Transcript
Patrick Bile (0:02)
You're listening to the Cyberwire Network, powered by N2K.
David Moulton (0:14)
Welcome to Threat Vector, the Palo Alto Networks podcast, where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior Director of Thought leadership for unit 42. Today I'm joined by not one, but two incredible guests from Palo Alto Networks. Liz Pender, Systems engineer specialist for Cortex, and Patrick Bile, SecOps consulting manager. Liz has built her career on solving complex SOC challenges with hands on and automation, incident response and playbook design. Patrick brings nearly two decades of cybersecurity experience, from consulting and engineering to leading SecOps teams and shaping strategic response frameworks across industries. Today, we're talking about a challenge that's both invisible and incredibly costly. Context switching in the Security operations center. A 2022 Harvard Business Review study revealed that the average employee switches between applications 1200 times a day, losing up to four hours a week in toggling alone. In a SoC, that cognitive drain is amplified, where analysts shift between dozens of tools, dashboards and alerts under constant pressure. This kind of operational friction can delay response times, increase errors, and burn out talent. We're going to dig into what causes this kind of overload, how to reduce it with smarter workflows and automation, and what leaders can do to design socks that are built for focus, not fatigue. Liz, Patrick, welcome to Threat Vector. I'm really glad to have you both on the show.
Liz Pender (2:05)
Yeah, thanks so much for having us. Yeah, me and Paddy have been really looking forward to it.
Patrick Bile (2:10)
You said it. Yeah, we really like the podcast, so looking forward to this.
David Moulton (2:14)
Liz, I have to start with you. Your path into cybersecurity is unlike anyone else's. From geochemistry labs to soar consulting to Cortex engineering. How did that shift happen? And do you see any crossover in how you solve problems across fields?
Liz Pender (2:31)
Yeah, it's a bit of a strange one. So, obviously studying a science in university, mostly around chemistry and geology, I definitely didn't see cybersecurity in my future at all. And then when I graduated, I went actually into distilling career. So I was distilling whiskey and gin for about a year. And you know, a lot of people say cyber drives me to drink, but drink drove me to cyber. And around this time, WannaCry happened. So I don't know if anyone remembers that, but it was basically a huge ransomware attack that affected the nhs, our National Health Service. And I thought, wow, that's really interesting, really exciting. And I just didn't think that. That kind of career that I could do that career with my background. But it turns out there's like quite a lot of crossover between obviously, maybe not the distilling side, maybe, but especially like the science, the science side, you know, the analytical thinking. And that's where I started my career, really, in a grad program in a soc. So I was kind of first sign analyst, then moving on to threat intelligence, and then the SOC that I worked in actually purchased Demisto. So what was XOR at the time and really got into automation and just seeing how we could transform our SOC to a more kind of automated SOC to make the analyst lives myself a lot easier. So, yeah, there's quite a bit of crossover, especially around kind of like analytical and logical thinking. That's kind of most that I got from working in a lab and that kind of structured thinking. So it was quite. I wouldn't say it was easy, the crossover obviously. So like a lot of learning, a lot kind of thrown in the deep end there. But I would say that, you know, as long as you have that kind of scientific mind, it was quite, quite an easy transition in that way.
