Breaking the Intelligence-Defense Divide with Scott Scher
Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy.
In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.
What You’ll Learn:
The mindset shift from cyber threat intelligence to cyber counter-threat intelligence
Why threat intel must not just inform, but recommend actions for defenders
How intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisions
Why we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forces
How Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependency
Chapters:
0:00 Intro & Welcome
0:01 Scott’s Homesteading Story & Path to Cybersecurity
3:47 Breaking Down “Versus” Thinking in Cybersecurity
6:24 How Intel and Defense Teams Truly Collaborate
8:19 What CTI Teams Need to Understand About Defenders
12:45 CTI as “Cover” for Security Decisions
15:21 Homesteaders vs. Cybercriminals: A Fun Thought Experiment
17:45 CTI’s Role in Data Security & Risk Prioritization
19:30 Communicating Intel to Execs vs. Operational Teams
22:05 Final Thoughts & Takeaways
Episode Resources:
Caleb Tolin on LinkedIn: https://www.linkedin.com/in/calebtolin
Scott Scher on LinkedIn: https://www.linkedin.com/in/%F0%9F%92%BDscott-s-54900bb4
👉 Subscribe here: https://rbrk.co/4cVWzno
#CyberSecurityDecoded #ThreatIntelligence #CyberDefense