Listen on Apple Podcasts Listen on SpotifyListen on Google Podcasts
Security Posture Rating
NEWMeasure cybersecurity maturity and get clear, actionable insights that expose gaps, prioritize improvements, and demonstrate real progress.
Managed Detection and Response
NEW24/7 SOC combined with contextual intelligence, patented detection logic, and AI-enhanced alerts for rapid threat detection and response
Asset Inventory
NEWComplete visibility across your organization’s attack surface.
Vulnerability Management
NEWIdentify vulnerabilities and prioritizes which ones truly matter within your organization’s context
Cloud Posture
NEWPersistent monitoring, drift detection, and alignment with cloud security best practices to close security gaps
Application Control
NEWExpert currated list of application block rules to simplify management and customize application protection
LogIC (Streamlined SIEM)
NEWHyper-efficient, real-time event collection and automated mapping
Tenant Administrator
NEWIdentify at-risk tenants, track billing and renewals, and instantly act on time-sensitive security issues
Integrations
NEWVisibility Across Attack Surface
NEWComprehensive visibility across client environment through a unified, contextual view that enables quicker actions, lowers risk, and delivers measurable results.
Prioritize What Matters
NEWCorrelate vulnerabilities, misconfigurations, and threat activity to determine which issues pose the greatest risk
Secure Cloud Identities
NEWProtect your cloud identities from attacks due to misconfigurations, policy drift, excessive permissions, and credential theft
Scale Security Operations
NEWStreamline the entire security lifecycle from asset discovery to threat response with automation, contextual insights, and enhanced efficiency
Meet Compliance Requirements
NEWSimplified logging and compliance with push button deployment and real-time reporting
Improve Cybersecurity Maturity
NEWAssess, monitor, and improve cybersecurity maturity with real-time insights and guided, prescriptive actions
Unified Security Posture
NEWCompassOne Platform
NEWSecurity Operations Center
NEWDedicated threat hunters and remediators, on call 24/7/365, with unparalleled cybersecurity expertise
Adversary Pursuit Group
NEWThis elite team is armed with real-time threat intel, delivering rapid response and unmatched protection.
Managed EDR
NEWUsing our patented technology and arming our 24/7/365 MDR with context to resolve threats faster.
Cloud MDR
NEWExpert security monitoring & rapid, context-driven response for your cloud environments.
This week, I welcome Ambassador Butler, a 40-year career civil servant with the Department of State. Ambassador Butler is a long-time career ambassador and deputy commander of EUCOM. We talk about the unfortunate events we’ve seen with the Russian invasion of Ukraine, the intersection of national security, geopolitics, and cyber activities, and the kinds of roles that cyber can play in any sort of conflict.
Ambassador Butler shares a few learning experiences from his long and storied career including serving Iraq, Bulgaria, and touring all over Africa, to dealing with the FBI’s most wanted, the White House, and working with the information warfare and Public Affairs Office of U.S. Forces. We finish by talking about how to get pragmatic when preparing for cyber attacks, and why we need to focus more on internet service providers in cybersecurity.
Ambassador Butler devoted four decades as an American and international diplomat to deterrence, crisis management, conflict prevention and promotion of human rights and democracy. He currently helps train U.S. Army units preparing to serve in Europe, the Middle East and Korea. He served two decades on the front lines of Cold War diplomacy before playing pivotal roles in ending conflicts in the Balkans and Northern Ireland and then engagement in the Middle East and Afghanistan. He exposed Communist Bulgaria’s ethnic repression of its Turkish population in 1985, was the chief American diplomat in Belgrade, Yugoslavia during the Dayton/Bosnia peace process, coordinated President Clinton’s involvement in the 1998 Northern Irish peace accord while at the White House as the NSC Director for Europe, implemented Macedonia’s 2001 peace agreement as U.S. Ambassador, led the “civilian surge” for Iraq in 2007 as Deputy Assistant Secretary of State, and in Sarajevo advanced implementation of the Dayton Accords as the international community Deputy High Representative.
As the Foreign Policy Advisor to NATO’s Supreme Allied Commander, he helped shape military policy for Afghanistan and Kosovo. He then deployed to Iraq for a year with the commander of U.S. Forces dealing with shift of operational lead from the military to the Embassy. His last position was as the Civilian Deputy Commander of the headquarters for U.S. European Command confronting the challenges of resurgent Russia aggression and the Syrian spillover.
Ambassador Butler is a Bowdoin College and did graduate work at Michigan and Princeton.
Blackpoint Cyber does the fighting for you, but ever wish you could get closer to the action? Hear all the details firsthand at our podcast, The Unfair Fight. Listen to monthly episodes where Founder & CEO, Jon Murchison, VP of Threat Operations, Xavier Salinas, and Director of Threat Research, David Rushmer, get real and talk all things cybersecurity and more.
Tune in now or check out our other episodes!
Don’t let a lack of awareness leave the organizations you protect vulnerable to sophisticated and elusive attacks. Subscribe now for a weekly roundup of Blackpoint’s empowering articles.
Subscribe now!