In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements.TIMESTAMPS:00:00 - Introduction to Cybersecurity Journey03:23 - The Path to OSCP Certification06:13 - Transitioning to Consulting in Cybersecurity09:14 - Understanding Client Needs in Cybersecurity11:56 - Leadership in Red Team Village14:32 - NCAE Cyber Games and CTF Design17:26 - Creating Effective CTF Challenges20:04 Resources for Aspiring CTF Participants22:57 Content Development for Cybersecurity Education25:49 Unique Experiences in Cybersecurity Events28:25 Closing Thoughts and Future Engagements SYMLINKS:[Maltek Solutions Website] - https://malteksolutions.com/A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi.[Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends.[Red Team Village (RTV) Website] - https://redteamvillage.ioA nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences.[Red Team Village Discord] - https://discord.com/invite/redteamvillageThe official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities.[Red Team Village X (Twitter)]- https://twitter.com/redteamvillage_RTV's official social media account for announcements, event updates, and cybersecurity-related discussions.[MetaCTF Website] - https://metactf.comA platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges.[CTF Time Website] - https://ctftime.orgA website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors.[Hack The Box Website] - https://www.hackthebox.comA cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills.[TryHackMe Website] - https://tryhackme.comAn interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners.CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com
Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape.Derek Fisher is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today.In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children's books and shares insights on future trends like robotics and quantum computing.TIMESTAMPS:00:00 Introduction to Cybersecurity and Derek Fisher's Background10:09 The Impact of AI and Cloud on Cybersecurity19:19 Understanding Threat Modeling in Cybersecurity27:47 Navigating the Security Hiring Process35:48 Navigating the Job Market in Cybersecurity36:40 Breaking into Cybersecurity: Finding Your Path44:16 Bridging the Gap: Academia vs. Industry47:24 Inspiring the Next Generation: Writing for Kids50:46 The Challenges of Parenting in a Digital Age54:08 Future Trends in Cybersecurity and Technology56:52 Creating a Cybersecurity-Themed Bar: A Fun ConceptSYMLINKS:[Derek Fisher's LinkedIn Profile ]- https://www.linkedin.com/in/derek-fisher-sec-archConnect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity.[Securely Built Website] - https://www.securelybuilt.com/Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. [Secure Work Coach] - https://www.secureworkcoach.com/aboutAccess specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering [Derek Fisher's Udemy Instructor Profile] - https://www.udemy.com/user/derek-fisher-8/Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation.[Ultimate Cybersecurity Course & CISSP Exam Prep] - https://www.udemy.com/course/ultimate-cyber-security-course/Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher.[The Application Security Program Handbook] - https://www.securelybuilt.com/mediaLearn about building an application security program through this comprehensive guide authored by Derek Fisher.[Alicia Connected Series ] - https://www.aliciaconnected.com/Discover the "Alicia Connected" children's book series by Derek Fisher, focusing on safe technology usage for kids.[Securely Built YouTube Channel] - https://www.youtube.com/@securelybuiltWatch cybersecurity tutorials and discussions on the Securely Built YouTube channel.[Derek Fisher's Articles on SecureWorld News] - https://www.secureworld.io/industry-news/author/derek-fisherRead articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.
In this conversation, Perry Carpenter discusses the evolution of misinformation and disinformation in the age of AI and deepfakes. He explores the psychological principles that make individuals susceptible to deception, the ongoing arms race between detection and deception, and theregulatory landscape surrounding these issues. Carpenter emphasizes the importance of understanding narratives and cognitive biases in combating misinformation while also highlighting the challenges posed by rapidlyadvancing technology. In this conversation, Perry Carpenter discusses the implications of deepfakes and AI in cybersecurity, emphasizing the concept ofthe liar's dividend, the need for cognitive awareness training, and the ongoing arms race between AI-generated deception and truth verification. He highlights the erosion of trust in media and the necessity of understanding themotivations behind AI-generated content. Carpenter also shares insights on the future of deepfakes, ethical challenges, and the importance of focusing on the'why' behind AI technologies. TIMESTAMPS:00:00 Introduction to Perry Carpenter and His Work02:37 The Evolution of Misinformation and Disinformation06:42 The Arms Race: Detection vs. Deception12:00 The Impact of Deepfakes on Society17:41 Psychological Principles Behind Deepfakes23:16 Regulatory Landscape and Future Implications34:59 The Liar's Dividend and Its Implications36:09 Defending Against AI-Powered Threats40:06 The Arms Race of AI and Cybersecurity46:17 Erosion of Trust in Media52:38 The Future of Deepfakes and Society57:38 Understanding the Why Behind AI and Deception SYMLINKS:[LinkedIn – Perry Carpenter Profile] - https://www.linkedin.com/in/perrycarpenter/Perry Carpenter’s professional LinkedIn profile details his background in cybersecurity, his work on AI-generated deception, and his industry engagements. It serves as a hub for networking and accessing more informationon his projects.[X (formerly Twitter) – Perry Carpenter Profile] - https://x.com/perrycarpenter?lang=enPerry Carpenter’s profile on X is where he shares real-time insights, commentary on cybersecurity trends, and updates related to his work in AI and digital deception. [Perry Carpenter’s Book “FAIK”] - https://www.thisbookisfaik.com/This global retailer offers Perry Carpenter’s book, Fake:A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deception, which explores modern digital deception andcybersecurity.[YouTube – The Fake Files Channel] - https://www.youtube.com/@theFAIKfilesYouTube hosts Perry Carpenter’s channel, “The Fake Files,” where he shares AI tutorials, deepfake detection tips, and cybersecurity insights related to synthetic media.
In this engaging conversation, Chris Glanden interviews Mariano Mattei, VP of Cybersecurity and AI at Azure Solutions. Mariano shares his extensive background in software engineering and cybersecurity, emphasizing the importance of metrics in communicating security risks to executive teams. He discusses the challenges organizations face in quantifying security effectiveness and adapting metrics to the rapidly evolving threat landscape, particularly with the rise of AI. The conversation also e...
In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understandin...
Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stan...
In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking,...
In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on secu...
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of...
Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Secur...
SESSION TITLE: BCP LIVE on Rendezvous Yacht II RECORDED: 9/26/24 VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/ LOCATION: Philadelphia, PA GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia SPONSOR: Philly Tech Council ABOUT GUESTS: Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previousl...
Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she share...
Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era. Len shares his personal and professional evolution, describing...
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub. The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From ...
A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements. We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation. TIMESTAMPS: 00:16:00 - Nav...
Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust. The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, ...
Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecu...
SESSION TITLE:WiCys Delaware Valley Career Fair II RECORDED: 4/25/24 VENUE: Chestnut Hill College - www.chc.ed LOCATION: Philadelphia, PA GUEST: Job Seekers, Hiring Organizations, and Recruiters SPONSOR: WiCys Delaware Valley - LinkedIn Page ABOUT WICYS AND GUESTS: WiCys Delaware Valley - A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their ...
Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflo...
Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understanda...