Player FM 앱으로 오프라인으로 전환하세요!
“CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer” – with Mike Susong (Part 2 of 2)
Manage episode 327332028 series 170555
Summary
Mike Susong (Website; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss CIA, cyber and corporate intelligence. He won the Intelligence Star for Heroism in the Field.
What You’ll Learn
Intelligence
- Applying aspects of Mike’s training to the private sector using “competitive intelligence”
- Mike’s role co-founding a pioneering company in the field of Cyber Threat Intelligence (CTI)
- The role of technology in enabling and constraining espionage
- What drew Mike to an annual free-thinking social experiment in the desert
Reflections
- Entrepreneurial thinking as unwavering belief in an idea
- The difference between working for Uncle Sam and working for corporate America
And much, much more…
Episode Notes
Andrew sat down with W. Michael Susong for a two-parter to discuss CIA, cyber and Burning Man. Last week in PART I we looked at Mike’s time working for the CIA and in the domain of human intelligence, while in PART II we will focus on his time as an entrepreneur and intelligence leader in the cyber threat intelligence and competitive intelligence spaces.
Mike was a U.S. Army major who completed multiple combat tours and a CIA case officer. He went into the private sector and created competitive intelligence programs for Fujitsu and Ernst & Young, and he was a pioneer in the field of cyber threat intelligence or CTI, creating the first programs for Visa and Pacific Gas & Electric. He is both CISM and CPP certified and a Black Rock Ranger.
And…
Black Rock Rangers are volunteers at Burning Man, an annual event that focuses on artistic expression, spiritual regeneration, and radical inclusion. It culminates in the symbolic burning of a large wooden effigy, known as “The Man.” If you want to explore the event or the ideas that propel it, including its roots in the Californian counter-culture and its Silicon Valley connections, you can do so here, here, here, here, here, and here.
Quote of the Week
"I worked with, with two corporations to build competitive intelligence programs, for them…I want to emphasize that's the ethical application of certain aspects of the intelligence cycle, to support a business decision. So, this was more on the analysis piece, some on collection, and certainly when you start to speak of collection within a private sector environment, you have to have clear, bright lines aloud about what is and is not acceptable." – Mike Susong
Resources
Headline Resource
- Application of Intelligence Principles to Raise IT Security, M. Susong, YouTube (2012)
*SpyCasts
- From the CIA to Strategic Cyber – Hans Holmer (2022)
- Cyberattacks, Espionage & Ransomware – Inside Microsoft’s MSTIC (2022)
Articles
- Start a Competitive Intelligence System that Wins, P. Mertens, Sprout Social (2022)
- Gathering Competitive Intelligence From Twitter, S. Argawal, Startup Grind
Websites
PBR (Projects, Briefs, Reports)
- 2022 State of Competitive Intelligence, SCIP/Crayon (2022)
- CTI: Applying Better Terminology to Threats Intelligence, A. Greer, SANS (2021)
- Understanding Cyber Threat Intelligence Operations, Bank of England (2016)
Courses
- Cyber Threat Intelligence, SANS
- Cyber Threat Intelligence, Threat Intelligence Academy
Podcasts
- Cyber Threat Intelligence, Hacking Humans (2020)
- Intelligence Operations: A First Principle of Cybersecurity, CSO Perspectives (2022)
Video
- 2022 State of Competitive Intelligence, YouTube (2022)
- A CEO’s Perspective on Intelligence, Report Linker (2020)
Primary Sources
*Wildcard Resource*
- The Whole Earth Catalog (1968)
- Steve Jobs called it “the bible of his generation” and links have been made between it and Silicon Valley, Cyber, and Burning Man.
Learn more about your ad choices. Visit megaphone.fm/adchoices
719 에피소드
Manage episode 327332028 series 170555
Summary
Mike Susong (Website; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss CIA, cyber and corporate intelligence. He won the Intelligence Star for Heroism in the Field.
What You’ll Learn
Intelligence
- Applying aspects of Mike’s training to the private sector using “competitive intelligence”
- Mike’s role co-founding a pioneering company in the field of Cyber Threat Intelligence (CTI)
- The role of technology in enabling and constraining espionage
- What drew Mike to an annual free-thinking social experiment in the desert
Reflections
- Entrepreneurial thinking as unwavering belief in an idea
- The difference between working for Uncle Sam and working for corporate America
And much, much more…
Episode Notes
Andrew sat down with W. Michael Susong for a two-parter to discuss CIA, cyber and Burning Man. Last week in PART I we looked at Mike’s time working for the CIA and in the domain of human intelligence, while in PART II we will focus on his time as an entrepreneur and intelligence leader in the cyber threat intelligence and competitive intelligence spaces.
Mike was a U.S. Army major who completed multiple combat tours and a CIA case officer. He went into the private sector and created competitive intelligence programs for Fujitsu and Ernst & Young, and he was a pioneer in the field of cyber threat intelligence or CTI, creating the first programs for Visa and Pacific Gas & Electric. He is both CISM and CPP certified and a Black Rock Ranger.
And…
Black Rock Rangers are volunteers at Burning Man, an annual event that focuses on artistic expression, spiritual regeneration, and radical inclusion. It culminates in the symbolic burning of a large wooden effigy, known as “The Man.” If you want to explore the event or the ideas that propel it, including its roots in the Californian counter-culture and its Silicon Valley connections, you can do so here, here, here, here, here, and here.
Quote of the Week
"I worked with, with two corporations to build competitive intelligence programs, for them…I want to emphasize that's the ethical application of certain aspects of the intelligence cycle, to support a business decision. So, this was more on the analysis piece, some on collection, and certainly when you start to speak of collection within a private sector environment, you have to have clear, bright lines aloud about what is and is not acceptable." – Mike Susong
Resources
Headline Resource
- Application of Intelligence Principles to Raise IT Security, M. Susong, YouTube (2012)
*SpyCasts
- From the CIA to Strategic Cyber – Hans Holmer (2022)
- Cyberattacks, Espionage & Ransomware – Inside Microsoft’s MSTIC (2022)
Articles
- Start a Competitive Intelligence System that Wins, P. Mertens, Sprout Social (2022)
- Gathering Competitive Intelligence From Twitter, S. Argawal, Startup Grind
Websites
PBR (Projects, Briefs, Reports)
- 2022 State of Competitive Intelligence, SCIP/Crayon (2022)
- CTI: Applying Better Terminology to Threats Intelligence, A. Greer, SANS (2021)
- Understanding Cyber Threat Intelligence Operations, Bank of England (2016)
Courses
- Cyber Threat Intelligence, SANS
- Cyber Threat Intelligence, Threat Intelligence Academy
Podcasts
- Cyber Threat Intelligence, Hacking Humans (2020)
- Intelligence Operations: A First Principle of Cybersecurity, CSO Perspectives (2022)
Video
- 2022 State of Competitive Intelligence, YouTube (2022)
- A CEO’s Perspective on Intelligence, Report Linker (2020)
Primary Sources
*Wildcard Resource*
- The Whole Earth Catalog (1968)
- Steve Jobs called it “the bible of his generation” and links have been made between it and Silicon Valley, Cyber, and Burning Man.
Learn more about your ad choices. Visit megaphone.fm/adchoices
719 에피소드
すべてのエピソード
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.