PODCASTS

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.

Podcasts
Listen to the episode

by Nikhil Chawla

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Crypto is a huge topic. It is hyper relevant to Resilience in that ransomware extortion is paid through crypto. It is relevant to security careerist as it presents a new opportunity to lead and specialize…to be relevant and earn. It’s also relevant for investors (VC) and entrepreneurs. The distributed and open nature of crypto provides unique challenges for security. It seem ready made for algorithmic threat hunting (i.e. security data science). Yet, there is a lot of mythos about “what it is” and what “security it” means. This podcast should shed light on advanced approaches to this new topic. I suspect that “the other side” of the coin here should be an investor….one how is fairly technical.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Cybersecurity and insurance predictions for 2026

Cybersecurity and insurance predictions for 2026

The cyber threat landscape is evolving at breakneck speed, and the challenges organizations will face in 2026 look dramatically different from those of even a year ago. To understand what’s coming, we gathered insights from Resilience’s leading cybersecurity and cyber insurance experts: Dr. Ann Irvine, Chief Data and Analytics Officer; Chris Wheeler, CISO; David Meese, […]

Risk-based vendor tiering that actually works

Risk-based vendor tiering that actually works

Welcome back to the Resilience third-party management series. In our first three posts, we covered why third-party vendor discovery matters, how to locate vendors across your environment, and which high-risk vendor categories most organizations overlook. Now we turn to the next step: prioritizing those vendors based on actual cyber risk—not contract spend. Most vendor management […]

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

Cyber resiliency starts here.

Request Demo