{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/634aeca98f920300113e5fc5/642623e61b072a0010d8bccd?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"The World of Threat Intelligence with Emily Hacker ","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/cover/1665854415148-b6ebd47384db6869168cd2aa0c5aed58.jpeg?height=200","description":"<p>Emily Hacker, a threat intelligence analyst at Microsoft, working on the Microsoft Threat Intelligence Center, joins Stephanie, Ilana, and Evan on this week's episode of Secure the Job: Breaking into Security. Emily's team helps anticipate, pre-empt, and respond to different incidents on the front lines of customers' networks. Emily discusses the role threat intelligence plays within cybersecurity, the challenges of tracking cyber criminals, and the importance of soft skills on the job.&nbsp;&nbsp;</p><p> </p><p><strong>In This Episode You Will Learn</strong>:    &nbsp;</p><p> &nbsp;</p><ul><li>What Emily finds the most interesting about her work &nbsp;</li><li>What changes need to happen for us to get ahead of cybercriminals &nbsp;</li><li>How Emily ended up working for the Microsoft Threat Intelligence Center &nbsp;</li></ul><p> &nbsp;</p><p><strong>Some Questions We Ask:</strong>    &nbsp;</p><p> &nbsp;</p><ul><li>What are some of the biggest trends you’ve seen in the last few months?  &nbsp;</li><li>How would you define threat intelligence?  &nbsp;</li><li>If you had to explain your job to an average joe, how would you explain it?  &nbsp;</li></ul><p>  &nbsp;</p><p><strong>Resources:</strong>   &nbsp;</p><p><a href=\"https://twitter.com/dreadphones\" rel=\"noopener noreferrer\" target=\"_blank\"><em>Follow Emily on Twitter</em></a> &nbsp;</p><p> &nbsp;</p><p><a href=\"https://www.linkedin.com/in/emilydhacker/\" rel=\"noopener noreferrer\" target=\"_blank\">View Emily Hacker on LinkedIn</a> &nbsp;</p><p><a href=\"https://www.linkedin.com/in/stephanie-machuca/\" rel=\"noopener noreferrer\" target=\"_blank\">View Stephanie Machuca on LinkedIn</a> &nbsp;</p><p><a href=\"https://www.linkedin.com/in/ilanabasman/\" rel=\"noopener noreferrer\" target=\"_blank\">View Ilana Basman on LinkedIn</a> &nbsp;</p><p><a href=\"https://www.linkedin.com/in/-evan-brown/\" rel=\"noopener noreferrer\" target=\"_blank\">View Evan Brown on LinkedIn</a> &nbsp;</p><p> &nbsp;</p><p> &nbsp;</p><p><strong>Related Microsoft Podcasts:              </strong>    &nbsp;</p><p>Listen to:<a href=\"https://thecyberwire.com/podcasts/uncovering-hidden-risks\" rel=\"noopener noreferrer\" target=\"_blank\"> Uncovering Hidden Risks</a>   &nbsp;</p><p>Listen to: <a href=\"https://thecyberwire.com/podcasts/afternoon-cyber-tea\" rel=\"noopener noreferrer\" target=\"_blank\">Afternoon Cyber Tea with Ann Johnson </a> &nbsp;</p><p>Listen to:<a href=\"https://securityunlockedpodcast.com/\" rel=\"noopener noreferrer\" target=\"_blank\"> Security Unlocked</a>    &nbsp;</p><p>Listen to:<a href=\"https://securityunlockedcisoseries.com/\" rel=\"noopener noreferrer\" target=\"_blank\"> Security Unlocked: CISO Series with Bret Arsenault</a>      &nbsp;</p><p>      &nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href=\"https://news.microsoft.com/podcasts/\" rel=\"noopener noreferrer\" target=\"_blank\"> microsoft.com/podcasts</a> &nbsp;</p>","author_name":"Microsoft"}