Crowdsourcing Cybersecurity Intelligence To Secure Society | A CrowdSec Story With Philippe Humeau

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=cOMg-Jk5rXE



Duration: 45:31
24 views
2


Suppose you still believe the narrative of a hooded figure with ski gloves and a crowbar attacking a company network. In that case, this may be hard to digest: Cybercrime is a business. Cybercriminals are well organized.

They share data; sell information; rent, lease, and trade tools; and market their business.

It's time to source the crowd of cyber defenders to counter this advantage.

Many organizations are spending millions, if not billions, of dollars standing up multi-layered endpoint, network, and perimeter protection systems, multi-layered cloud security solutions, and privilege-oriented identity management systems, as well as real-time security operations centers - and much, much more.

And let's not forget that the security team needs to do all of this while allowing the users to get their job done and, in the best-case scenario, not having to worry about any of this. The Cybercriminal environment doesn't have to worry about this β€” actually, they will try to take advantage of it. All their investments go straight into understanding their target. What technology is used to run the business, what are their weaknesses, and how can they get in and out with as much value as possible without the possibility of being caught. Cybercriminals use threat intelligence to attack. This is what they can focus on, and they use it to their advantage, each and every day.

CrowdSec is joining the good guys on this battlefield and understands that by acting together and sharing important, relevant pieces of information, we can successfully counteract organized cybercrime. CrowdSec's CTI-driven IPS objective is to automate cybersecurity threat intelligence sharing and consumption on a large scale.

How does that happen?
Through the crowd, of course.

What makes it work beyond scale?
It's all about the real-world context that the crowd experiences and shares.

There are plenty of data lakes, and CTI feeds available to determine the state of an IP address; has it been seen as malicious or not?
That's only part of the question.

How relevant are these data sets to your business? To your environment? To your risk level? Can you ingest them, make sense of them, take action from them?

Once these and many other questions are answered, captured, shared, and utilized at scale by the crowd, we can effectively become competitive against cybercrime.

Learn more about what it means to join the crowd and how all the information can benefit businesses and organizations all over the globe.

This is the value of authentic and accurate information sharing.

Note: This story contains promotional content. Learn more.

____________________________

Guest
Philippe Humeau
On Linkedin πŸ‘‰ https://www.linkedin.com/in/philippehumeau/
On Twitter πŸ‘‰ https://twitter.com/philippe_humeau

____________________________

Be sure to visit CrowdSec at https://itspm.ag/crowdsec-b1vp to learn more about their offering.
On Linkedin πŸ‘‰ https://www.linkedin.com/company/crowdsec/
On Twitter πŸ‘‰ https://twitter.com/Crowd_Security

Listen to the podcast: https://itsprad.io/their-story-739

____________________________

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story




Other Videos By ITSPmagazine


2021-12-18The real story about LOG4J - No FUD - No Clickbait - No BS
2021-12-10The One Where Phillip Wiley Wrestles A Bear | KnightLife On ITSPmagazine w/ Alissa Valentina Knight
2021-12-03The One On How I'm Hacking You Next Year | KnightLife On ITSPmagazine With Alissa Valentina Knight
2021-11-19The One Where You Become a Hacker | KnightLife on ITSPmagazine With Alissa Valentina Knight
2021-11-15Selling A Security Company | A Conversation w/Terry Dunlap | Tech Done Different With Ted Harrington
2021-11-08The One About Cameras And Lighting | KnightLife on ITSPmagazine With Alissa Valentina Knight
2021-10-22Blue Lava Origin Story w/ Demetrios Lazarikos (Laz), Julia Tran, Jonna Melinauskas, Andy Hoernecke
2021-10-19Health Drives Performance | Conversation w/ Dr. Glen Robison | Tech Done Different w/ Ted Harrington
2021-10-12Kindness First | A Conversation With Jason Geffner | Tech Done Different With Ted Harrington
2021-10-06WAFs And APIs And Data Highways, Oh My! | An Imperva Story With Alissa Knight And Kunal Anand
2021-10-05Crowdsourcing Cybersecurity Intelligence To Secure Society | A CrowdSec Story With Philippe Humeau
2021-10-01The Road To Athens | 19 Teams Compete For The European Cyber Security Challenge Title In Prague
2021-09-20Cybersecurity Is National Security | A Conversation With Lauren Zabierek | Tech Done Different
2021-09-15The Compromise Live Recording | With Keenan Skelly & Alyssa Miller | Episode Two
2021-09-08The Compromise | With Alyssa Miller & Keenan Skelly | Episode One
2021-08-27Live Recording | Episode 12 | Through The Tech Vine Radio Program
2021-08-20Through The TechVine Radio Program With Diana Kelley, Sean Martin, And Marco Ciappelli
2021-08-13Live Recording | Episode 11 | Through The TechVine With Diana Kelley, Marco Ciappelli, Sean Martin
2021-08-06Episode 10 | Through The TechVine With Diana Kelley, Sean Martin, And Marco Ciappelli
2021-08-04The One With The CISO Of Twitter | Guest: Rinki Sethi | KnightLife With Alissa Valentina Knight
2021-07-30Episode #9 | Through The TechVine Radio Program With Diana Kelley, Sean Martin, And Marco Ciappelli