DiscoverPhillip Wylie Show
Phillip Wylie Show
Claim Ownership

Phillip Wylie Show

Author: Phillip Wylie

Subscribed: 32Played: 1,315
Share

Description

The Phillip Wylie Show is a premier cybersecurity podcast and media source for offensive security professionals. Hosted by Phillip Wylie, globally recognized ethical hacking expert, keynote speaker, and co-author of The Pentester Blueprint, the show features elite red team operators, penetration testers, and security leaders sharing real-world tradecraft, advanced tactics, career strategy, and insights on AI-driven cyber threats.
192 Episodes
Reverse
In this episode of The Phillip Wylie Show, host Phillip Wylie sits down with offensive security professional Jamy Casteel to discuss his journey from small-town IT technician to penetration tester and red teamer. Jamy shares how an early exposure to social engineering and physical pentesting sparked his interest in security and shaped his career path.The conversation explores the differences between pentesting and red teaming, the value of consulting experience, and why understanding business risk is just as important as technical skill. Jamy also shares his thoughts on certifications versus real-world experience, the emerging role of AI in security testing, and why cybersecurity professionals should develop interests outside of technology to maintain balance and mental clarity.This episode offers practical advice for aspiring cybersecurity professionals along with insights into how offensive security continues to evolve.========================= Connect with Jamy Casteel:LinkedIn: https://www.linkedin.com/in/jamy-casteel========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode of the Phillip Wylie Show, host Phillip Wylie sits down with cybersecurity professional Travis Stein to discuss practical strategies for breaking into cybersecurity, building technical skills, and advancing from IT into security roles. Travis shares his journey from help desk roles into cybersecurity engineering and offers actionable advice for aspiring professionals looking to stand out in a competitive field.The conversation highlights the importance of hands-on experience, networking, home labs, certifications, and building a personal portfolio to demonstrate real-world skills. Travis also discusses how soft skills like communication and presentations can accelerate career growth and open new opportunities.========================= Connect with Travis Stein:LinkedIn: https://www.linkedin.com/in/twstein86/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode, Phillip Wylie sits down with Dr. Gregory Carpenter to explore his journey from early childhood curiosity to a distinguished career in cybersecurity, military operations, and advanced threat modeling. Greg shares how his early interest in security evolved from physical lockpicking and unconventional problem solving into work involving digital security, NSA operations, and space-related missions.The conversation dives into what effective threat modeling really looks like and why too many security assessments fail to account for real-world conditions. Greg explains the importance of looking beyond traditional network boundaries to include physical access, RF exposure, social engineering, environmental conditions, and human behavior. He also discusses the limits of narrowly scoped pen tests and why deeper, more realistic engagement is critical for understanding how attackers actually operate.Phillip and Greg also examine the growing role of AI and automation in offensive security. Greg shares his perspective on how AI can improve security assessments, where automation adds value, and why creativity and adaptability still matter just as much as tools. They also cover dynamic defenses, deception, critical infrastructure risk, and how organizations can use intelligence sources such as MITRE, DOD, FBI, and DHS to strengthen their defensive strategies.========================= Connect with Gregory Carpenter:LinkedIn: https://www.linkedin.com/in/gcarpenter-cso-kbi/ Gregory's book: https://www.amazon.com/Reverse-Deception-Organized-Counter-Exploitation-McGraw-Hill/dp/B00E6T3VRA/ ========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylie X: https://x.com/PhillipWylie Instagram: https://www.instagram.com/phillipwylie
Allie Mellen: Code War

Allie Mellen: Code War

2026-03-1028:55

In this episode of the Phillip Wylie Show, Allie Mellen shares her journey from a computer engineering student to a cybersecurity expert and industry analyst. She discusses the importance of hands-on experience in cybersecurity, the evolution of cybersecurity tools, and the significance of a hacker mindset. Allie also emphasizes the need for clear communication in cybersecurity for non-technical audiences and provides advice on selecting cybersecurity products. Additionally, she introduces her new book, 'Code Nations,' which explores the intersection of cybersecurity and geopolitics, highlighting the impact of global events on cyber warfare strategies.========================= Connect with Allie Mellen:LinkedIn: https://www.linkedin.com/in/hackerxbella/ Allie's book: https://www.amazon.com/dp/1394285574========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Eve Maler, a prominent figure in identity security. They discuss the importance of community in cybersecurity, Eve's journey into the field, the evolution of identity technologies like SAML and OAuth, advancements in authentication methods, and the impact of AI on identity management. Eve also shares insights from her upcoming book on digital identity, emphasizing the need for a user-centric approach to security.========================= Connect with Eve Maler:LinkedIn: https://www.linkedin.com/in/evemaler/Eve's book: https://masteringdigitalidentity.com/Website: https://www.vennfactory.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode, Sudhanshu Chauhan discusses the transformative impact of AI on the cybersecurity landscape. He explains how AI has introduced new attack vectors and the dual nature of AI in cybersecurity, serving both as a tool for attacks and as a target for attacks. The conversation emphasizes the need for security professionals to adapt to these changes and explore innovative approaches to penetration testing and security measures.========================= Connect with Sudhanshu Chauhan:LinkedIn: https://www.linkedin.com/in/sudhanshuchauhanWebsite: https://redhuntlabs.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode of the Phillip Wylie Show, Dorota Kozlowska shares her inspiring journey from a hesitant high school student to a successful professional in offensive security and content creation. She discusses her challenges in breaking into the male-dominated field of cybersecurity, her passion for pen testing, and her commitment to empowering other women in tech through her podcast, 'The Woman in Red.' Dorota emphasizes the importance of personal branding, continuous learning, and the courage to pursue one's dreams despite obstacles. ========================= Connect with Dorota Kozlowskahttps://www.linkedin.com/in/dorota-kozlowska/https://www.woman-in-red.com/https://www.youtube.com/@womaninredpresents========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity expert Keelan Knox, who shares his fascinating hacker origin story. Keelan recounts his early curiosity about technology, which led him to dismantle various devices and eventually discover the world of hacking and cybersecurity. He emphasizes the importance of social engineering in the field and how it became a natural skill for him. The conversation delves into Keelan's educational background, his diverse roles in cybersecurity, and the significance of networking in building a successful career in the industry.As the discussion progresses, Keelan offers valuable advice for aspiring cybersecurity professionals, highlighting the importance of understanding one's interests and strengths. He shares insights on how to effectively communicate technical concepts to non-technical stakeholders, emphasizing that cybersecurity should complement business objectives. The episode wraps up with Keelan discussing his ongoing learning methods, including hands-on practice in home labs and engaging with the cybersecurity community at conferences. This episode is a treasure trove of insights for anyone interested in pursuing a career in cybersecurity or enhancing their skills in the field.========================= Connect with Keelan Knoxhttps://www.linkedin.com/in/mrkknox/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
In this episode of The Phillip Wylie Show, Phillip Wylie sits down with Michael Farnum and Sam Van Ryder to discuss the growth of CYBR.SEC.Community, formerly known as HOU.SEC.CON. They share their hacker origin stories and how a grassroots conference evolved into a national, community-driven cybersecurity movement.The conversation covers the expansion of CYBR.SEC.Community to include OT.SEC.CON, EXEC.SEC.CON, YOUTH.SEC.CON, CYBR.HAK.CON, and CYBR.SEC.Media, the community’s media platform focused on education, storytelling, and amplifying voices across the cybersecurity ecosystem. The episode highlights accessibility, youth and veteran involvement, bridging IT and OT security, and why curiosity and real-world experience remain essential to building the future of cybersecurity.========================= Connect with Michael Farnum and Sam Van Ryder:https://www.linkedin.com/in/mfarnum/https://www.linkedin.com/in/svanryder/CYBR.SEC.Community Links:https://www.cybrsec.community/https://www.cybrseccon.com/https://www.otseccon.com/https://www.cybrsec.community/execsecconhttps://www.cybrhakcon.com/https://www.cscusergroup.com/https://www.cybrsecmedia.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie/=========================
In this episode of the Phillip Wylie Show, host Phillip’s guest is Travis Weathers, a seasoned professional in cybersecurity and penetration testing. Travis shares his unique journey from military service to becoming a successful entrepreneur in the cybersecurity field. He discusses the importance of specialized training, the differences between red teaming and traditional pen testing, and offers valuable advice for those looking to advance their careers in cybersecurity. The conversation also touches on the role of AI in the industry and the innovative tools being developed for physical pen testing.This episode is sponsored by Teleport, an identity-first security platform. Learn more: https://fandf.co/4p98SC6========================= Connect with Travis Weathers:https://www.linkedin.com/in/trweathers/https://mwgroup.io/https://vtemlabs.com/========================= Connect with your host, Phillip Wylie: LinkedIn: ⁠https://linkedin.com/in/phillipwylie⁠X: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie/=========================Chapters00:00 Introduction and Guest Background01:32 Travis Weathers' Hacker Origin Story05:31 Transitioning to Business Ownership09:33 Training and Course Offerings13:01 Advice for Aspiring Pen Testers18:17 Understanding Red Teaming vs. Pen Testing21:50 Career Advancement Strategies24:40 The Role of AI in Cybersecurity27:31 Teleport Ad30:09 Phillip Wylie Show Outro
SummaryIn this episode of the Phillip Wylie Show, Phillip welcomes Jason and Kevin from the Cyber Distortion Podcast, diving deep into their hacker origin stories and the evolution of their podcasting journey. Kevin shares his unconventional path from marketing and graphic design to IT, highlighting how a conversation about salaries led him to pursue Microsoft certifications and a long-standing career in technology. Jason recounts his early fascination with technology, from building science projects to coding on his first home computer, illustrating how his inquisitive nature laid the groundwork for his future in cybersecurity.The conversation shifts to their experiences in podcasting, detailing how their shared passion for technology and cybersecurity led them to create the Cyber Distortion Podcast. They discuss the challenges and joys of producing content, including their recent involvement in the IAM Machine documentary, which explores transhumanism and the impact of AI. As they prepare for their upcoming live event in North Texas, they emphasize the importance of community and collaboration in the tech space, inviting listeners to engage with their work and the hacker community.Connect with Kevin & Jasonhttps://twitter.com/DistortionCyberhttps://www.linkedin.com/in/jason-popillion-cissp-863a464/https://www.linkedin.com/in/kevin-pentecost-cissp-cism-ceh-cpt-mcse-cca-itil-f-4a61404/https://www.youtube.com/@TheCyberDistortionPodcasthttps://cyberdistortionpodcast.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylie YouTube: https://youtube.com/@PhillipWylie========================= Chapters00:00 Welcome and Introduction01:32 Hacker Origin Stories: Kevin's Journey03:28 Hacker Origin Stories: Jason's Journey10:24 The Transition to Podcasting14:40 Inspiration Behind the Podcast19:54 Season Five Changes and Innovations24:20 The Return of Vito28:54 Building a Virtual Personality33:03 The Art of Problem Solving33:28 Creating the IAM Machine Documentary42:12 Upcoming Events and Community Engagement
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Shubham Khichi, a cybersecurity expert and entrepreneur. They discuss Shubham's journey from a computer science student to the founder of CyberAGI, a company focused on enhancing cybersecurity through AI. The conversation covers the importance of human involvement in cybersecurity, innovative threat modeling techniques, and the role of AI in augmenting the capabilities of security professionals. Shubham emphasizes the need for privacy in AI applications and offers advice for aspiring pen testers, highlighting the significance of self-belief and continuous learning in the rapidly evolving tech landscape.This episode is sponsored by Teleport, an identity-first security platform. Learn more: https://fandf.co/4pVfIwk=========================Connect with Shubham: ⁠https://www.linkedin.com/in/shubhamkhichi⁠https://www.cyberagi.ai/=========================Connect with your host, Phillip Wylie:LinkedIn: https://linkedin.com/in/phillipwylieYouTube: https://youtube.com/@PhillipWylie=========================Chapters00:00 Introduction and Background01:55 Shubham's Hacker Origin Story04:39 The Importance of Human Element in Cybersecurity07:20 Excalibur: A Human-Centric Security Platform10:02 Building Intuitive Security Tools11:45 The Role of Experience in Cybersecurity Startups14:27 Understanding Red Teaming vs. Pen Testing19:26 Inversion Theory in Threat Modeling24:00 AI and Privacy in Cybersecurity29:17 AI's Role in Augmenting Human Work33:19 Advice for Aspiring Pen Testers34:55 Closing Thoughts and Future Outlook
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Ron Eddings, a prominent figure in cybersecurity and podcasting. They discuss Ron's journey into cybersecurity, his experiences in podcasting, and the evolution of Hacker Valley Media. The conversation delves into the importance of video and audio quality in content creation, the role of AI in cybersecurity, and the future of jobs in the industry. Ron shares insights on tools for penetration testing and the impact of AI on traditional cybersecurity roles, emphasizing the need for professionals to adapt and future-proof their careers in an AI-driven landscape.TakeawaysRon Eddings shares his unique hacker origin story.The importance of storytelling in cybersecurity careers.Podcasting can be a powerful tool for sharing knowledge.Quality video and audio are crucial for engaging content.Lighting and color correction significantly impact video quality.AI is transforming the landscape of cybersecurity.Understanding AI vulnerabilities is essential for security research.Tools like Claude code and Gemini are valuable for pentesting.Future cybersecurity roles will require adaptability to AI.Positive energy and collaboration are key to job security in the AI era.Connect with Ron:https://www.linkedin.com/in/ronaldeddings/https://hackervalley.com/Connect with Phillip:LinkedIn https://www.linkedin.com/in/phillipwylie/X (formerly Twitter) https://x.com/PhillipWylieInstagram https://www.instagram.com/phillipwylie/Chapters00:00 Introduction to Cybersecurity Podcasting01:43 Ron Eddings' Hacker Origin Story04:29 The Journey into Podcasting06:33 Evolution of Hacker Valley Media08:17 Understanding Video and Audio Quality10:38 Lighting and Its Importance in Video Production12:47 Color Grading and Post-Production Techniques14:24 Marketing and Branding in Cybersecurity17:00 AI Security Research and Prompt Injection19:11 Tools for AI Pentesting22:30 AI in Traditional Pen Testing24:12 The Future of Cybersecurity with AI27:09 Job Security in the Age of AI29:18 The Importance of Education and Experience32:53 Conclusion and Future Outlook33:39 Outro
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Chris Glanden, a cybersecurity professional and podcaster. They discuss Chris's journey into cybersecurity, his experiences in podcasting, and his recent ventures into documentary filmmaking. The conversation also touches on public speaking, community engagement through events like the Lone Star Cyber Circus, and advice for aspiring podcasters. Chris shares insights on the importance of storytelling in cybersecurity and the impact of podcasts on listeners' lives.TakeawaysChris Glanden's journey into cybersecurity began after high school.He transitioned from IT to cybersecurity in 2011.Chris started his podcast during the pandemic in 2020.He has produced two documentaries focusing on cybersecurity themes.The Lone Star Cyber Circus is a community event Chris is passionate about.Public speaking was a challenge for Chris, but he has embraced it.Chris aims to create a conference for content creators in cybersecurity.He encourages aspiring podcasters to start with a clear purpose.Feedback from listeners motivates podcasters to continue their work.Community engagement is vital for personal and professional growth.Connect with Chris:https://www.linkedin.com/in/chrisglanden/https://pr0ph-1t.com/https://www.barcodesecurity.com/
SummaryIn this conversation, Gideon Rasmussen discusses the importance of understanding one's professional development areas and how to prepare for promotion. He emphasizes the need for individual contributors to demonstrate leadership and deliver solid performance over time to be considered for advancement.TakeawaysKnow what your areas of professional development are.Pursue your professional development actively.Prove yourself ready for promotion now.No one will provide a clear path to promotion.Write performance plans to guide your development.Run projects to showcase your skills.Demonstrate leadership even as an individual contributor.Aim for three to four years of solid performance.Deliver on projects consistently to advance.Seek feedback to improve your performance.Connect with Gideon:https://www.linkedin.com/in/gideonrasmussen/Gideon's book:Program Architecture: Fight the Good Fight (Security, Audit and Leadership Series) https://www.amazon.com/Program-Architecture-Fight-Security-Leadership/dp/1032896000
SummaryIn this conversation, Christopher Russell emphasizes the importance of being well-rounded in the field of cybersecurity. He discusses the necessity of understanding both offensive and defensive strategies, as well as the need for security professionals to grasp the business aspects of their roles. Russell highlights that a successful CISO must not only be technically proficient but also understand how security tools can support and enhance business operations.TakeawaysBeing well-rounded is essential in cybersecurity.A balance of offensive and defensive skills is necessary.Understanding various technologies is crucial.One must grasp how the business operates.An appetite for business knowledge is important.Security professionals should not just be cost centers.Enabling security tools can improve business areas.Tinkering and experimenting is part of the learning process.Thinking like a CISO involves business alignment.Collaboration between security and business is key.Connect with Christopher:https://www.linkedin.com/in/christopher-russell-5a9b20a7/
SummaryIn this episode of the Philip Wylie Show, host Phillip Wylie speaks with Ted Harrington, a fellow podcaster and author, about the hacker mindset and its implications in cybersecurity. They discuss the misconceptions surrounding hackers, the importance of curiosity and creativity, and how the hacker mindset can be applied beyond technology. Ted shares his personal journey into the world of hacking, the motivation behind his new book, and offers insights on building a personal brand in the cybersecurity field. The conversation concludes with a message of optimism regarding the future of cybersecurity and the role of hackers in creating a safer digital world.TakeawaysThe hacker mindset is about curiosity and creativity.Not all hackers are malicious; many are ethical.It's never too late to pivot into cybersecurity.The hacker mindset can be applied to various fields, not just tech.Building a personal brand requires authenticity and consistency.Helping others should be the primary goal of content creation.The hacker community is diverse and includes many positive contributors.Innovation and disruption are key aspects of the hacker mindset.Ted's journey illustrates that anyone can become a hacker.Optimism is essential in the face of cybersecurity challenges.Connect with Ted:https://www.tedharrington.com/https://www.linkedin.com/in/securityted/https://www.amazon.com/Inner-Hacker-New-Way-Thinking-ebook/dp/B0FQR1SWWHChapters00:00 Introduction to the Hacker Mindset04:09 Ted Harrington's Hacker Origin Story11:27 The Inspiration Behind 'Inner Hacker'16:42 Defining the Hacker Mindset20:12 Building a Personal Brand in Cybersecurity26:46 Optimism in the Security Profession
AI Won't Take Your Job - If You Learn This | Cybersecurity & Employment in the AI EraIs AI going to take your job? In this essential episode, Phillip Wylie sits down with Michael Bell, CEO and Co-founder of Suzu Labs, to dive deep into the intersection of artificial intelligence, employment security, and the future of cybersecurity. Learn why adapting to AI is crucial for your career survival and discover how to make yourself invaluable in an AI-driven workforce. From Suzu Labs' cutting-edge services to practical advice for aspiring cybersecurity professionals, Michael shares everything you need to know about thriving alongside AI technology.Whether you're a seasoned professional worried about job displacement or someone looking to break into cybersecurity, this conversation provides actionable strategies for integrating AI into your skill set and future-proofing your career.🎯 KEY TAKEAWAYS✅ AI is a tool for enhancement, not replacement✅ Focus on making yourself invaluable by integrating AI skills✅ Continuous learning is non-negotiable in the AI age✅ Human creativity and critical thinking remain irreplaceable✅ New opportunities emerge as technology evolves✅ Collaboration with AI > Competition against AI✅ Adaptability is your greatest asset✅ The future belongs to those who embrace changeConnect with Michael and Suzu Labs:https://www.linkedin.com/in/artificial-mike/https://www.linkedin.com/company/suzu-labs/https://suzulabs.com/Chapters00:00 Introduction to AI and Cybersecurity04:06 Overview of SUSE Labs and Its Services10:01 The Impact of AI on Cybersecurity14:35 The Future of Offensive Security20:19 AI's Role in Job Security23:10 The Importance of the Human Element in AI25:04 Advice for Aspiring Cybersecurity Professionals26:56 Starting Your Own Business in Cybersecurity30:06 Phillip Wylie Show Outro Video.mp4
Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Alyse Zavala, a cybersecurity professional and rock band vocalist. They discuss the importance of having hobbies outside of work, Alyse's journey from IT to offensive security, and her experiences in the music industry. Alyse shares valuable advice for aspiring penetration testers, insights into exploitdevelopment, and the challenges of balancing her dual careers. The conversation also touches on work-life balance, burnout prevention, and upcoming projects inboth cybersecurity and music. Takeaways  It's important to have interests outside ofcybersecurity.  Alyse's journey began in IT and evolved intooffensive security.     Hands-on experience is crucial for aspiringpenetration testers. Certifications like OSCP are more valuable thana degree. Alyse emphasizes the importance ofscenario-based interview questions. She started a rock band to explore her passionfor music. The band recorded with notable producers andgained significant views on their music video. Meditation has helped Alyse manage stress andimprove focus. Balancing work and music is challenging butrewarding. Alyse is excited about upcoming projects in bothcybersecurity and music. Sound Bites   "It's important to disconnect for abit."  "I started specializing in malwareextraction."  "I convinced them to let us start pentesting." Chapters 00:00 Introduction and Connection06:03 Alyse's Hacker Origin Story12:54 Career Development and Opportunities21:00 Advice for Aspiring Pen Testers30:00 Balancing Music and Cybersecurity Career40:24 Work-Life Balance and Burnout Management48:14 Closing Thoughts and Future Plans Resourceshttps://x.com/Bellebyteshttps://lylvc.com/https://linktr.ee/lylvc
SummaryIn this episode of the Philip Wylie Show, Bat shares her journey from a childhood fascination with computers to a career in cybersecurity, specifically in threat hunting. Bat discusses her early experiences with hacking, the transition from wanting to be a pen tester to discovering a passion for digital forensics, and the day-to-day responsibilities of a threat hunter. The conversation also touches on the importance of education, certifications, and the evolving role of AI in cybersecurity.TakeawaysBat emphasizes the importance of privacy in their work.The journey into hacking often starts from a young age.Career paths in cybersecurity can vary widely.Exploring different disciplines can lead to fulfilling careers.Threat hunting involves a lot of research and documentation.AI is becoming more integrated into cybersecurity roles.Hands-on experience is crucial for success in threat hunting.Certifications can be beneficial but are not always necessary.Education in cybersecurity can be outdated and expensive.Defensive security roles are essential for protecting systems.Connect with Bat:https://x.com/batloggedChapters00:00 Introduction to the Guest and Their Background01:29 Bat's Hacker Origin Story05:14 Career Path and Transition to Cybersecurity10:14 Exploring Different Areas in Cybersecurity12:24 Day-to-Day in Threat Hunting17:49 Leveraging AI in Threat Hunting19:28 Training and Experience for Threat Hunting21:32 The Importance of Building Narratives in Security24:07 Certifications and Their Value27:12 The Value of Formal Education vs. Self-Study29:06 Closing Thoughts on Defensive Security
loading
Comments 
loading