Data Security Decoded
Breaking the Intelligence-Defense Divide with Scott Scher
August 13, 2025
In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn’t just technical work, it’s about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most. • Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions • Hear how Scott’s off-grid lifestyle influenced his approach to resilience and technology reliance • Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like • Get practical ways to transform raw threat data into clear, actionable defense strategies
Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy.

In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

What You’ll Learn:


Episode Highlights:

[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity
[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula
[08:19] What CTI and defenders really need to understand about each other
[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions
[17:45] How CTI helps organizations protect their most sensitive data


Episode Resources:


Data Security Decoded is handcrafted by our friends over at: fame.so