/2025-cti-survey-webcast-forum-navigating-uncertainty-todays-threat-landscape/'>https://www.sans.org/white-papers/2025-cti-survey-webcast-forum-navigating-uncertainty-todays-threat-landscape/</a></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17201001-season-1-episode-7-pedro-kertzman-john-doyle.mp3" length="38610415" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ed97st6cm81lae0v40ha4tdu0f3g?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17201001</guid>
    <pubDate>Tue, 27 May 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17201001/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17201001/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17201001/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17201001/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17201001/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to John Doyle" />
  <psc:chapter start="1:11" title="John&#39;s Journey into CTI" />
  <psc:chapter start="4:30" title="Evolution of Intelligence Skills and Sources" />
  <psc:chapter start="8:22" title="CTI&#39;s Value Beyond Threat Feeds" />
  <psc:chapter start="12:11" title="CTI Capability Maturity Model Framework" />
  <psc:chapter start="19:46" title="CTI Supporting Security Awareness Programs" />
  <psc:chapter start="25:54" title="CTI Frameworks and Competencies" />
  <psc:chapter start="34:11" title="Top CTI Conferences Worldwide" />
  <psc:chapter start="43:10" title="Working at CIA and Industry Benefits" />
  <psc:chapter start="49:30" title="AI Applications in Threat Intelligence" />
  <psc:chapter start="53:00" title="Final Thoughts on CTI Community" />
</psc:chapters>
    <itunes:duration>3214</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 6 (Pedro Kertzman &amp; Aaron Roberts)</itunes:title>
    <title>Season 1 - Episode 6 (Pedro Kertzman &amp; Aaron Roberts)</title>
    <itunes:summary><![CDATA[What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of "Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers," reveals the powerful intersection where these disciplines meet.  Aaron's journey from aspiring football coach to cyber threat expert provides a fascinating backdrop to our conversation. After starting in IT support and gr...]]></itunes:summary>
    <description><![CDATA[<p>What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of &quot;Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers,&quot; reveals the powerful intersection where these disciplines meet.<br/><br/>Aaron&apos;s journey from aspiring football coach to cyber threat expert provides a fascinating backdrop to our conversation. After starting in IT support and gradually moving through cybersecurity roles, he discovered the power of OSINT in identifying threats before they materialize. This evolution shaped his unique perspective on threat intelligence - one that values both commercial tools and grassroots solutions from the OSINT community.<br/><br/>The most compelling insights emerge when Aaron discusses the practical realities of threat intelligence on a budget. Rather than viewing financial constraints as limitations, he demonstrates how they can drive innovation. From leveraging free GitHub repositories to repurposing marketing tools for security, Aaron reveals how small and medium businesses can build sophisticated threat detection capabilities without breaking the bank. His mention of C2Tracker - a free tool that can identify command and control infrastructure before many commercial feeds - highlights how open-source approaches sometimes outperform their expensive counterparts.<br/><br/>Perhaps most valuable is Aaron&apos;s framework for attack surface intelligence. By examining credentials exposed in data breaches and stealer logs, identifying vulnerabilities in internet-facing systems, monitoring brand sentiment, and detecting typosquat domains, he creates a comprehensive view of organizational risk. This methodology helps companies understand how attackers perceive them - vital intelligence for preemptive defense.<br/><br/>Throughout our discussion, one theme remains constant: effective threat intelligence requires more than technical prowess. Understanding business context, establishing clear intelligence requirements, and communicating findings effectively transform raw data into actionable insights. As Aaron puts it, &quot;You can spend all day writing reports about ransomware groups, but if you don&apos;t understand what the business is trying to do, you can&apos;t really protect it.&quot;<br/><br/>Want to strengthen your organization&apos;s security posture through practical, intelligence-led approaches? Connect with us on LinkedIn in the Cyber Threat Intelligence Podcast group to continue the conversation and discover how these principles might apply to your unique security challenges.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of &quot;Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers,&quot; reveals the powerful intersection where these disciplines meet.<br/><br/>Aaron&apos;s journey from aspiring football coach to cyber threat expert provides a fascinating backdrop to our conversation. After starting in IT support and gradually moving through cybersecurity roles, he discovered the power of OSINT in identifying threats before they materialize. This evolution shaped his unique perspective on threat intelligence - one that values both commercial tools and grassroots solutions from the OSINT community.<br/><br/>The most compelling insights emerge when Aaron discusses the practical realities of threat intelligence on a budget. Rather than viewing financial constraints as limitations, he demonstrates how they can drive innovation. From leveraging free GitHub repositories to repurposing marketing tools for security, Aaron reveals how small and medium businesses can build sophisticated threat detection capabilities without breaking the bank. His mention of C2Tracker - a free tool that can identify command and control infrastructure before many commercial feeds - highlights how open-source approaches sometimes outperform their expensive counterparts.<br/><br/>Perhaps most valuable is Aaron&apos;s framework for attack surface intelligence. By examining credentials exposed in data breaches and stealer logs, identifying vulnerabilities in internet-facing systems, monitoring brand sentiment, and detecting typosquat domains, he creates a comprehensive view of organizational risk. This methodology helps companies understand how attackers perceive them - vital intelligence for preemptive defense.<br/><br/>Throughout our discussion, one theme remains constant: effective threat intelligence requires more than technical prowess. Understanding business context, establishing clear intelligence requirements, and communicating findings effectively transform raw data into actionable insights. As Aaron puts it, &quot;You can spend all day writing reports about ransomware groups, but if you don&apos;t understand what the business is trying to do, you can&apos;t really protect it.&quot;<br/><br/>Want to strengthen your organization&apos;s security posture through practical, intelligence-led approaches? Connect with us on LinkedIn in the Cyber Threat Intelligence Podcast group to continue the conversation and discover how these principles might apply to your unique security challenges.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17133339-season-1-episode-6-pedro-kertzman-aaron-roberts.mp3" length="51702096" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o4q2c72j1o6p6gd46wd69wac8wnz?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17133339</guid>
    <pubDate>Tue, 13 May 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17133339/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17133339/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17133339/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17133339/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17133339/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Season 1 - Episode 6 (Pedro Kertzman &amp; Aaron Roberts)" />
  <psc:chapter start="0:17" title="Introduction to Aaron Roberts" />
  <psc:chapter start="1:08" title="From Football Coach to Cyber Professional" />
  <psc:chapter start="6:08" title="Entering the CTI Industry" />
  <psc:chapter start="14:42" title="Paid Intel vs Open Source Intelligence" />
  <psc:chapter start="21:17" title="Essential Tools for CTI Analysts" />
  <psc:chapter start="31:51" title="Attack Surface Intelligence Approach" />
  <psc:chapter start="47:11" title="Creating Intelligence That Actually Matters" />
  <psc:chapter start="1:00:20" title="Episode Closing" />
</psc:chapters>
    <itunes:duration>4304</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 5 (Pedro Kertzman &amp; Josh Darby MacLellan)</itunes:title>
    <title>Season 1 - Episode 5 (Pedro Kertzman &amp; Josh Darby MacLellan)</title>
    <itunes:summary><![CDATA[What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals.  The conversation opens with Josh's unexpected path into threat intelligence, highlighting a crucial revelation for newcomers: you don't need special access or expensive tools to begin gaining CTI experience. With abundant open-source resources avail...]]></itunes:summary>
    <description><![CDATA[<p>What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals.<br/><br/>The conversation opens with Josh&apos;s unexpected path into threat intelligence, highlighting a crucial revelation for newcomers: you don&apos;t need special access or expensive tools to begin gaining CTI experience. With abundant open-source resources available, anyone can practice analysis workflows, build a portfolio, and demonstrate genuine passion before landing their first role.<br/><br/>Beyond technical foundations like the Diamond Model and Kill Chain, Josh emphasizes communication as perhaps the most critical skill for CTI professionals. &quot;Your entire CTI process will fall completely flat if you are not able to communicate that intelligence in a way that lands with your stakeholders,&quot; he notes. This challenge becomes especially apparent when teams struggle to translate their value into language business leaders understand—a persistent hurdle for many CTI programs.<br/><br/>The discussion explores how collaboration across traditionally competitive organizations creates powerful intelligence sharing networks, particularly within industries facing similar threats. Josh also tackles AI&apos;s impact, warning that &quot;your job won&apos;t be replaced by AI, but by someone who can use AI,&quot; encouraging analysts to embrace tools that automate repetitive tasks while preserving human judgment for critical analysis.<br/><br/>Looking ahead, Josh predicts short-term challenges for CTI teams proving their worth during economic uncertainty, but remains optimistic about the field&apos;s future as cyber attacks continue increasing in volume and severity against a fractured geopolitical landscape. For those intrigued by this dynamic field, his advice is simple: dive in, leverage free resources, and discover if this intellectually stimulating career path is right for you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals.<br/><br/>The conversation opens with Josh&apos;s unexpected path into threat intelligence, highlighting a crucial revelation for newcomers: you don&apos;t need special access or expensive tools to begin gaining CTI experience. With abundant open-source resources available, anyone can practice analysis workflows, build a portfolio, and demonstrate genuine passion before landing their first role.<br/><br/>Beyond technical foundations like the Diamond Model and Kill Chain, Josh emphasizes communication as perhaps the most critical skill for CTI professionals. &quot;Your entire CTI process will fall completely flat if you are not able to communicate that intelligence in a way that lands with your stakeholders,&quot; he notes. This challenge becomes especially apparent when teams struggle to translate their value into language business leaders understand—a persistent hurdle for many CTI programs.<br/><br/>The discussion explores how collaboration across traditionally competitive organizations creates powerful intelligence sharing networks, particularly within industries facing similar threats. Josh also tackles AI&apos;s impact, warning that &quot;your job won&apos;t be replaced by AI, but by someone who can use AI,&quot; encouraging analysts to embrace tools that automate repetitive tasks while preserving human judgment for critical analysis.<br/><br/>Looking ahead, Josh predicts short-term challenges for CTI teams proving their worth during economic uncertainty, but remains optimistic about the field&apos;s future as cyber attacks continue increasing in volume and severity against a fractured geopolitical landscape. For those intrigued by this dynamic field, his advice is simple: dive in, leverage free resources, and discover if this intellectually stimulating career path is right for you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/17030001-season-1-episode-5-pedro-kertzman-josh-darby-maclellan.mp3" length="31269787" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vwdc2bra4vkmeink7kw70blc1md3?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17030001</guid>
    <pubDate>Tue, 29 Apr 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17030001/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17030001/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17030001/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/17030001/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/17030001/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="The Value of CTI in Decision-Making" />
  <psc:chapter start="1:25" title="Introduction to Josh Darby McLellan" />
  <psc:chapter start="5:43" title="A Non-Traditional Path to CTI" />
  <psc:chapter start="12:12" title="Building Skills Without a CTI Job" />
  <psc:chapter start="16:51" title="Certifications and Conferences Worth Pursuing" />
  <psc:chapter start="22:24" title="Structured Analytic Techniques and Attribution" />
  <psc:chapter start="28:49" title="Collaboration in Cyber Threat Intelligence" />
  <psc:chapter start="33:20" title="Essential Hard and Soft Skills for CTI" />
  <psc:chapter start="37:45" title="AI&#39;s Impact on Threat Intelligence" />
  <psc:chapter start="42:10" title="Demonstrating CTI&#39;s Value to Organizations" />
</psc:chapters>
    <itunes:duration>2601</itunes:duration>
    <itunes:keywords>#CTI, #CyberThreatIntelligence, #CyberSecurity</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 4 (Pedro Kertzman &amp; Cherie Burgett)</itunes:title>
    <title>Season 1 - Episode 4 (Pedro Kertzman &amp; Cherie Burgett)</title>
    <itunes:summary><![CDATA[Cherie Burgett takes us on a fascinating journey from her days as a Radio Shack employee and avid gamer to becoming the Director of Cyber Intelligence Operations for the Mining and Metals Information Sharing and Analysis Center. Her story demolishes the myth that cybersecurity professionals must follow traditional career paths, demonstrating how life skills, natural curiosity, and a hacker mentality can translate into powerful cyber defense capabilities.  The conversation reveals profound ins...]]></itunes:summary>
    <description><![CDATA[<p>Cherie Burgett takes us on a fascinating journey from her days as a Radio Shack employee and avid gamer to becoming the Director of Cyber Intelligence Operations for the Mining and Metals Information Sharing and Analysis Center. Her story demolishes the myth that cybersecurity professionals must follow traditional career paths, demonstrating how life skills, natural curiosity, and a hacker mentality can translate into powerful cyber defense capabilities.<br/><br/>The conversation reveals profound insights about the evolving threat landscape where criminals have developed specialized supply chains and even customer support systems. &quot;It takes a lot more skills to defend than it does to attack,&quot; Cherie notes, highlighting the asymmetric challenge defenders face. We learn how threat actors now specialize in different attack phases—initial access brokers selling to ransomware operators—creating a complex criminal ecosystem that demands collaborative defensive approaches.<br/><br/>What sets this episode apart is Cherie&apos;s perspective on the human dimension of threat intelligence. With background in Bible college studying hermeneutics (the art of interpretation), she brings humanities-focused analysis to technical challenges. &quot;Threat intelligence to me is the most human of the cyber disciplines,&quot; she explains, emphasizing that we&apos;re ultimately &quot;protecting people, not systems.&quot; This philosophy shapes her approach to intelligence sharing, where she insists on providing context and actionable insights rather than merely distributing raw data or &quot;story time&quot; recitations of headlines.<br/><br/>Whether you&apos;re an experienced CTI professional or considering entering the field from an unconventional background, this episode offers valuable guidance on building skills, avoiding analytical biases, and connecting with industry resources. Follow Cherie on LinkedIn or through MMISAC publications to continue learning from her unique perspective on making threat intelligence truly human-centered and impactful.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Cherie Burgett takes us on a fascinating journey from her days as a Radio Shack employee and avid gamer to becoming the Director of Cyber Intelligence Operations for the Mining and Metals Information Sharing and Analysis Center. Her story demolishes the myth that cybersecurity professionals must follow traditional career paths, demonstrating how life skills, natural curiosity, and a hacker mentality can translate into powerful cyber defense capabilities.<br/><br/>The conversation reveals profound insights about the evolving threat landscape where criminals have developed specialized supply chains and even customer support systems. &quot;It takes a lot more skills to defend than it does to attack,&quot; Cherie notes, highlighting the asymmetric challenge defenders face. We learn how threat actors now specialize in different attack phases—initial access brokers selling to ransomware operators—creating a complex criminal ecosystem that demands collaborative defensive approaches.<br/><br/>What sets this episode apart is Cherie&apos;s perspective on the human dimension of threat intelligence. With background in Bible college studying hermeneutics (the art of interpretation), she brings humanities-focused analysis to technical challenges. &quot;Threat intelligence to me is the most human of the cyber disciplines,&quot; she explains, emphasizing that we&apos;re ultimately &quot;protecting people, not systems.&quot; This philosophy shapes her approach to intelligence sharing, where she insists on providing context and actionable insights rather than merely distributing raw data or &quot;story time&quot; recitations of headlines.<br/><br/>Whether you&apos;re an experienced CTI professional or considering entering the field from an unconventional background, this episode offers valuable guidance on building skills, avoiding analytical biases, and connecting with industry resources. Follow Cherie on LinkedIn or through MMISAC publications to continue learning from her unique perspective on making threat intelligence truly human-centered and impactful.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/16902495-season-1-episode-4-pedro-kertzman-cherie-burgett.mp3" length="27652420" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mc1zr6zgac9z8zi6m5vn4luf2c62?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16902495</guid>
    <pubDate>Tue, 15 Apr 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16902495/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16902495/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16902495/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16902495/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/16902495/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Season 1 - Episode 4 (Pedro Kertzman &amp; Cherie Burgett)" />
  <psc:chapter start="0:17" title="No one person should be responsible" />
  <psc:chapter start="3:55" title="From Radio Shack to DEF CON" />
  <psc:chapter start="8:53" title="Building collaborative threat intelligence" />
  <psc:chapter start="15:56" title="Modern threat actor specialization" />
  <psc:chapter start="19:26" title="The value of non-traditional backgrounds" />
  <psc:chapter start="27:15" title="Threat intelligence is human intelligence" />
  <psc:chapter start="33:06" title="Finding resources and getting noticed" />
  <psc:chapter start="36:26" title="Closing thoughts and contact information" />
</psc:chapters>
    <itunes:duration>2300</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 3 (Pedro Kertzman &amp; Pedro Barros)</itunes:title>
    <title>Season 1 - Episode 3 (Pedro Kertzman &amp; Pedro Barros)</title>
    <itunes:summary><![CDATA[Navigating the world of threat intelligence feeds requires a critical eye and regular evaluation. Security analyst and educator Pedro Barros takes us through his journey from SOC analyst to threat intelligence professional, explaining why CTI should function as a pillar supporting all cybersecurity operations.  Pedro highlights a persistent problem in threat intelligence practice: the proliferation of "combo lists" - recycled data from old breaches presented as new threats. "If you're going t...]]></itunes:summary>
    <description><![CDATA[<p>Navigating the world of threat intelligence feeds requires a critical eye and regular evaluation. Security analyst and educator Pedro Barros takes us through his journey from SOC analyst to threat intelligence professional, explaining why CTI should function as a pillar supporting all cybersecurity operations.<br/><br/>Pedro highlights a persistent problem in threat intelligence practice: the proliferation of &quot;combo lists&quot; - recycled data from old breaches presented as new threats. &quot;If you&apos;re going to give me some intelligence, do some more work on it,&quot; he challenges feed providers, stressing the need for context that makes alerts truly actionable. Without proper evaluation, these feeds create false alarms that waste precious security resources.<br/><br/>The conversation delves into practical evaluation strategies for threat intelligence sources. Rather than simply accumulating feeds, Pedro recommends quarterly assessments focused on accuracy, timeliness, and relevance. This process should incorporate feedback from SOC analysts, detection engineers, and vulnerability management teams to ensure intelligence serves its purpose across the organization.<br/><br/>For aspiring CTI professionals, Pedro emphasizes understanding adjacent security disciplines as foundational knowledge. He recommends &quot;Visual Threat Intelligence&quot; by Thomas Roccia as essential reading, describing it as so engaging he &quot;started reading it one day and finished it the same day.&quot; He also highlights the need for more academic programs to include dedicated threat intelligence courses as the field continues to mature.<br/><br/>Visit Pedro&apos;s blog at pemblabs.net to follow his work, including his upcoming analysis of a sophisticated phishing campaign using targeted delivery methods and Telegram bots. Connect with our community on the Cyber Threat Intelligence Podcast LinkedIn group to continue the conversation about building intelligence capabilities that actually matter.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Navigating the world of threat intelligence feeds requires a critical eye and regular evaluation. Security analyst and educator Pedro Barros takes us through his journey from SOC analyst to threat intelligence professional, explaining why CTI should function as a pillar supporting all cybersecurity operations.<br/><br/>Pedro highlights a persistent problem in threat intelligence practice: the proliferation of &quot;combo lists&quot; - recycled data from old breaches presented as new threats. &quot;If you&apos;re going to give me some intelligence, do some more work on it,&quot; he challenges feed providers, stressing the need for context that makes alerts truly actionable. Without proper evaluation, these feeds create false alarms that waste precious security resources.<br/><br/>The conversation delves into practical evaluation strategies for threat intelligence sources. Rather than simply accumulating feeds, Pedro recommends quarterly assessments focused on accuracy, timeliness, and relevance. This process should incorporate feedback from SOC analysts, detection engineers, and vulnerability management teams to ensure intelligence serves its purpose across the organization.<br/><br/>For aspiring CTI professionals, Pedro emphasizes understanding adjacent security disciplines as foundational knowledge. He recommends &quot;Visual Threat Intelligence&quot; by Thomas Roccia as essential reading, describing it as so engaging he &quot;started reading it one day and finished it the same day.&quot; He also highlights the need for more academic programs to include dedicated threat intelligence courses as the field continues to mature.<br/><br/>Visit Pedro&apos;s blog at pemblabs.net to follow his work, including his upcoming analysis of a sophisticated phishing campaign using targeted delivery methods and Telegram bots. Connect with our community on the Cyber Threat Intelligence Podcast LinkedIn group to continue the conversation about building intelligence capabilities that actually matter.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/16842490-season-1-episode-3-pedro-kertzman-pedro-barros.mp3" length="23176679" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ktzo0zzu169eckpd6mo6hf3furtp?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16842490</guid>
    <pubDate>Tue, 01 Apr 2025 00:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16842490/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16842490/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16842490/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16842490/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/16842490/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction to Pedro Barros" />
  <psc:chapter start="5:13" title="From SOC Analyst to Intelligence Expert" />
  <psc:chapter start="12:46" title="Building a Career in CTI" />
  <psc:chapter start="18:21" title="Current Roles and Responsibilities" />
  <psc:chapter start="22:36" title="Challenges with Threat Feeds" />
  <psc:chapter start="37:42" title="Evaluating Threat Intelligence Value" />
  <psc:chapter start="51:12" title="Conferences and Knowledge Sharing" />
  <psc:chapter start="59:33" title="Recommended Books and Resources" />
  <psc:chapter start="1:07:08" title="Knowledge Gaps and Future Learning" />
</psc:chapters>
    <itunes:duration>1927</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 2 (Pedro Kertzman &amp; A. Stryker)</itunes:title>
    <title>Season 1 - Episode 2 (Pedro Kertzman &amp; A. Stryker)</title>
    <itunes:summary><![CDATA[Threat intelligence forms the backbone of effective cybersecurity strategy, but what does it really take to build a successful CTI program? In this fascinating conversation, Stryker, a threat intelligence analyst at a major US insurance company, challenges conventional wisdom by asserting that while every organization needs threat information, not every organization requires a dedicated threat intelligence team.  Drawing from her unconventional journey from marketing professional to threat in...]]></itunes:summary>
    <description><![CDATA[<p>Threat intelligence forms the backbone of effective cybersecurity strategy, but what does it really take to build a successful CTI program? In this fascinating conversation, Stryker, a threat intelligence analyst at a major US insurance company, challenges conventional wisdom by asserting that while every organization needs threat information, not every organization requires a dedicated threat intelligence team.<br/><br/>Drawing from her unconventional journey from marketing professional to threat intelligence analyst, Stryker offers a refreshing perspective on career transitions in cybersecurity. &quot;I&apos;m a poster child for having to do everything the difficult way,&quot; she admits, before revealing how she recontextualized her decade of content marketing experience into valuable security skills. Her story demolishes the myth that there&apos;s only one path into the industry, though she acknowledges the reality: &quot;It&apos;s not an entry-level position... you have to be that much better than everybody else to overcome bias.&quot;<br/><br/>The conversation delves into the maturity spectrum of threat intelligence capabilities, from organizations just beginning to monitor key resources to those with fully dedicated teams. Stryker provides practical advice on selecting security partners who offer contextual guidance rather than checkbox compliance: &quot;Listen for the ones who say &apos;no, and here&apos;s why, but here&apos;s what you can do instead.&apos; That&apos;s the sign of an organization that wants to be a partner.&quot;<br/><br/>For professionals looking to sharpen their CTI knowledge, Stryker emphasizes the importance of primary sources over media summaries and shares her methodology for building a comprehensive intelligence feed. She also reveals her unique approach to helping others transition into cybersecurity through her &quot;Career Campaigns&quot; workshop, which uses tabletop RPG concepts to help people reimagine their professional skills.<br/><br/>Whether you&apos;re building a threat intelligence program, considering a career pivot, or simply fascinated by the evolving landscape of cybersecurity, this episode offers invaluable insights from someone who&apos;s navigated the journey firsthand. Subscribe now for more conversations with Cyber Threat Intelligence thought leaders who are reshaping how we think about CTI.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>Threat intelligence forms the backbone of effective cybersecurity strategy, but what does it really take to build a successful CTI program? In this fascinating conversation, Stryker, a threat intelligence analyst at a major US insurance company, challenges conventional wisdom by asserting that while every organization needs threat information, not every organization requires a dedicated threat intelligence team.<br/><br/>Drawing from her unconventional journey from marketing professional to threat intelligence analyst, Stryker offers a refreshing perspective on career transitions in cybersecurity. &quot;I&apos;m a poster child for having to do everything the difficult way,&quot; she admits, before revealing how she recontextualized her decade of content marketing experience into valuable security skills. Her story demolishes the myth that there&apos;s only one path into the industry, though she acknowledges the reality: &quot;It&apos;s not an entry-level position... you have to be that much better than everybody else to overcome bias.&quot;<br/><br/>The conversation delves into the maturity spectrum of threat intelligence capabilities, from organizations just beginning to monitor key resources to those with fully dedicated teams. Stryker provides practical advice on selecting security partners who offer contextual guidance rather than checkbox compliance: &quot;Listen for the ones who say &apos;no, and here&apos;s why, but here&apos;s what you can do instead.&apos; That&apos;s the sign of an organization that wants to be a partner.&quot;<br/><br/>For professionals looking to sharpen their CTI knowledge, Stryker emphasizes the importance of primary sources over media summaries and shares her methodology for building a comprehensive intelligence feed. She also reveals her unique approach to helping others transition into cybersecurity through her &quot;Career Campaigns&quot; workshop, which uses tabletop RPG concepts to help people reimagine their professional skills.<br/><br/>Whether you&apos;re building a threat intelligence program, considering a career pivot, or simply fascinated by the evolving landscape of cybersecurity, this episode offers invaluable insights from someone who&apos;s navigated the journey firsthand. Subscribe now for more conversations with Cyber Threat Intelligence thought leaders who are reshaping how we think about CTI.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/16826846-season-1-episode-2-pedro-kertzman-a-stryker.mp3" length="34233578" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g4xsphhrqgu8zgb8ya1k2zipstsk?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16826846</guid>
    <pubDate>Wed, 19 Mar 2025 21:00:00 -0600</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16826846/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16826846/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16826846/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16826846/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/16826846/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="The Need for Threat Intelligence" />
  <psc:chapter start="5:22" title="Meet Stryker: Threat Intel Analyst" />
  <psc:chapter start="52:14" title="An Unconventional Path to Cybersecurity" />
  <psc:chapter start="3:52:46" title="Maturity Levels of CTI Programs" />
  <psc:chapter start="6:32:25" title="Selecting the Right Security Partners" />
  <psc:chapter start="8:45:32" title="Sources for CTI Knowledge" />
  <psc:chapter start="11:44:29" title="Career Advice and Final Thoughts" />
</psc:chapters>
    <itunes:duration>2848</itunes:duration>
    <itunes:keywords>Cyber Threat Intelligence, Cyber Security, CTI, Information Security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 1 - Episode 1 (Pedro Kertzman &amp; Mary D&#39;Angelo)</itunes:title>
    <title>Season 1 - Episode 1 (Pedro Kertzman &amp; Mary D&#39;Angelo)</title>
    <itunes:summary><![CDATA[On this episode of Season 1, our Host Pedro Kertzman will chat with Mary D’Angelo, who is a Cyber Threat Intelligence Solutions Lead at Filigran, dedicated to helping organizations integrate actionable threat intelligence across silos. She emphasizes the need for a top-down cultural shift to demonstrate threat intelligence’s ROI to executives. Focused on dark web threats and ransomware attacks, Mary is a strong advocate for democratizing intelligence sharing. She is passionate about mentoring...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of Season 1, our Host Pedro Kertzman will chat with Mary D’Angelo, who is a Cyber Threat Intelligence Solutions Lead at Filigran, dedicated to helping organizations integrate actionable threat intelligence across silos. She emphasizes the need for a top-down cultural shift to demonstrate threat intelligence’s ROI to executives. Focused on dark web threats and ransomware attacks, Mary is a strong advocate for democratizing intelligence sharing. She is passionate about mentoring the next generation of cybersecurity professionals while staying at the forefront of emerging threats and AI-driven intelligence.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of Season 1, our Host Pedro Kertzman will chat with Mary D’Angelo, who is a Cyber Threat Intelligence Solutions Lead at Filigran, dedicated to helping organizations integrate actionable threat intelligence across silos. She emphasizes the need for a top-down cultural shift to demonstrate threat intelligence’s ROI to executives. Focused on dark web threats and ransomware attacks, Mary is a strong advocate for democratizing intelligence sharing. She is passionate about mentoring the next generation of cybersecurity professionals while staying at the forefront of emerging threats and AI-driven intelligence.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2432798/open_sms">Send a text</a></p><p><a rel="payment" href="https://buymeacoffee.com/ctipodcast">Support the show</a></p><p>Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2432798/episodes/16730036-season-1-episode-1-pedro-kertzman-mary-d-angelo.mp3" length="20957471" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0phcd8hz7tqgb8bvwlo31e8tg20m?.jpg" />
    <itunes:author>Pedro Kertzman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16730036</guid>
    <pubDate>Mon, 03 Mar 2025 22:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16730036/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16730036/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16730036/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2432798/16730036/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2432798/16730036/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro &amp; Guest Bio" />
  <psc:chapter start="0:54" title="Mary&#39;s journey to current role" />
  <psc:chapter start="9:05" title="The importance of CTI" />
  <psc:chapter start="14:55" title="Why sharing CTI is important" />
  <psc:chapter start="17:08" title="Dos &amp; Don&#39;ts" />
  <psc:chapter start="21:56" title="More Best Practices" />
  <psc:chapter start="23:43" title="How to avoid communication issues internally" />
  <psc:chapter start="25:04" title="Learning more about CTI" />
  <psc:chapter start="27:12" title="How to learn more from Mary D&#39;Angelo" />
  <psc:chapter start="28:01" title="Wrap &amp; Final Reminders" />
</psc:chapters>
    <itunes:duration>1745</itunes:duration>
    <itunes:keywords>Cyber Security, InfoSec, CTI, Cyber Threat Intelligence</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/dangelomary/" img="https://storage.buzzsprout.com/0palcmnqj9jcops84rv1m8drnr3s">Mary D&#39;Angelo</podcast:person>
    <podcast:person role="host" href="https://www.linkedin.com/in/pedrokertzman" img="https://storage.buzzsprout.com/sr9dlvv2utzajnb078ty4pcurfat">Pedro Kertzman</podcast:person>
  </item>
</channel>
</rss>
