• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
The Oakmont Group

The Oakmont Group

Help your company podcast get 100,000 downloads

  • Federal Tech Podcast
  • Scorecards
    • Podcast Appearance Scorecard
  • Events
    • Books & BBQ
    • Bike for Your Beer
    • Swing for the Stars
  • About
  • Contact

Ep. 100 Understanding Threat Intelligence for Federal Systems

October 17, 2023 

apple podcasts logo
spotify logp
team cymru
david
David Monnier, Team Cymru

Traditionally, a cyberattack would be identified, and the remediation process would begin. The effectiveness of this is questionable because not all attacks are discovered. Secondly, even if they were discovered, the malicious actor may have left files in areas for future exploits. Because of this logic, we see a new emphasis on threat detection.

In fact, in July of 2023, the Department of Homeland Security issued a report to Congress with a report called “Threat Hunting.”  This nineteen-page report covers areas that include the number of services to review, the time required, and the number of personnel to deliver this service.

This initiative is one reason to listen to today’s interview with David Monnier, the CIO from Team Cymru. David is a seasoned threat hunter as well with decades of experience including a stint in the U.S. Marine Corps.

During the interview, David talks about challenges in threat hunting federal leaders contend with that range from lack of tools to undocumented baseline activity to the lack of executive-level support.

"What differentiates us is our global access to insight. So, you know, we've set out for 20 years or so now, to facilitate services to the Internet community as a whole"

David Monnier, Team Cymru Tweet

He begins with the simple identification of an IP address that a federal leader may have uncovered in a threat analysis. Many questions must be asked:  Is it just you or is someone spraying the entire Internet? When was this discovered? What do other organizations have to say about this IP address?

David expands on what is called “pure signal.”  This is a concept that gives you an understanding of the source of these events and what infrastructure this malicious code can be found in. Real threat intelligence gives you the tools to put attacks into perspective.

One final concept is although federal-based threat hunters have a great capability, not even sophisticated federal threat-hunting systems have the kind of experience in the commercial world to be able to understand the nuances of today’s sophisticated attacks.

If you enjoyed this article, you may want to listen to Ep. 95 How Akamai improves Federal Security

Transcript for podcast
Transcript for Ep. 100
Federal Tech Podast
John Gilroy

John Gilroy

John Gilroy appeared on National Public Radio in Washington DC for 25 years. He wrote 523 technology columns for The Washington Post.  Currently, John is an award-winning lecturer at Georgetown University.  Forgot to mention — he has recorded over 1,000 podcast interviews. 

Federal Tech Podcast David Monnier,  Ep. 100,  Team Cymru

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

federal tech podcast logo
scorecard
constellations podcast from Kratos

Fascinated by going to Mars?

Right now in Los Angeles a company is 3D printing rockets;  30,000 satellites will be launched in the next five years; satellite communications have advanced so far that companies are using normal cell phones to connect to satellites.  How to keep up with all this excitement?  The Constellations Podcast from Kratos.

Let’s work together

We have scorecards, blogs, and videos to help you with your podcast

Footer

Social

Follow along on social media.

email

johngilroy@theoakmontgroupllc.com

Policy

Policy for The Oakmont Group

Copyright © 2023 · Business Pro Theme on Genesis Framework · WordPress · Log in