Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K. I think for threat intelligence sharing to be effective though, is it needs to be contextualized and actionable and it can't be slow and gated and working through bureaucratic means in order to get the information shared. So the reality there is there is still a lot of person to person and organization to organization sharing that's going on, but I think that's actually happening at a much more effective level than previously. The Russia, Ukraine invasion really was a catalyst for a lot of that. There was, and that's not to say that there wasn't green information sharing going on before, because there was. But when it actually came time to say, wow, okay, we need, there are people's lives we need to protect here, I think a lot of those barriers broke down.
B (1:00)
Welcome to Threat Vector, the Palo Alto Networks podcast where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior Director of thought leadership for unit 42. Today I'm speaking with Wendy Whitmore, Chief Security Intelligence Officer at Palo Alto Networks. Wendy brings more than two decades of experience leading incident response and threat intelligence teams at organizations like Mandiant, CrowdStrike, IBM X Force, and Unit 42 for Palo Alto Networks. She's an inaugural member of the DHS Cybersafety Review Board and serves on the Cybersecurity advisory boards at Duke University and the University of San Diego. Wendy is a highly respected voice in national and global cybersecurity strategy with extensive experience countering nation state and AI driven threats. Today we're going to talk about the evolving scale and sophistication of Chinese nation state cyber threats, the targeting of critical infrastructure, and how defenders can better prepare in a rapidly accelerating AI environment. This topic is critically important because we're witnessing nation state actors, particularly from China, operating with unprecedented speed, persistence and global reach, threatening not just corporate intellectual property, but critical infrastructure that underpins everyday life. As defenders, we need new strategies, faster detection and greater resilience across entire ecosystems. Here's our conversation. Wendy, welcome back to threatvector. Good to see you again.
A (2:43)
Thanks, David. Happy to be here. Great to see you.
B (2:46)
I know that you've been busy lately. Congrats on the new role.
A (2:49)
Thank you.
B (2:51)
And you've been on panels even today, and I wanted to get into some of the conversations that you've been having, talking about some of the Chinese threat actors and some of the tactics and behaviors that you're seeing Well, I think.
![Confronting China’s Expanding Cyber Threats [Threat Vector] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2d1a9aa8-d9e5-11f0-a81c-f71034c38c2f%2Fimage%2Ff3296217a0160b9e4766149adb9f702e.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)