Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:11)
Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave. And with threatlocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. It's powerful protection that gives CISOs real visibility, real control, and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose Threat Locker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo@threatlocker.com N2K today.
A (1:19)
Hello, my name is Charity Wright and I'm a threat Intelligence analyst at Recorded Future. When I was young I wanted to be an Olympic figure skater, which did not happen, but it was something to strive after. When I was maybe in late high school I started really taking an interest in the world around me, international relations. So I guess that did lead to studying international studies at the University of North Texas. I was in my third year of college when a hulking man in uniform approached me in the food court area and said I was wondering if I could sit down and talk to you about the U.S. army. And he was actually one of the rare recruiters that knew about the Army Linguist program and he was recruiting college students specifically that could test into the Linguist program. And you know, it captured my interest right away, learning a foreign language, getting out of my parents house, moving to California. So it sounded like a great opportunity and so I went straight into the army and they explained to me that the army will pay for the rest of your college classes. So I decided to take those classes one by one while I was serving on active duty. To being a linguist, I don't think I really understood what I was getting myself into. I think I imagined that I was going to be working at an embassy overseas and doing some kind of interpreting work, but I had not really researched what army linguists do. So I was very surprised and pleased to learn that the army assigned me to learn Mandarin Chinese. And to be honest I really didn't have confidence that I could learn Chinese, but I thought hey, I'm being paid to learn it so may as well try. And it was a really wonderful experience and then much to my surprise, I found out towards the end of the course that I was going to be assigned to work in Hawaii. So once I found that out, I was very motivated to finish. And then when I went to Hawaii, I was stationed to work at the National Security Agency. My husband at the time was also in the Navy and he was deployed on submarines. So I had to find some balance for the family and I decided to support his career and get out of active duty. And I transitioned directly into the Hawaii Army National Guard. Still as a Chinese linguist. Well, husband took orders to Maryland, so we relocated. And you know, being in the middle right by NSA headquarters at Fort Meade and the defense industry in D.C. i thought for sure I'd be able to get a contract job. But it was 2012 and the economy was not great and the job market was flooded with veterans that were cleared with security clearances. So it was a little challenging to get into a contract job. That's when I started a job in cybersecurity in the private sector. So to me that was one of the most amazing times in my career is actually switching from public sector to private sector and getting into cybersecurity, which was a brand new area for me. Working in threat intelligence is a really exciting, fun, fast paced environment. Like I work on the global issues team now, so I do strategic global intelligence. I still focus heavily on China and especially the past nine months or so I've been focused exclusively on Chinese influence operations. So there is never a dull day when you're monitoring threats around the world. My day to day, I wake up in the morning pretty early and I have to admit I'm a little addicted to my job. So I jump straight into what happened while I was sleeping. Is there anything breaking that I need to report on? And then within the global issues team, we're monitoring what's going on around the world and writing analyst notes. So it's kind of like a summary of what's happening, but also the analysis and we enrich it with other important factors that are happening around that. We have a wonderful manager who manages the team aspects and then I get to add the expert level analysis and help work with those junior analysts. I get to do senior review on a lot of their notes and you know, it's just an amazing environment where I learn from them and they learn from me. These younger junior analysts are amazing. Their perspectives that they bring to our analysis and how we can check each other's bias, which is really important as an analyst, especially as an American intelligence analyst. With a military background, I recognize that I do have my own biases that I have to keep in check. And while I may see something as very extreme, other people try to bring up, oh, well, here's a different perspective, and I love that. I think one of the most important things I've learned in my career is to not let anyone silo you into a role or a place that you are not happy in. A lot of times, people will label you based on your past experiences. So, for example, I came from a military intelligence background, and I literally knew very little about it and nothing about cybersecurity When I jumped into that position, and I really kind of put myself out there and said, hey, look, this is what I can bring to the table. This is what I'm really good at. Here's my gaps, and here's how I'm trying to fill those gaps, and that's what got me into this industry. But once you're in, a lot of times, people will try to be like, okay, you belong in this section, or this is your area of expertise, so you need to stick to this. But I like to encourage people to pursue what you love because you're really going to be good at what you do when you love it. And I feel very blessed to have found a job in a company that allows me to do what I love and what I'm good at. So I kind of went down my own path. And a lot of people were trying to, no, no, no. Go back to your threat intel role. You're a technical person. And I thought, you know what? There's not enough women in this industry on stage or on camera or on the mic, speaking about their experiences, speaking about their knowledge and sharing that with the world. And we need more representation. So part of it was a little bit of me going, hey, we need more women in this. And the other part was, this is really fun, and I love it.
![Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fa8a2b778-da1c-11f0-95e0-6ffc2bf87fed%2Fimage%2F910aaf148c5fdf3b9f89208a91f19df4.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)