Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Released Wednesday, 5th February 2025
Good episode? Give it some love!
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett

Wednesday, 5th February 2025
Good episode? Give it some love!
Rate Episode

In this episode of the Security Repo Podcast, we dive into the world of ISACs (Information Sharing Analysis Centers) with Cherie Burgett. Cherie shares insights into the nuanced field of cyber threat intelligence, discussing how interpretation techniques like hermeneutics can enhance understanding of threat actor behavior. The conversation also explores practical approaches to information sharing, intelligence delivery, and the importance of balancing concise communication with actionable insights.

Since its inception, Cherie Burgett has worked with the Mining and Metals ISAC. As the Director of Cyber Intelligence Operations. Cherie is responsible for researching and analyzing the ever-changing threat landscape affecting the mining and metals sectors. With a unique philosophy and approach to cyber threat intelligence incorporating lessons learned from studies in the arts and humanities, she brings a nuanced perspective to the ethics and human condition relating to both threat actor groups and the people defending our critical infrastructure.

Recent Articles about Hermeneutics Applied to Cyber Threat Intelligence - https://www.linkedin.com/pulse/hermeneutics-cyber-threat-intelligence-part-1-tactical-cherie-burgett-x8ime/?trackingId=n33uyXThS%2FCcMkPYyNMCVQ%3D%3D

https://www.linkedin.com/pulse/hermeneutics-cyber-threat-intelligence-part-2-why-cherie-burgett-8xmfe/?trackingId=n33uyXThS%2FCcMkPYyNMCVQ%3D%3D

https://www.linkedin.com/pulse/hermeneutics-cyber-threat-intelligence-part-3-planning-cherie-burgett-xgzwe/?trackingId=n33uyXThS%2FCcMkPYyNMCVQ%3D%3D

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features