DiscoverPhillip Wylie Show
Phillip Wylie Show
Claim Ownership

Phillip Wylie Show

Author: Phillip Wylie

Subscribed: 24Played: 1,194
Share

Description

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
166 Episodes
Reverse
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Casey Camilleri about the evolution of offensive security, the importance of continuous penetration testing, and the role of automation and AI in the cybersecurity landscape. They discuss Casey's hacker origin story, the shift in mindset required for modern security practices, and provide advice for aspiring penetration testers. The conversation emphasizes the need for continuous learning and adaptation in the ever-changing field of cybersecurity.Connect with Casey!https://www.linkedin.com/in/caseycammilleri/https://www.sprocketsecurity.com/Chapters00:00 Introduction and Equipment Enthusiasm02:12 The Hacker Origin Story05:03 Evolution of Penetration Testing07:33 Continuous Penetration Testing and Automation10:29 The Role of AI in Pen Testing13:03 Challenges in Application Pen Testing15:37 Mindset Shift in Cybersecurity18:31 Advice for Aspiring Pen Testers21:21 Closing Thoughts on Continuous Security
SummaryIn this episode of the Phillip Wylie Show, Jennifer Leggio shares her insights on personal branding, the evolution of marketing in cybersecurity, and the importance of community engagement. With a rich background in cybersecurity marketing, Jennifer discusses her journey from journalism to becoming a key player in the cybersecurity community. She emphasizes the need for marketers to understand the technical aspects of their products and the significance of authentic content creation. The conversation also touches on resilience in the face of career challenges and the importance of mental health in the industry.Chapters00:00 Introduction and Personal Branding04:02 Jennifer Leggio's Origin Story06:58 Building Personal Brands10:09 The Importance of Technical Understanding in Marketing13:04 Evolution of Marketing in Cybersecurity15:53 Content Creation and Its Value18:53 Influencer Marketing and Subject Matter Expertise22:01 The Challenges of Faking Expertise25:06 Resilience in Cybersecurity Careers28:09 Mental Health and Personal Growth31:00 Closing Thoughts and Community SupportConnect with Jennifer!https://www.linkedin.com/in/jenniferleggio/https://x.com/mediaphyter
Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Kat Cozgrove, a developer advocate and Kubernetes maintainer. They discuss Kat's journey into technology, her hacker origin story, and her transition from software engineering to developer advocacy. Kat shares insights on getting started with Kubernetes, the importance of open source contributions, and the value of networking and community engagement. They also touch on misconceptions about sales roles, the benefits of attending smaller conferences, and the significance of kindness in the open source community.Chapters00:00 Introduction 04:03 Kat's Hacker Origin Story06:59 Career Path in Technology09:50 Transition to Developer Advocacy13:00 Getting Started with Kubernetes15:52 The Importance of Community and Networking19:04 Career Evolution and Opportunities22:07 The Value of Learning to Code25:09 Exploring Non-Traditional Career Paths28:10 The Role of Sales in Tech31:08 Conferences and Community Engagement33:51 Closing Thoughts and Open Source AdvocacyConnect with Kat!https://www.linkedin.com/in/katcosgrove/https://bsky.app/profile/kat.lol
**"In this inspiring cybersecurity conversation, Filipi Pires reflects on his decade-long journey in the industry, sharing lessons on patience, persistence, and embracing your personal career path. He discusses the realities of professional growth, the importance of continuous learning, and why comparing yourself to others can hold you back. Perfect for aspiring ethical hackers, penetration testers, and anyone navigating the cybersecurity career landscape."**Timestamps:00:00 Introduction02:15 Filipi’s career beginnings07:40 Lessons from a decade in cybersecurity12:30 The importance of patience and persistence17:55 Overcoming self-comparison23:10 Career advice for aspiring professionalsConnect with Filipi Pires:🔗 LinkedIn: https://www.linkedin.com/in/filipipires/🔗 Twitter/X: https://x.com/FilipiPiresFollow The Phillip Wylie Show:🎙 Podcast: https://phillipwylieshow.com📺 YouTube: https://www.youtube.com/c/phillipwylie🔗 Website: https://thehackermaker.com
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Alethe Denis from Bishop Fox, exploring her journey into hacking, the significance of social engineering in cybersecurity, and the evolving landscape of phishing and red teaming. Alethe shares her unique origin story, insights into the importance of real phishing engagements, and creative methods for gaining access during physical pen tests. The conversation also touches on the ethical implications of social engineering, the challenges posed by increasing security awareness, and valuable advice for aspiring security professionals.TakeawaysAlethe's journey into hacking began with an interest in social engineering as a child.The evolution of hacking has always involved human manipulation.Real phishing engagements provide a more accurate assessment of security posture.Red teaming is essential for testing security assumptions and controls.Physical pen testing requires creative strategies to gain access.Voice phishing techniques are becoming increasingly sophisticated.Security awareness training is improving, but challenges remain.Ethical considerations are crucial in social engineering practices.AI is being misused to create fake explicit images for extortion.Networking and community engagement are vital for career growth in cybersecurity.Connect with Alethe! https://www.linkedin.com/in/alethe/https://alethedenis.com/Chapters00:00 Introduction and Background02:29 Alethe's Hacker Origin Story06:40 The Evolution of Hacking and Social Engineering08:11 Role of Social Engineering in Red Teaming10:23 The Importance of Realistic Phishing Engagements13:42 Physical Pen Testing and Access Strategies16:15 Creative Methods for Gaining Access20:03 Voice Phishing Techniques and Challenges22:56 Navigating Social Engineering and Security Awareness28:02 The Evolution of Scams and Manipulation Techniques32:43 Career Pathways in Cybersecurity40:31 Balancing Offensive and Defensive Security Roles
SummaryIn this episode, Phillip Wylie interviews Damien Burks, who shares his journey from aspiring video game developer to a successful career in cybersecurity and cloud technologies. Damien discusses his hacker origin story, the importance of cloud computing, and the differences between major cloud service providers like AWS, Google Cloud, and Azure. He emphasizes the significance of scripting languages, particularly Python, in cloud engineering and offers advice for those looking to enter the field. Additionally, Damien talks about his community-building efforts through the DevSec Blueprint and the impact of content creation on his career.TakeawaysDamien started his journey in cybersecurity through a college club.He emphasizes the importance of cloud technologies in modern IT.AWS is seen as a more mature cloud provider compared to others.Scripting, especially in Python, is crucial for cloud engineering.Content creation can significantly enhance career opportunities.The DevSec Blueprint aims to guide aspiring DevSecOps professionals.Community engagement is vital for learning and growth in tech.Damien encourages starting content creation with what feels comfortable.Google Cloud is praised for its user-friendly interface.Continuous learning and certification are essential in tech careers.Connect with Damien Burks:LinkedIn: https://www.linkedin.com/in/damienjburks/X/Twitter: https://x.com/damienjburksDevSec Blueprint: https://www.devsecblueprint.com/YouTube: https://www.youtube.com/@damienjburks
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Ryan Williams, the publisher of HVCK Magazine. They discuss the importance of networking within the cybersecurity community, the evolution of content creation, and the aesthetic of cybersecurity media. Ryan shares his journey into cybersecurity, the creative process behind HVCK Magazine, and the role of AI in art. They also delve into offensive security practices, advice for aspiring professionals, and the significance of pro bono initiatives in making a positive impact in the community.TakeawaysNetworking is crucial in the cybersecurity community.Content creation can take many forms beyond video.Cybersecurity media can be visually appealing and engaging.Conferences should focus on networking and real connections.Starting a magazine can help build connections in a new industry.AI can enhance creative processes, but should be used ethically.Foundational knowledge in programming and systems is essential for security professionals.Pro bono work can help develop soft skills and give back to the community.Small, focused conferences can foster better networking opportunities.Passion for the field is key to success in cybersecurity.Connect with Ryan! LinkedIn: https://www.linkedin.com/in/ryan-williams-4068351b8/HVCK eZine: https://heyzine.com/flip-book/cd19181153.htmlHVCK eZine back issues: https://hvck-magazine.github.io/Chapters00:00 Introduction to the Phillip Wylie Show and Guests02:50 Networking in the Cybersecurity Community05:30 Content Creation in Cybersecurity08:10 The Aesthetic of Cybersecurity Media11:17 The Evolution of Cybersecurity Conferences13:46 The Journey to Starting HVCK Magazine16:22 The Creative Process Behind HVCK Magazine18:51 The Role of AI in Creative Work21:36 Offensive Security and Cybersecurity Practices24:26 Advice for Aspiring Offensive Security Professionals26:53 Pro Bono Initiatives in Cybersecurity29:50 Closing Thoughts and Future Endeavors
SummaryIn this engaging conversation, Phillip Wylie and Jessica Hoffman discuss the importance of community in cybersecurity, sharing insights on networking, hiring practices, and the value of volunteering. Jessica shares her hacker origin story and emphasizes the need for soft skills in the industry. They also explore the significance of mentorship and leadership in advancing careers within cybersecurity, encouraging individuals to seek connections and support in their professional journeys.TakeawaysNetworking is essential for success in cybersecurity.Community involvement can significantly enhance career opportunities.Hiring managers should prioritize skills and initiative over degrees.Volunteering can open doors and create valuable connections.Soft skills are crucial for effective communication in cybersecurity roles.Mentorship is vital for personal and professional growth.Imposter syndrome is common; everyone experiences it.A diverse network of mentors can provide guidance and support.Being proactive and showing up can lead to unexpected opportunities.Leadership in cybersecurity requires emotional intelligence and support for team members.Sound bites"Networking is your secret weapon.""Forget about the college, right?""You should have a gang gang of mentors."Chapters00:00 Community Connections in Cybersecurity02:10 Jessica Hoffman's Hacker Origin Story05:08 The Importance of Networking and Community08:44 Hiring Insights: Skills Over Degrees11:53 Volunteering: A Pathway to Career Advancement15:43 Building a Supportive Network18:27 The Role of Soft Skills in Cybersecurity22:17 Leadership and Mentorship in CybersecurityConnect with Jessica! https://www.linkedin.com/in/jessica-hoffman-cissp/
Episode OverviewJoin host Phillip Wylie as he interviews Matt Brown, a cybersecurity professional, hardware hacker, and successful YouTuber who has grown from zero to over 100,000 subscribers in just two years. This episode dives deep into hardware security, IoT penetration testing, content creation strategies, and the future of cybersecurity careers in the age of AI.Guest BioMatt Brown is a cybersecurity professional specializing in hardware hacking and IoT security. He's the creator of a popular YouTube channel focused on unedited, real-time hardware hacking tutorials. Matt has experience in offensive security, bug bounty hunting, and has won multiple live hacking events, including competitions hosted by Amazon. He holds degrees in IT and computer engineering with a focus on information assurance.Key Topics CoveredHardware Security & IoT HackingGetting started in hardware hacking without expensive equipmentEssential tools and techniques for IoT penetration testingMicrocontroller vs. Linux-based device securityHardware security conference insights from Hardwear.io USAThe growing demand for hardware security professionalsContent Creation SuccessHow Matt grew from 0 to 100K+ YouTube subscribers in 2 yearsThe power of unedited, mistake-inclusive contentEquipment setup for hardware hacking videosMonetization through bug bounty opportunitiesBuilding authentic connections with technical audiencesCareer DevelopmentBreaking into offensive security and penetration testingThe value of diverse technical backgrounds (sysadmin, development, blue team)Academic vs. self-taught paths in cybersecurityWhy communication skills are crucial for pen testersJob market opportunities in hardware securityAI and the Future of CybersecurityHow AI tools can enhance rather than replace security professionalsUsing AI for reconnaissance and information gatheringThe importance of critical thinking when using AI toolsCareer advice for staying relevant in an AI-driven worldHacker Origin StoryMatt's journey began in junior high with an electronics and soldering class - an opportunity he notes many people don't have today. His first real introduction to hacking came through a YouTube video demonstrating WEP cracking using a bootable Linux CD. This experience of seeing his home network's Wi-Fi password decrypted sparked his passion for cybersecurity.Connect with Matt BrownYouTube Channel: https://www.youtube.com/ ⁨@mattbrwn⁩ LinkedIn: https://www.linkedin.com/in/mattbrwn/Website: https://brownfinesecurity.com/
SummaryIn this engaging episode of "The Phillip Wylie Show," host Phillip Wylie welcomes cybersecurity expert Matthew Toussain. Known for his extensive history in the cybersecurity field, Matt opens up about his unconventional career path, from aspiring to be an Air Force lawyer to developing a passion for cybersecurity. This episode covers a multitude of insights into the world of offensive security, open-source development, and vulnerability management, all backed by Matt's diverse experiences and successes in the cybersecurity landscape.Throughout the episode, Matt shares invaluable advice for those entering the offensive security field, highlighting the importance of contributing to open-source projects and understanding key programming languages. He elaborates on his project, SeriousScan, an open-source vulnerability scanner aimed at providing affordable security solutions for mid-cap firms. Discussing the evolving landscape of cybersecurity, Matt emphasizes the impact of artificial intelligence on security practices and development, shedding light on modern strategies to secure environments against potential threats. Listeners are treated to an in-depth look at the significance of vulnerability management and how organizations can optimize their cybersecurity efforts.Takeaways: The advanced capabilities of modern AI tools enable them to understand programming languages like TypeScript, Golang, and Python significantly better than others. The podcast discusses the importance of vulnerability management, emphasizing that organizations must actively manage vulnerabilities to prevent exploitation. Penetration testing provides a crucial opportunity to not only identify vulnerabilities but also to understand the context and potential risks associated with them. Listeners are encouraged to leverage real-world examples and case studies to justify security budgets and improve vulnerability management programs. The conversation highlights the significance of hands-on experience and practical application in learning cybersecurity skills, particularly through capture-the-flag competitions. The necessity of open-source contributions is reiterated as a vital avenue for aspiring cybersecurity professionals to demonstrate their skills and commitment to the field.Resources:https://www.linkedin.com/in/matthew-toussain/https://www.linkedin.com/company/open-security/https://opensecurity.com/https://sirius.publickey.io/
SummaryIn this episode of the Phillip Wylie Show, Kevin Woods from GuidePoint Security shares his unique journey into cybersecurity, emphasizing the importance of community support, hands-on experience, and investing in entry-level talent. He discusses the various paths one can take in the cybersecurity field, the value of certifications, and the role of education in preparing individuals for careers in this industry. The conversation highlights the need for companies to take risks on junior talent and the significance of providing opportunities for growth and development in cybersecurity.Takeaways• Kevin Woods transitioned from a biology background to cybersecurity through military service.• Community support plays a crucial role in career development in cybersecurity.• Investing in entry-level talent can yield long-term benefits for companies.• Hands-on experience is essential for success in cybersecurity roles.• There are various paths in cybersecurity beyond just pen testing.• Certifications can help demonstrate foundational knowledge to employers.• Boot camps can be beneficial, but research is necessary to find quality programs.• Passion for cybersecurity can be showcased through personal projects and contributions.• Companies need to take risks on junior talent to address the skills gap in the industry.• Education must evolve to meet the demands of the cybersecurity landscape.Sound Bites"Education is key for our success.""We have to invest in people."Chapters00:00 Introduction to Cybersecurity Journeys02:28 Kevin's Unique Path to Cybersecurity05:27 The Importance of Community and Support07:50 Investing in Entry-Level Talent09:47 The Role of Education in Cybersecurity11:05 Exploring Different Cybersecurity Roles13:13 Hands-On Experience vs. Theory17:17 Finding Your Passion in Cybersecurity20:01 Showcasing Skills on LinkedIn21:46 The Value of Certifications23:48 Boot Camps: Pros and Cons27:25 Encouraging Risk-Taking in Hiring29:21 The Future of Cybersecurity CareersResourceshttps://www.linkedin.com/in/krwoods/
The Phillip Wylie Show episode featuring John Rodriguez from Cyber Dagger:🔍 Episode Summary:In this episode of The Phillip Wylie Show, cybersecurity expert John Rodriguez, founder of Cyber Dagger, shares his inspiring journey from the military to launching a cybersecurity company. John dives into the critical challenges faced by educational institutions and nonprofits, the growing threat of ransomware, and why a holistic security strategy is vital. He emphasizes the power of mentorship, community service, and continuous hands-on learning in shaping the next generation of cybersecurity professionals. This conversation is packed with real-world insights, career tips, and practical approaches to improving cyber defenses.✅ Key Takeaways:Giving back through cybersecurity strengthens communities and builds talent pipelines.Diverse backgrounds, like military service, offer valuable skills for cyber careers.Schools and nonprofits are prime targets for ransomware and must prioritize security.Mentorship and guidance are essential to developing future cyber leaders.Adversarial thinking is crucial for effective red teaming and threat response.Building in-house tools and platforms can greatly improve cyber resilience.Don’t rush—take time to master the fundamentals and stay curious.🎧 Memorable Sound Bites:"It's important that we stay together.""Don't rush through it.""Leave it better than what you found it."🕒 Episode Chapters:00:00 – Intro to John Rodriguez & Cyber Dagger02:22 – From Military to Cybersecurity04:45 – Mentorship's Role in Cybersecurity07:05 – Securing K–12 and Nonprofits09:31 – Ransomware Realities in Education12:16 – Why Incident Response Matters15:48 – Pen Testing vs. Incident Response18:18 – Real-World Testing in Cybersecurity21:38 – Role of EDR & Security Platforms24:53 – Military Influence on Cyber Strategy27:49 – Holistic Security: Why It Matters31:05 – Building In-House Security Tools36:09 – Career Advice for Aspiring Pros41:15 – The Power of Mentorship & Community🔗 Resources & Links:Connect with John Rodriguez: LinkedInLearn more about Cyber Dagger: Website | LinkedIn
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Dan DeCloss, founder of PlexTrac, about his journey in cybersecurity, the evolution of pen testing, and the challenges faced in the industry. Dan shares his hacker origin story, insights on recruiting talent, and the inspiration behind PlexTrac, a tool designed to streamline the pen testing reporting process. They discuss the future of cybersecurity, including the role of AI and the importance of community engagement in recruiting talent.Takeaways• Dan DeCloss has over 20 years of experience in cybersecurity.• PlexTrac aims to simplify the pen testing reporting process.• Networking is crucial for breaking into cybersecurity.• BSides events are great for recruiting talent.• The cybersecurity landscape has evolved significantly over the years.• AI is becoming increasingly important in cybersecurity tools.• Pen testing is not just about finding vulnerabilities but also about effective reporting.• Community engagement is vital for talent acquisition in cybersecurity.• PlexTrac was inspired by the challenges of report writing in pen testing.• The future of PlexTrac includes enhanced features and AI integration.Sound Bites"I feel like we truly helped the industry.""AI is going to help our customers.""We do have a free trial."Chapters00:00 Introduction to PlexTrac and Dan DeCloss03:01 Dan's Hacker Origin Story07:19 Evolution of Cybersecurity and Pen Testing13:39 Types of Pen Testing and Experience16:31 Advice for Aspiring Pen Testers20:33 Recruiting Talent in Cybersecurity23:13 Inspiration Behind PlexTrac30:10 Future Roadmap for PlexTracResourceshttps://www.linkedin.com/in/ddecloss/https://www.linkedin.com/company/plextrac/Try PlexTrac Core for Free
SummaryIn this episode of the Phillip Wylie Show, Ashley Sequeira shares her journey into cybersecurity, discussing her new role at Census, her hacker origin story, and the importance of community and networking in the field. She provides valuable advice for those looking to break into cybersecurity, emphasizing the need for persistence, mentorship, and the significance of understanding the geopolitical context in security research. Ashley also delves into her research on streaming devices and the importance of community involvement in the cybersecurity space.Takeaways• Ashley started her career in music and martial arts before pivoting to IT and cybersecurity.• Networking and mentorship are crucial for career advancement in cybersecurity.• Persistence is key; many rejections can lead to success.• Community involvement can accelerate your career and connections.• Research in cybersecurity can benefit from understanding geopolitical contexts.• Security research can be approached from various angles, not just technical.• Volunteering in the community can lead to valuable connections and opportunities.• Reading and self-education are essential for getting started in security research.• The cybersecurity community is supportive and fosters lifelong friendships.• Foundational knowledge in IT and networking is vital for success in cybersecurity.Sound Bites"This is where I'm supposed to be.""Community is everything.""I was in that Google video!"Chapters00:00 Introduction to Cybersecurity Community04:51 Hacker Origin Stories and Career Advice11:21 Research on Hardware Security Risks16:56 The Importance of Community in CybersecurityResourceshttps://www.linkedin.com/in/ashleyars/
SummaryIn this episode of the Phillip Wylie Show, Dr. Eric Cole shares his journey from a computer science student to a cybersecurity expert with a rich history at the CIA. He discusses the importance of personal branding in the cybersecurity field, the transition from offensive to defensive security, and the need for CISOs to be recognized as chief officers within organizations. Eric emphasizes the significance of teaching and contributing to the cybersecurity community while also addressing the challenges posed by misinformation and the evolving landscape of technology.Takeaways• Personal branding can significantly enhance your career opportunities.• Eric Cole's journey into cybersecurity began with a CIA internship.• The transition from offensive to defensive cybersecurity is crucial.• Teaching is a natural progression for those passionate about cybersecurity.• CISOs should be recognized as chief officers, not just technical roles.• Cybersecurity is fundamentally a business problem that requires risk management.• Building a personal brand in cybersecurity is essential for visibility.• Embracing technology is vital for modern cybersecurity practices.• Data quality and correlation are more pressing issues than data storage.• Cybersecurity professionals must adapt to the evolving technological landscape.Sound Bites"CISO role is broken in most companies.""Embrace technology, don't fight it.""Don't think of cybersecurity as a roadblock."Chapters00:00 Introduction to Personal Branding in Cybersecurity01:11 Eric Cole's Hacker Origin Story09:44 Transitioning from CIA to Cybersecurity Leadership14:54 The Importance of Experience Over Pay20:11 Misinformation and Data Quality Issues24:36 The Role of the CISO in Modern Organizations30:24 Building a Strong Personal Brand32:42 Embracing Technology in CybersecurityResourceshttps://www.linkedin.com/in/ericcole1/https://secure-anchor.com/
SummaryIn this episode of the Phillip Wylie Show, Chris Traynor shares his journey into the cybersecurity field, discussing his hacker origin story, the impact of post-breach opportunities, and the nuances of breaking into offensive security. He emphasizes the importance of hands-on experience, the role of certifications, and shares engaging stories from his pen testing career. Chris also provides valuable insights on the security mindset and the collaborative nature of cybersecurity.Takeaways• Chris Traynor emphasizes the importance of community involvement in cybersecurity.• Post-breach organizations often have better budgets for security training and tools.• Transitioning into offensive security requires a shift in mindset to think like an attacker.• Certifications can help get past initial job screenings but are not always indicative of skill.• Hands-on experience is crucial for success in pen testing roles.• Building home labs can provide practical experience in cybersecurity.• Understanding the stories behind security incidents is vital for effective communication.• Not all security systems can be 100% secure; it's about managing risks effectively.• Collaboration between security teams and organizations is essential for improvement.• Training should focus on practical applications and real-world scenarios.Sound Bites"I wanted to figure out how things work.""Certifications do serve their purpose.""Hands-on experience is the biggest thing."Chapters00:00 Introduction to Cybersecurity and Community Engagement01:40 Chris Traynor's Hacker Origin Story05:06 Leveraging Post-Breach Opportunities07:24 Breaking into Offensive Security13:04 The Role of Certifications in Cybersecurity19:38 Gaining Hands-On Experience in Pen Testing22:45 Notable Pen Testing Stories and Experiences29:02 Final Thoughts on Security and CollaborationResourceshttps://www.linkedin.com/in/chris-traynor/https://www.antisyphontraining.com/instructor/chris-traynor/
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie engages with cybersecurity experts Grant Smith and Justin Perez, exploring their unique journeys into the world of hacking and cybersecurity. The conversation delves into their origins as hackers, the founding of their company PhantomSec, and the innovative techniques they are developing for EDR evasion. They discuss the importance of hands-on experience in cybersecurity education, the value of certifications, and what qualities they look for in ideal candidates for cybersecurity roles. The episode provides insights into the evolving landscape of cybersecurity and the challenges faced by newcomers in the field.Takeaways• Justin's early fascination with technology led to his hacking journey.• Grant's childhood pranks sparked his interest in cybersecurity.• PhantomSec was born out of a need for better EDR evasion tools.• Hands-on experience is crucial for success in cybersecurity.• Curiosity drives innovation in the cybersecurity field.• Many educational institutions lack practical cybersecurity training.• Certifications can help but shouldn't be the only focus for candidates.• Real-world experience often outweighs theoretical knowledge in hiring.• CVE contributions can enhance a candidate's profile significantly.• Passion and curiosity are key traits for success in cybersecurity.Sound Bites• "That's like kind of the hacker story."• "You have to learn those things."• "Don't get discouraged as well."Chapters00:00 Introduction to Cybersecurity Journeys01:13 Hacker Origin Stories: Justin Perez04:12 Hacker Origin Stories: Grant Smith06:57 The Birth of PhantomSec10:08 Innovations in EDR Evasion13:49 Getting Started in Offensive Security16:20 The Role of Education in Cybersecurity21:01 The Importance of Hands-On Experience24:50 Certifications and Their Value29:32 Evaluating Candidates in CybersecurityResourceshttps://www.linkedin.com/in/justin-perez215/https://www.linkedin.com/in/grant-smith-cyber/https://www.linkedin.com/company/phantom-cyber-group/https://phantomsec.tools/
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Luke McOmie, also known as Pyro, a prominent figure in the hacker and cybersecurity community. They discuss the value of smaller conferences, Luke's journey into hacking, memorable red teaming experiences, and the importance of community engagement in the cybersecurity field. Luke shares insights on getting started in red teaming, the evolution of the industry, and the significance of building relationships at conferences.Takeaways• Smaller conferences foster better relationships.• Luke's first computer was an AST-486SX.• Hacking the school district led to early trouble.• Red teaming involves both physical and digital penetration testing.• Community engagement is crucial in cybersecurity.• Training and certifications are essential for aspiring red teamers.• Physical security assessments are increasingly required by insurance underwriters.• Networking at conferences can lead to lifelong relationships.• Urban exploration can provide valuable skills for red teaming.• The landscape of cybersecurity is evolving with new challenges.Sound Bites"I got to play with Commodore 64.""I am God.""I had a backpack full of data."Chapters00:00 Introduction to the Hacker Community03:02 The Value of Smaller Conferences06:10 Luke's Hacker Origin Story08:59 Red Teaming Experiences and War Stories17:57 Close Calls and Getting Caught24:13 The Unexpected Consequences of Cyber Operations30:37 Navigating the Path to Red Teaming35:15 The Evolution of Penetration Testing38:19 Building Connections in the Cybersecurity CommunityResourceshttps://www.linkedin.com/in/lmcomie/
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Evan Dornbush, a seasoned cybersecurity professional with a rich history in the field. They discuss Evan's journey from a summer internship focused on cybercrime to his work with the NSA and his entrepreneurial ventures in cybersecurity. The conversation delves into the challenges of hiring in tech, the importance of proving technical skills, and the evolving landscape of security research. They also explore the impact of AI on cybersecurity, the economics of cybercrime, and Evan's new podcast aimed at educating listeners about vulnerabilities and exploits.Takeaways• Evan's journey into cybersecurity began with a summer internship focused on cybercrime.• The importance of hands-on experience in proving technical skills in cybersecurity.• Entrepreneurship in cybersecurity can lead to innovative solutions for hiring and skill assessment.• AI is changing the landscape of cybersecurity, creating both challenges and opportunities.• The economics of cybercrime are driven by profitability, making it a persistent issue.• Bug bounties provide a platform for researchers to monetize their skills and contribute to security.• The rise of CVEs reflects the increasing complexity and volume of software vulnerabilities.• Community involvement and education are crucial for the future of cybersecurity.• Evan's podcast aims to demystify vulnerabilities and educate the research community.• The need for better options for researchers to disclose and monetize their findings.Sound Bites"I was totally fanboying.""Research is protected free speech.""It's a shame there's nothing US based."Chapters00:00 Introduction and Background01:16 Evan's Hacker Origin Story04:15 Transitioning from NSA to Entrepreneurship06:53 The Mission of Point Three Security09:32 Innovative Hiring Practices in Cybersecurity12:32 Proving Technical Skills in Cybersecurity14:42 Breaking into Security Research17:51 The Evolving Landscape of Vulnerability Research20:55 The Value of CVEs vs Certifications23:59 The Economics of Cybercrime26:20 The Future of Exploit Markets30:07 Evan's New Podcast: Explain it Like I'm Five37:36 Closing Remarks and Nonprofit InvolvementResourceshttps://www.linkedin.com/in/evandornbush/https://www.desiredeffect.io/https://www.securityweek.com/ethical-zero-day-marketplace-desired-effect-emerges-from-stealth/https://podcasters.spotify.com/pod/show/hackersontherocks4https://goldstargamers.org/
SummaryIn this episode of the Phillip Wylie Show, Tim Fowler discusses the importance of networking and community in the cybersecurity field. He emphasizes the value of continuous learning, mentorship, and sharing knowledge to foster growth within the industry. Tim also shares his personal journey into cybersecurity, highlighting the significance of relationships and the evolving landscape of space cybersecurity, including his upcoming training program.Takeaways• Networking is crucial in cybersecurity.• Community learning can be more valuable than formal education.• Conferences provide opportunities for relationship building.• Mentorship is a two-way street; both parties benefit.• Continuous learning is essential to stay relevant in the field.• Sharing knowledge helps others and reinforces your own understanding.• The grind mentality can hinder new professionals in the industry.• Asking for help is a skill that can be developed.• Effective questioning is key to problem-solving.• Tim's journey into cybersecurity began with a passion for technology.Sound Bites"Networking is crucial in cybersecurity.""The grind mentality can hinder new professionals.""Effective questioning is key to problem-solving."Chapters00:00 Introduction and Background02:57 The Importance of Networking in Cybersecurity06:07 Community Engagement and Learning08:54 The Value of Lobby Con and Informal Learning12:13 Building Relationships and Mentorship14:45 The Joy of Giving Back18:07 Continuous Learning and Staying Relevant21:00 Sharing Knowledge and Experiences23:55 Asking for Help and Overcoming Challenges27:28 The Art of Mentorship and Learning32:16 Tim's Hacker Origin Story39:16 Innovations in Space Cybersecurity Training45:40 The Future of Space Security and TechnologyResourceshttps://ethoslabs.space/https://www.antisyphontraining.com/course/foundations-in-space-cybersecurity-with-tim-fowler/https://x.com/roobixxhttps://www.linkedin.com/in/roobixx
loading
Comments