Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Cyware: Playbooks, Not Panic

Truth in IT
07/07/2025
84
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: Hi Mike Matchett with Small World Big Data. And we are here talking about the latest and greatest, especially some of the things we saw at RSAC 2025. Uh, we have Cyware here today and we're going to talk a little bit about threat intelligence near and dear to my heart. Being a former intelligence officer, how do you get intelligence on what's going on and what do you do with it? So just hang on. Hi, Jawahar. How are you doing? Welcome to our show. Jawahar Sivasankaran, President: Mike. I'm doing very well. Thank you. It's a pleasure to be here. Mike Matchett: Uh, so, uh, you know, we, uh, we got around to RSAC 41,000 people there, uh, you know, lots and lots of vendors. Sorry we didn't get next to you guys that show, uh, in order to see this, but we're catching up here as soon as we can. Uh, so let's talk a little bit about, um, what was going on for you, uh, at, uh, you know, this month in cybersecurity, you had some new announcements. Um, actually, before we even get into that, maybe you could just tell our audience what is the threat intelligence that you're covering? What is the, uh, the scope of that and why do people need it? Jawahar Sivasankaran, President: Yeah. Hey, Mike, listen, we operationalize cyber threat intelligence. That's what we do. I if you go back ten years ago, we've had organizations take, uh, an approach where it was not well connected when it comes to threat intelligence. But fast forward, uh, beyond the first generation of the tip platforms, threat intelligence platforms, this is where cyber truly stands out. Uh, what we do is we make customers. We help customers make sense of cyber threat intelligence. Uh, and truly operationalize the value that they're putting into their threat intelligence programs. Uh, and that's what Cyware we do. We also have an actioning component where we do low-code, no code orchestration as well as the response piece. Uh, but the core anchor, the premise of Cyware is we operationalize cyber threat intelligence. Mike Matchett: All right. So, you know, some of our audiences is very, very highly knowledgeable about security and cyber threats, but we've got some people out there who may just be starting to become aware of some of these things. So let's talk about threat intelligence a little bit. What are we what do we mean threat intelligence? Does it mean that we've got, uh, an event that happened like we might have in our SIEM, or are we talking about, uh, some some other, more sophisticated ways of looking at something going wrong? Jawahar Sivasankaran, President: Yeah, it could be a combination of any of those things, Mike. I mean, traditionally, if you look at it, you know, within the SOC, the security operations center, you had log management, then you had SIM technologies, then you had, you know, the kind of the first gen saw technologies coming in and help automate. But where customers, organizations, their focus right now is I want to take a more threat centric approach. And specific to that, this threat intelligence could come in any shape or form. So it truly depends on what kind of organization you are. This could be indicators of compromise. This could be IP based information. This could be domains. This could be dark web data, so it could be a combination of any of those things. But where we are taking this and where we are seeing is a convergence of traditional CTI. Some of the things that I mentioned, but also that CTI getting conversion to cyber threat intelligence, getting converged with exposure management, with digital risk protection, uh, and that's where cyber truly stands out in terms of how we are differentiating ourselves in the market, where we are offering a truly unified threat intelligence platform for our customers to get the right value from their threat intelligence investments. Mike Matchett: Yeah, because it definitely seems like, you know, people can focus and develop expertise in one area or another and create basically creating their own security silos, uh, which doesn't really help them. And one of the themes that we noticed, uh, happening here now in cyber security in 2025 is this convergence and break down of those silos in a number of ways, Like it's not it's not enough to start monitoring the dark web unless you're actually going to do something about it. When you find information. Right. It's not enough to find that there's a leaked credential, unless you have an ability to quickly do something about that leaked credential. Right. You have to bring it together. And I'm glad to see you guys are taking the lead in that. Um, so is that, you know, use a curious word. You know, we talk about automation, but you use the word actioning on this. Maybe explain like why you use the word actioning. Jawahar Sivasankaran, President: Yeah. Part of it is that you don't want to automate bad processes. The last thing you want to do is automate some something that's not right. And that could be false positives that you're seeing in your environment. Or maybe these are low priority events that you're you're automating. So focus for us is helping our customers with the right orchestration and automation strategy. And this is why we're super proud of what we've built with our orchestration framework with a low code, no code approach for the playbooks, and the other part with the action piece is we go and connect that back to our strengths, which is threat intelligence, right. So customers that do look at threat intelligence, they're able to look at threat intelligence. They're there, you know, do an enrichment. They're doing processing. They can do correlation all with the cyber platform. And then hey, there's the action piece that comes out through the orchestration and the automation. And that's how we bring it all together. Mike Matchett: I'm probably going to steal that from you. Start talking about Actioning. It's going to enter my vocabulary. And that's going to be something the word I use going forward. Jawahar Sivasankaran, President: A hyper orchestration along with Actioning hyper. Mike Matchett: Orchestration. Jawahar Sivasankaran, President: As. Mike Matchett: A. Jawahar Sivasankaran, President: As as a requirement to do actioning the right way. Mike Matchett: So you know what's coming next. You almost could probably you probably got this question a lot, because everybody at the show is also talking about AI and AI agents. And, you know, okay, it's you know, we can enable the human in the loop. How is how is that informing what you guys are doing? How is that affecting? You know, what you're delivering in your roadmap. Jawahar Sivasankaran, President: So Mike, so we have a clear focus on AI and a multi-agent strategy. So you can think of it as an agent AI strategy that we have in place. But what we didn't want to do is we didn't want to go out there and build another LLM wrapper to solve one, two, three, four specific problems. Right? Kind of the sock bots that you're seeing really prevalent in the marketplace. Uh, our strategy is to build a multi-agent strategy with, again, a true focus on threat intelligence. So we're we're taking a phased approach. So right now you've got a knowledge base that we have in place where you as a customer you can do NLP queries on any of the threat Intel information that you want to analyze. Right. So those are things that we have in place. But where we are building up our AI strategy is this multi-agent approach where again, you know, driving actioning again, driving, sharing of that threat Intel information or what we could do with that threat intelligence to enrich and correlate some of the things that you might be doing with existing investment that you have within your sock. So the approach we're taking is a lot more holistic in nature. Uh, and then the other thing, as I mentioned, is we're staying true to our roots, which is operationalizing threat intelligence. And then AI enables that, uh, versus going too far from who we are. Mike Matchett: Right? So you're not just selling. Hey, we got AI in the box. We're doing what we're doing, and we're gonna use AI to augment and enhance that in the best way possible. I like that. I like that. So, uh, so you've got a very unified approach to threat intelligence, and you've just added credential management to that in addition to some of the other things you do. Um, you know, you mentioned, um, on there, uh, and this AI thing coming along. Uh, tell me a little bit about, um, uh, where you see the market going. What was sort of the some of the big trends you heard at RSA, and why do you think those are significant? Jawahar Sivasankaran, President: I think definitely there's, uh, there's a notion of platformization that has come back, if you will. Best of breed versus platform approach. Right. You know, there's we've definitely seen, uh, a new, uh, seen some new energy getting injected into that argument going back and forth. And if you look at cyber Webair a small company, at the end of the day, uh, but we do have a platform approach, and customers are asking for a platform approach from us. Right? They don't want a point product. Uh, and right from the get go, that's kind of how we built cyber as a platform, right? This is a true platform that we're helping our customers with. So it's not just here's one point product that works in its own island, and the other product is not talk to product number one. Uh, so that platform approach is clearly something that we are driving into the marketplace. And that also aligns with some of the things that I mentioned with the unified threat Intel strategy. So that's clearly one thing that we're seeing. Uh, and then the adoption of AI is real, even though there is, you know, we're starting to see, hey, uh, there's there's, uh, there's a curve, a wave that we all have to go through with this AI adoption. Uh, but that is true for both leveraging AI for security As well as security for I. So we got to secure all of those AI systems that are out there. So from a threat information, we're clearly starting to see that it's still early days because those llms, those AI apps, uh, adoption is just taking off on the enterprise and the IT side. And that brings about new threat vectors that we've not seen in the past. So these are net new threat vectors that are focused on AI models or llms or applications. And again, cyber is right in the middle of that transition as well. So it's both security for AI as well as AI for security. Mike Matchett: Yeah I think that's going to be probably the interesting topic next year is once we have AI agents, how do you identify them? How do you secure them? How do you know what they're doing is the right thing to do, while we're also using as much agentic AI as we can to protect ourselves at the same time? So, uh, interesting. Uh, all right. Well, you know, we'd love to talk a little bit more and maybe see a little bit more of what what you're doing firsthand. But this is where we got to end here today. Joe. Uh, if someone wants more information on Cyware, they want to talk about threat intelligence, they want to talk about specifically cyber threat intelligence, how do you fold that in? How do you augment the existing tool suite that you have? What does it mean to be able to have intelligence added to the things they're already doing with logs and events, and the rest of it? Where would you point them at? Where should they start? Jawahar Sivasankaran, President: Mike, the best place is to go to Cyware.com and request a demo. Um, we'll definitely have somebody engaged pretty quickly with, uh, with you. Uh, and then we can go into different types of models for us to have an extended engagement. Uh, but Cyware.com - Request a demo - that's the best place to start. Mike Matchett: All right. Cyber threat intelligence with Cyware. Cyware.com . Thank you for being here today, Jawahar. Jawahar Sivasankaran, President: Mike. Thank you. Thank you for the opportunity. Mike Matchett: All right. And that take care folks.

Mike Matchett of Small World Big Data chats with Jawahar Sivasankaran of Cyware to break down the company’s modular threat response platform. With a full SOAR stack, Cyware empowers security teams to ingest threat intel, automate playbooks, and collaborate across organizational boundaries in real time. Jawahar emphasizes that threat data without context or orchestration is just noise, and Cyware’s platform brings structure, speed, and scale to security ops.


Whether you’re consolidating tools or trying to make the most of threat feeds, Cyware’s approach turns detection into action. For organizations juggling silos, Cyware enables shared situational awareness, making it the connective tissue of modern cyber defense.

Categories:
  • » Cybersecurity Webinars
  • » Events
  • » Small World Big Data
  • » Cybersecurity Webinars » Data Security
  • » Data Management » DevOps
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
Channels:
News:
Events:
Tags:
  • inbrief
  • matchett
  • cyware
  • cybersecurity
  • soar
  • threat
  • intelligence
  • playbooks
  • incident
  • response
  • security
  • automation
  • cyber
  • collaboration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cyware: Playbooks, Not Panic

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Maximize Business Value: Transform AI Buzz into Profitable Outcomes with Druva
                https://www.truthinit.com/index.php/channel/1555/maximize-business-value-transform-ai-buzz-into-profitable-outcomes-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Transform AI Excitement into Tangible Business Success with Druva
                https://www.truthinit.com/index.php/channel/1554/transform-ai-excitement-into-tangible-business-success-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Advancements in Click Fraud Protection: Insights from LinkedIn + HUMAN for Budget and Campaign Optimization
                https://www.truthinit.com/index.php/channel/1583/advancements-in-click-fraud-protection-insights-from-linkedin-human-for-budget-and-campaign-optimization/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva AI
                https://www.truthinit.com/index.php/channel/1556/transforming-ai-buzz-into-tangible-business-value-with-druva-ai/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst the Rise of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-the-rise-of-agentic-commerce/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Discover. Register. Attend. Win.

              • November 2025 D.R.A.W.

                November 2025 D.R.A.W.

                10/27/202501:17 PM ET

                Upcoming Spotlight Events

                • Nov
                  18

                  Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                  11/18/202501:00 PM ET
                  • Nov
                    20

                    Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                    11/20/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      • Nov
                        12

                        Maximize Business Value: Transform AI Buzz into Profitable Outcomes with Druva

                        11/12/202510:00 PM ET
                        • Nov
                          13

                          Transform AI Excitement into Tangible Business Success with Druva

                          11/13/202505:00 AM ET
                          More events

                          Upcoming 360 View Events

                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                • Oct
                                  15

                                  Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                  10/15/202501:00 PM ET
                                  • Sep
                                    16

                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                    09/16/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      30

                                      Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                      10/30/202512:00 PM ET
                                      • Oct
                                        30

                                        Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                        10/30/202506:00 AM ET
                                        • Oct
                                          29

                                          Practical Strategies for Platform Engineering in the AI Era

                                          10/29/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version