DiscoverPhillip Wylie Show
Claim Ownership
Phillip Wylie Show
Author: Phillip Wylie
Subscribed: 11Played: 957Subscribe
Share
© Phillip Wylie
Description
Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
128 Episodes
Reverse
Summary
In this episode of the Phillip Wylie Show, Stök shares his journey from a technical background in infrastructure to becoming a successful bug bounty hunter and content creator. He emphasizes the importance of communication skills in the cybersecurity field, offers tips for aspiring content creators, and discusses the significance of building a personal brand. Stök also highlights the need for balance in life, the value of understanding target needs in bug bounty hunting, and the challenges of dealing with online criticism.
Takeaways
• Stök transitioned from infrastructure to web hacking.
• Communication skills are crucial in bug bounty reporting.
•Content creation can open many professional doors.
• Being authentic helps in building a personal brand.
• Understanding the target's needs is key in bug bounty.
• Balancing hobbies with work is essential for mental health.
• Starting with simple tools is enough for bug bounty beginners.• Automation should aid, not replace manual testing.
• Building a personal brand requires consistency and authenticity.
• Online criticism is common; focus on constructive feedback.
Chapters
00:00 Introduction to Stök and His Journey
01:21 The Allure of Bug Bounty Hunting
06:15 Stök 's Technical Background and Transition to Web Hacking
08:32 The Path to Bug Bounty: A Personal Story
13:48 The Importance of Communication in Bug Bounty
16:57 Content Creation Tips and Building a Personal Brand
22:22 Dealing with Criticism and Haters
29:04 Building an Authentic Personal Brand
32:04 The Importance of Hobbies and Balance
35:39 Getting Started in Bug Bounty Hunting
Resources
https://www.linkedin.com/in/fredrikalexandersson/
https://x.com/stokfredrik
https://www.stokfredrik.com/
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Han Kanthi, a seasoned entrepreneur and cybersecurity expert. They discuss Han's journey from the corporate world to starting his own company, the importance of data security, and how AI is transforming the cybersecurity landscape. Han shares insights on building a motivated team, the challenges of sales, and the significance of proactive data security measures in today's digital age.
Takeaways
Han Kanthi has over 25 years of corporate experience before starting his entrepreneurial journey.
The adoption of AI has significantly revamped Han's platform.
Networking and attending smaller conferences can yield better results than larger events.
Proactive data security is crucial in preventing breaches.
Han emphasizes the importance of a motivated and young team in a startup.
Lessons from the corporate world are invaluable for entrepreneurs.
Sales acumen can be developed through networking and experience.
AI is being leveraged for anomaly detection in data security.
The journey of entrepreneurship is challenging but rewarding.
Data security is a critical aspect of cybersecurity that needs attention.
Resources
https://www.linkedin.com/in/kanthi/
https://www.linkedin.com/company/kdex-global/
https://www.linkedin.com/company/anciledspm/
http://www.ancile.ai
http://www.kdexglobal.com/
Summary
In this episode of the Phillip Wylie Show, Celina Stewart, Directory of Cyber Risk Management at Neuvik, discusses her journey in cybersecurity, focusing on the often-overlooked area of risk management. She emphasizes the importance of translating technical cybersecurity insights into business language, the need for diverse career paths in the field, and the value of education and certifications. The conversation also covers frameworks for effective risk management, the challenges faced in the industry, and the importance of communication between technical and non-technical teams.
Takeaways
Risk management is essential for understanding business impact.
There is a significant divide between offensive security and risk management.
Non-technical skills can be valuable in cybersecurity roles.
Understanding risk can enhance communication with executives.
Education and certifications are important for a career in risk management.
Familiarity with NIST frameworks is crucial for risk management professionals.
Risk quantification is a specialized skill that is in demand.
Effective communication is key to translating technical findings for business leaders.
Mindset shifts are necessary for executives to embrace risk management.
There are numerous opportunities for diverse backgrounds in cybersecurity.
Sound Bites
"Risk management is crucial in cybersecurity."
"Communication is key in risk management."
"Mindset shifts are needed in risk management."
Resources
https://www.linkedin.com/in/celina-r-stewart/
https://neuvik.com/
Summary
In this episode, Phillip Wylie engages with David Malicoat and Vivek Ramachandran to discuss the evolving role of the Chief Information Security Officer (CISO) in today's cybersecurity landscape. They explore the unique challenges faced by CISOs, particularly in the context of direct marketing and data protection, the impact of AI and automation on security practices, and the limitations of traditional security solutions. The conversation also delves into the future challenges for CISOs and the importance of adapting to new threats in an increasingly digital world.
Takeaways
David Malicoat emphasizes the importance of understanding threats in the context of specific tools.
The browser is becoming a critical endpoint for security measures.
CISOs need to identify and address vulnerabilities among users.
AI and automation are essential for scaling security efforts.
Traditional security solutions often fall short in addressing modern threats.
The demand for effective cybersecurity solutions is continuously increasing.
CISOs must prioritize application security (AppSec) in their strategies.
There is a need for better visibility into user behavior and security risks.
The uptake of SASE solutions has not met expectations in the industry.
Future cybersecurity strategies must focus on browser security and threat detection.
Sound Bites
"The uptake on SASE just hasn't been there."
"I need to understand how that threat looks."
"We need to make AppSec a priority."
Chapters
00:00 Introduction to the CISO Perspective
09:38 The Journey into Cybersecurity and Podcasting
13:52 Challenges in Direct Marketing and Data Protection
18:46 Addressing Browser-Based Vulnerabilities
22:09 Enhancing Security Awareness Training
23:13 AI and Automation in Cybersecurity
26:36 Navigating Risks with AI Tools
27:33 Browser DLP: A New Approach to Security
31:23 Limitations of Traditional Security Solutions
32:27 The Evolution of Secure Web Gateways
35:53 Architectural Vulnerabilities in Web Security
40:00 Challenges Faced by CISOs
41:43 Future Directions for Square X and Browser Security
Resources
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
https://www.linkedin.com/in/david-malicoat-cissp/
https://www.theprofessionalciso.com/
https://www.linkedin.com/in/vivekramachandran/
Summary
In this episode, Phillip Wylie engages with Robert Pace and Vivek Ramachandran to discuss the evolving landscape of cybersecurity, particularly focusing on browser security, fraud prevention in real estate, and the challenges posed by remote work and BYOD policies. They emphasize the importance of education, transparency, and innovative solutions in addressing security threats. The conversation also highlights the need for organizations to adapt to new technologies and approaches to effectively manage risks and protect their assets.
Takeaways
Education is crucial for residents to understand security risks.
Risks and vulnerabilities are universal across industries.
The browser has become the primary endpoint for security.
Traditional security measures may not address modern threats.
BYOD policies need to be flexible and secure.
Transparency in security solutions builds trust with users.
Organizations must adapt to the evolving threat landscape.
Effective communication with vendors is essential for security.
Policy-based access control can streamline security processes.
User-centric policies can enhance security without hindering productivity.
Sound Bites
"Risks do not discriminate."
"The browser is the new endpoint."
"We need to manage risk intelligently."
Chapters
00:00 Introduction and Backgrounds
03:29 Cybersecurity Landscape and Education
06:45 Fraud Prevention in Real Estate
09:39 Transparency in Security Solutions
12:32 Understanding Industry-Specific Threats
15:41 The Role of EDR and Browser Security
18:33 BYOD and Remote Work Policies
27:19 Dynamic Policy Management in Cybersecurity
37:17 The Future of Browser Security
46:28 Innovations in Security Solutions for 2025
Resources
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
https://www.linkedin.com/in/robert-pace097/
https://www.linkedin.com/in/vivekramachandran/
Summary
In this episode of the Phillip Wylie Show, Int Eighty from Dualcore shares insights into his journey in cybersecurity and music. He discusses the evolution of bug bounty programs, the importance of hands-on experience in cybersecurity education, and his personal hacker origin story. Int Eighty also delves into red teaming, physical pentesting, and career hacking strategies for aspiring professionals. He emphasizes the significance of leveraging AI in cybersecurity and shares his experiences as a musician in the hacking community.
Takeaways
Int Eighty has performed at various cybersecurity events, including Nolacon and Bugcrowd events.
Bug bounty programs have evolved to provide opportunities for hackers globally.
Hands-on experience is crucial in cybersecurity education, often lacking in traditional university settings.
Int Eighty's hacker origin story began with creative problem-solving as a child.
Red teaming involves finding vulnerabilities without causing actual damage to the business.
Physical pentesting can be approached creatively, often involving social engineering.
Building a portfolio through free projects is essential for career advancement in cybersecurity.
Avoiding burnout involves optimizing work schedules and understanding personal productivity patterns.
AI can be leveraged to enhance productivity and efficiency in cybersecurity tasks.
Dualcore combines Int Eighty's passion for hacking with his love for music, creating a unique niche.
Sound Bites
"I prefer to sit at home."
"I just like computers."
"Hack all the things."
Chapters
00:00 Introduction to Dualcore and Live Performances
03:44 The Evolution of Bug Bounty Programs
06:20 The Role of Education in Cybersecurity
09:38 Hacker Origin Stories
12:22 Red Teaming and Offensive Security
15:39 Physical Pen Testing Experiences
24:32 The Art of Red Teaming
28:25 Career Hacking: Getting Your Foot in the Door
32:18 Optimizing Work and Avoiding Burnout
36:23 Leveraging AI in Red Teaming
41:26 The Intersection of Hacking and Music
Resources
https://x.com/int0x80
https://t.co/myhSQyweOp
https://github.com/int0x80
https://inteighty.bandcamp.com/album/loyalty-2
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie welcomes Lauren Lynch, a marketing professional and podcast producer, to discuss her journey into the world of marketing and podcasting. They explore the evolution of podcasting, the importance of video content, and the growth of HOU.SEC.CON, a cybersecurity conference that emphasizes community engagement and accessibility. Lauren shares insights on how to get started in podcasting and content creation, highlighting the low-cost opportunities available for aspiring creators. The conversation also touches on the significance of quality content in conferences and the collaborative efforts behind HOU.SEC.CON's success.
Takeaways
Lauren Lynch shares her unexpected journey into marketing.
Podcasting is a low-cost way to disseminate information.
The importance of video content in modern podcasting.
Community engagement is key to successful conferences.
Quality content is essential for attracting attendees.
HOU.SEC.CON has seen significant growth in attendance.
Accessibility in conferences helps include more participants.
Aspiring podcasters should leverage free resources to learn.
Networking and community involvement can lead to job opportunities.
The balance between vendor sponsorship and quality content is crucial.
Sound Bites
"I think we've seen that over and over again."
"We grew our audience by 46% in that first year."
"We blew past that really quick."
Chapters
00:00 Introduction to the Podcast and Guest
06:32 The Evolution of Podcasting and Content Creation
14:32 Getting Started in Content Creation and Marketing
25:03 Accessibility and Community Engagement in Conferences
Resources
https://www.linkedin.com/in/laurenandruslynch/
https://www.linkedin.com/company/houseccon/
http://houstonseccon.org/
Summary
In this episode of the Philip Wylie Show, host Phillip Wylie interviews cybersecurity expert John Hammond. They discuss John's journey into hacking, the importance of Capture the Flag competitions, and the value of training and certifications in cybersecurity. John shares insights about his new educational platform, Just Hacking Training, and emphasizes the role of content creation in advancing one's career in the cybersecurity field. The conversation highlights the collaborative nature of cybersecurity education and encourages listeners to share their knowledge and experiences.
Takeaways
John Hammond's journey into cybersecurity began with a passion for video games and hacking.
Capture the Flag competitions provide valuable skills that are applicable in real-world scenarios.
Training resources for penetration testing are abundant and accessible online.
Just Hacking Training aims to provide free and affordable cybersecurity education.
Collaboration with other experts enhances the quality of educational content.
Certifications can help beginners get their foot in the door in cybersecurity.
The OSCP certification is highly regarded in the penetration testing community.
Content creation can significantly impact career opportunities in cybersecurity.
Sharing knowledge and experiences is crucial for community growth in cybersecurity.
Continuous learning and adaptation are essential in the ever-evolving field of cybersecurity.
Sound Bites
"CTF is more difficult than real world."
"Building up free accessible training."
"It's a buffet assortment of training."
Chapters
00:00 Introduction to John Hammond
01:36 John's Hacker Origin Story
04:07 The Value of Capture the Flag Competitions
07:08 Training for Aspiring Penetration Testers
09:11 Introducing Just Hacking Training
10:57 Collaborators in Cybersecurity Education
13:24 The Role of Certifications in Cybersecurity
16:55 Navigating Penetration Testing Certifications
19:14 The Impact of Content Creation on Career Growth
23:23 Encouragement for Aspiring Cybersecurity Professionals
Resources
https://www.linkedin.com/in/johnhammond010/
https://www.youtube.com/@_JohnHammond
https://x.com/_JohnHammond
https://www.justhacking.com/
Summary
In this episode of the Phillip Wylie Show, Jayson E. Street shares his journey from a troubled childhood to becoming a prominent figure in the cybersecurity community. He discusses the importance of understanding the hacker mindset, the value of starting in blue team roles before transitioning to red team positions, and the significance of empathy and kindness in both personal and professional interactions. Through engaging stories and valuable insights, Jayson emphasizes the need for effective communication in security roles and the importance of fostering a supportive community.
Takeaways
Jayson E. Street emphasizes that everyone has a hacker origin story.
Starting in blue team roles provides a solid foundation for cybersecurity careers.
Effective communication is crucial for red teamers to convey findings to management.
Success in security is measured by the impact on client awareness and behavior.
Empathy and kindness are essential in navigating personal and professional relationships.
The hacker mindset is about questioning and challenging the status quo.
Networking and community support are vital in the cybersecurity field.
Red teaming should focus on improving blue team defenses, not just breaking in.
Personal growth often comes from overcoming past traumas and making conscious choices.
It's important to remain humble and recognize that everyone has valuable insights to share.
Sound Bites
"You're one of my inspirations."
"I was able to destroy them."
"It's always time to be kind."
Chapters
00:00 Introduction and Inspiration
03:18 The Hacker Origin Story
07:40 Starting in Cybersecurity: Blue Team First
13:03 Engaging Stories from the Field
21:58 The Importance of Communication in Security
25:26 Active Intrusions and Real-World Experiences
26:19 The Art of Social Engineering
30:56 The Hacker's Humility
36:05 From Rage to Empathy
41:02 Choosing Kindness Over Anger
Resources
https://www.linkedin.com/in/jstreet/
https://x.com/jaysonstreet
https://jaysonestreet.com/
About the Guest:
Rob Allen is a seasoned cybersecurity expert currently working as the Chief Product Officer at ThreatLocker. With over 25 years of experience in the IT industry, Rob has a rich background in managing IT environments, having spent nearly two decades at an MSP (Managed Service Provider) in Ireland. He transitioned from cleaning up ransomware attacks to helping organizations actively prevent them through Threat Locker's innovative cybersecurity solutions. Rob is known for his in-depth understanding of evolving cyber threats and promoting effective preventive measures against them.
Episode Summary:
In this engaging episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity veteran Rob Allen from Threat Locker. Together, they delve into the intricacies of modern cybersecurity threats, focusing on Threat Locker's innovative approaches to tackling ransomware and other malicious attacks. Listeners get a unique insight into the Threat Locker software, known for its preventive rather than reactive approach to cybersecurity, which includes features like default deny policies, ring fencing, and network control.
Rob Allen unveils how the default deny approach helps mitigate cyber threats, including ransomware and living-off-the-land binaries, by blocking unauthorized actions before they happen. He emphasizes the need for robust security measures to limit what applications and scripts like PowerShell can do, thus preventing these tools from being weaponized by cybercriminals. Besides discussing practical security steps, Rob highlights how Threat Locker addresses the ever-evolving threat landscape using its innovative network control and threat detection capabilities. This conversation is packed with insights into how organizations can safeguard their IT environments in an era of increasingly complex cyber threats.
Key Takeaways:
* Default Deny Approach: Rob highlights the efficiency of Threat Locker's default deny policy, preventing unauthorized programs from running by approving only necessary applications.
* Living Off the Land Prevention: The discussion covers methods to control and restrict the use of common Windows utilities like PowerShell, preventing them from serving malicious purposes.
* Network Control: Insights into handling remote encryption threats through a unique approach to network traffic control, ensuring only trusted devices can connect.
* The Role of AI: A glimpse into how AI can be both a tool for cybersecurity advancements and a potential threat when used by bad actors for phishing and malware development.
* Zero Trust World Conference: Rob invites listeners to the Zero Trust World event focusing on hands-on cybersecurity training and knowledge exchange.
Notable Quotes:
* "100% of successful cyber attacks are not detected in time or at all."
* "Prevent ransomware, lock it by default."
* "AI is just as likely to be used against you as it is to protect you."
* "The fact of the matter is, if nobody ever paid, there would be no such thing as ransomware."
* "You cannot trust a ransomware gang."
Resources:
* Threat Locker Website: https://www.threatlocker.com
* ThreatLocker LinkedIn: https://www.linkedin.com/company/threatlockerinc/
* Zero Trust World Event: Explore more at ZTW.com
* Zero Trust World $200 off discount code: ZTWPW25
* ThreatLocker YouTube: https://www.youtube.com/@ThreatLocker
* Rob's LinkedIn: https://www.linkedin.com/in/threatlockerrob/
Chapters
00:00 Introduction to ThreatLocker and Rob Allen
03:30 Rob Allen's Hacker Origin Story
06:23 Understanding ThreatLocker’s Approach to Cybersecurity
12:29 Living Off the Land: A Cybersecurity Challenge
16:39 Macro Vulnerabilities in Office Applications
19:20 Ransomware Prevention Strategies
23:40 The Importance of Network Control
31:55 AI in Cybersecurity: A Double-Edged Sword
37:37 Zero Trust World Conference Overview
39:56 Closing Thoughts and Resources
42:02 Zero Trust World discount code
Summary
In this episode of the Phillip Wylie Show, Sean Metcalf, an
expert in Active Directory security, discusses his journey into cybersecurity, the evolution of Active Directory and Azure AD, and the common mistakes organizations make in cloud security. He emphasizes the importance of security assessments over penetration testing and shares insights into Trimarc's unique approach to security assessments. Sean also highlights the significance of scripting in security roles and discusses the future of Active Directory in hybrid environments. The episode concludes with information about Trimarc's new product, Trimarc Vision, aimed at enhancing Active Directory security.
Takeaways
Sean Metcalf has assessed environments with up to 960,000
users.
Active Directory security is often overlooked in
organizations.
Many organizations are making the same security mistakes in
the cloud as they did on-premises.
Security assessments are crucial for identifying potential
vulnerabilities.
Trimarc uses proprietary tools for in-depth security
assessments.
Scripting knowledge, especially in PowerShell, is beneficial
for security professionals.
Active Directory is not going away anytime soon due to
legacy applications.
Organizations should conduct security assessments every
couple of years.
Trimarc's assessments provide actionable insights for
improving security.
The new Trimarc Vision product aims to enhance Active
Directory security monitoring.
Sound Bites
"It's been quite a year."
"I saw something change in the URL."
"We're the identity experts."
Chapters
00:00 Introduction to Active Directory Security
03:33 Sean Metcalf's Hacker Origin Story
06:20 The Evolution of Active Directory and Azure AD
09:31 The Importance of Specialization in Cybersecurity
12:30 Active Directory Security Challenges
15:39 The Role of Security Assessments
18:26 Comparing Trimarc and Bloodhound
20:56 Understanding Active Directory Security Assessments
22:35 Getting Started in Active Directory Security
25:30 The Importance of Scripting in Security
34:43 The Hybrid Environment: On-Prem vs Cloud
37:23 Trimarc's Unique Services and Assessments
40:17 Frequency of Active Directory Assessments
42:21 Introducing Trimarc Vision
Resources
https://www.linkedin.com/in/seanmmetcalf/
https://x.com/PyroTek3
https://www.linkedin.com/company/trimarcsecurity/
https://x.com/TrimarcSecurity
https://www.trimarcsecurity.com/
https://adsecurity.org/
Summary
In this episode of the Phillip Wylie Show, Mishaal Khan shares his journey from a curious child assembling computers to becoming an expert in OSINT and pen testing. He discusses the importance of OSINT in various fields, the transition to consulting and virtual CISO roles, and offers valuable advice for aspiring CISOs. Mishaal also highlights the impact of AI on cybersecurity and emphasizes the importance of passion over monetary gain in one's career.
Takeaways
Mishaal's journey began with a curiosity about computers and programming.
OSINT can be applied in various fields beyond cybersecurity.
Practical experience is crucial for learning OSINT techniques.
Social engineering is a key component of successful pen testing.
Free tools can be just as effective as paid ones in OSINT.
Transitioning to a consulting role requires a blend of technical and managerial skills.
Understanding risk is essential for aspiring CISOs.
Training should focus on practical applications and real-world scenarios.
AI can enhance productivity but is not a replacement for human skills.
Pursuing passion in your career leads to greater satisfaction and success.
Sound Bites
"Do OSINT on yourself first."
"I can do it in an hour if you allow me."
"AI is not going to take over the world."
Chapters
00:00 Introduction to Mishaal Khan
04:43 Mishaal's Hacker Origin Story
06:34 Getting Started in OSINT
11:33 The Role of OSINT in Pen Testing
18:49 Transitioning to Consulting and Virtual CISO
26:43 Advice for Aspiring CISOs
33:00 Training and Educational Initiatives
36:02 The Impact of AI on Cybersecurity
40:32 Final Thoughts and Advice
Resources
https://www.mishaalkhan.com
https://www.linkedin.com/in/mish-aal/
https://x.com/mish3alkhan
Summary
In this episode, Phillip Wylie interviews Wirefall, a
veteran in the pen testing industry, discussing his journey from a curious child to a seasoned professional. They explore the evolution of pen testing tools, the impact of compliance on testing practices, and the importance of
community engagement in cybersecurity. Wirefall shares insights on starting a career in pen testing, the significance of the Dallas Hackers Association, and how improv has transformed his approach to public speaking and adaptability in the field. The conversation emphasizes the need for trust, communication, and a supportive community in the cybersecurity landscape.
Takeaways
We are all born hackers, driven by curiosity.
The evolution of tools has made pen testing both
easier and more complex.
Compliance often leads to unrealistic pen
testing scopes.
Trust is essential when engaging penetration
testers.
Networking is crucial for career advancement in
cybersecurity.
The Dallas Hackers Association fosters community
and learning.
Improv can enhance adaptability and public
speaking skills.
Community engagement is vital for personal and
professional growth.
Ransomware has shifted the focus back to
full-scope testing.
Be excellent to each other to maintain a
positive community.
Sound Bites
"We are all born hackers."
"DHA is a cyber circus."
"It's a journey."
Chapters
00:00 Introduction to Wirefall and Pen Testing Journey
02:10 The Hacker Origin Story
08:34 First Paid Pen Testing Job
11:05 Evolution of Pen Testing Tools
15:31 Compliance and Its Impact on Pen Testing
20:44 Advice for Engaging Pen Testers
25:02 Starting a Career in Pen Testing
27:43 The Dallas Hackers Association
41:30 The Power of Improv in Hacking
52:37 Community and Conduct in Cybersecurity
Resources
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Alyse Zavala, a cybersecurity professional and rock band vocalist. They discuss the importance of having hobbies outside of work, Alyse's journey from IT to offensive security, and her experiences in the music industry. Alyse shares valuable advice for aspiring penetration testers, insights into exploit
development, and the challenges of balancing her dual careers. The conversation also touches on work-life balance, burnout prevention, and upcoming projects in
both cybersecurity and music.
Takeaways
It's important to have interests outside of
cybersecurity.
Alyse's journey began in IT and evolved into
offensive security.
Hands-on experience is crucial for aspiring
penetration testers.
Certifications like OSCP are more valuable than
a degree.
Alyse emphasizes the importance of
scenario-based interview questions.
She started a rock band to explore her passion
for music.
The band recorded with notable producers and
gained significant views on their music video.
Meditation has helped Alyse manage stress and
improve focus.
Balancing work and music is challenging but
rewarding.
Alyse is excited about upcoming projects in both
cybersecurity and music.
Sound Bites
"It's important to disconnect for a
bit."
"I started specializing in malware
extraction."
"I convinced them to let us start pen
testing."
Chapters
00:00 Introduction and Connection
06:03 Alyse's Hacker Origin Story
12:54 Career Development and Opportunities
21:00 Advice for Aspiring Pen Testers
30:00 Balancing Music and Cybersecurity Career
40:24 Work-Life Balance and Burnout Management
48:14 Closing Thoughts and Future Plans
Resources
https://x.com/Bellebytes
https://lylvc.com/
https://linktr.ee/lylvc
Summary
In this episode, Phillip Wylie interviews Marcus Carey, a prominent figure in the cybersecurity community. They discuss the importance of living in the moment, the power of positivity, and Marcus's journey from a young nerd to a successful hacker and entrepreneur. Marcus shares his experiences in the military and how they shaped his career in cybersecurity, emphasizing the significance of foundational skills and the role of automation and AI in the field. The conversation also touches on the Tribe of Hackers book series and the importance of mentorship and community in personal and professional growth.
Takeaways
Live in the moment and cherish experiences.
Positivity can uplift others, even on bad days.
Every experience has a purpose and can help others.
Foundational skills are crucial for success in cybersecurity.
Automation and scripting can enhance productivity.
AI is a powerful tool for cybersecurity professionals.
Mentorship and sharing knowledge are vital in the community.
Pursue your passions to find your superpower.
Everyone has a role in the cybersecurity community.
Start where you are and pursue your goals relentlessly.
Notable Quotes
"You need to enjoy those times better."
"Everything you learn is to help somebody else out."
"Life is on purpose in everything that you experience."
Chapters
00:00
Living in the Moment and Embracing Positivity
06:34
Hacker Origin Stories and the Value of Learning
11:09
The Power of Automation in Cybersecurity
19:22
Exploring the Potential of AI and Blockchain
23:19
Starting with the Basics and Finding Passion in Coding
27:39
The Importance of Troubleshooting in IT and Cybersecurity
34:21
The Future of AI in Cybersecurity
36:05
The Role of Humans in AI-Driven Cybersecurity
45:51
Empowering the Cybersecurity Community through Tribe of Hackers
54:04
Being a Blessing and Sharing Knowledge in Cybersecurity
01:00:35
Pursuing Your Passions and Finding Fulfillment in Cybersecurity
Resources
https://www.linkedin.com/in/marcuscarey/
https://x.com/marcusjcarey
lWHcfYxqt8HRcXC1NwV6
About The Guest:
Trey Bilbrey is the Lead of SCYTHE Labs, specializing in Purple Team Exercises, Threat Emulation, Critical Infrastructure, and holistic cyber operations. Trey's 15+ years of industry experience has allowed him to become an excellent educator, defender of networks, and a cultivator of cybersecurity professionals. Prior to joining SCYTHE, Trey held positions at notable organizations such as Hack The Box (HTB Academy content Developer), The Army Corps of Engineers (ICS/SCADA Penetration Testing), and a veteran of the United States Marine Corps (Defensive and Offensive Cyber Operations).
Summary:
In this episode of the Phillip Wylie Show, Trey Bilbrey shares his unique journey into cybersecurity, highlighting the importance of foundational knowledge and diverse experiences. He discusses the transition from red teaming to purple teaming, emphasizing the benefits of collaboration and community in the field. Trey also offers valuable advice for newcomers, stressing the need to understand the ecosystem before diving into offensive security. The conversation concludes with a call to build connections within the cybersecurity community to enhance collective defense against threats.
Key Takeaways:
* **Start with a Strong IT Foundation**: Trey emphasizes the importance of gaining experience in IT roles, such as help desk or systems administration, to build a solid understanding before focusing on offensive security.
* **Embrace Purple Teaming**: The integration of red and blue team methodologies can significantly enhance an organization's security posture through real-time collaboration and feedback.
* **Community and Collaboration**: Building trust and sharing insights within and between organizations can raise security standards and prevent breach incidents through collective defense strategies.
* **Navigating Career Waves**: Opportunities often arise unexpectedly; being open to change and ready to evolve is key to a successful career in cybersecurity.
* **Value of Threat Informed Defense**: Understanding your infrastructure and potential threats is crucial for implementing effective security measures and focusing your resources where they matter most.
Notable Quotes:
1. "It's okay to not know your path right now. Dive in, do something new\...it's going to make you better for it."
2. "If we could bring all of that stuff together, that's really what makes an awesome purple team engagement."
3. "Community—we're all in this together. These threats are working as teams, they're crews, they're all talking, they're all communicating. Why aren't we doing the same?"
4. "If you understand how the ecosystem works...it's going to make you so much better."
5. "We need to engage our local communities...we've got to talk. We got to work together."
Resources:
https://www.linkedin.com/in/georgebilbrey/
Chapters
00:00 Introduction and Hacker Origin Story
08:38 Exploring Different Areas of Cybersecurity
12:48 The Importance of Hands-On Experience
18:28 Transitioning to Purple Teaming
25:06 Planning and Executing Purple Team Operations
31:04 The Role of Cyber Threat Intelligence
37:41 Building Community and Collaboration
About the Guests:
Greg Hatcher and John Stigerwalt are co-founders of White Knight Labs, a boutique cybersecurity company specializing in offensive security services and advanced training programs. Greg's background includes a remarkable career as a Green Beret in the U.S. Army, transitioning into cybersecurity with a focus on penetration testing and red teaming. John's journey began with a passion for hacking at 17, which led to a diverse career across IT roles, eventually specializing in penetration testing and red teaming for global companies. Together, they offer unique services aimed at elevating cybersecurity standards through White Knight Labs.
Episode Summary:
Dive into an engaging conversation on The Phillip Wylie Show featuring Greg Hatcher and John Stigerwalt from White Knight Labs. In this episode, the duo returns to discuss their explosive growth in the cybersecurity space, emphasizing their dedication to providing top-tier penetration testing services and innovative training programs. Greg and John highlight their focus on delivering comprehensive security testing, not just ticking compliance boxes but aiming to identify potential threats that could cripple a business financially.
As they delve into their services, Greg and John emphasize their approach to cybersecurity assessments, distinguishing themselves by employing senior engineers for direct, high-impact testing rather than a flat-rate service model. They discuss their various training programs, including offensive development and red teaming operations courses, all tailored to stay hyper-current and relevant in the fast-evolving cybersecurity landscape. The conversation also navigates through intriguing war stories from their physical penetration testing engagements, offering listeners a peek into the challenges and excitement of real-world security assessments.
Key Takeaways:
Comprehensive Cybersecurity Services: White Knight Labs focuses on delivering more than just compliance-driven testing, aiming for substantial security insights to protect businesses.
Advanced Training Programs: The company offers courses on advanced red teaming, Azure penetration testing, and entry-level certifications, ensuring students gain hands-on, up-to-date skills in cybersecurity.
Skillbridge Program: Engaging with transitioning military personnel, White Knight Labs offers internships and training, providing valuable career opportunities in cybersecurity.
Utilizing AI in Cybersecurity: Greg and John discuss leveraging AI tools to streamline coding and development processes, increasing efficiency in their operations.
Real-world Penetration Testing Stories: Sharing intriguing insights, the duo discusses the complexity and adventure involved in physical penetration testing operations.
Key Takeaways:
"Our engineers at WKL will get the domain admin typically in the first hour or two… We're going after the crown jewels." - Greg Hatcher
"We’re not just giving TLS Cert issues. We’re top of the line, going for the RC, the big level bugs." - John Stigerwalt
"We're participating in the Skillbridge program… It's our way of getting back to the community as well." - Greg Hatcher
"If I could cut off the database… that business is gonna shut doors." - John Stigerwalt
"The OSCP made my career, but it wasn't that relevant for what I was doing as a full-time penetration tester." - John Stigerwalt
Chapters
00:00 Introduction to White Knight Labs
02:03 The Growth of White Knight Labs
05:20 SkillBridge Program and Community Support
06:37 Differentiating Factors in Pen Testing Services
11:26 Compliance vs. Security in Pen Testing
15:19 The Impact of Breaches on Security Budgets
16:28 Training Programs and Course Offerings
30:36 Leveraging AI in Offensive Security
34:37 War Stories from the Field
56:18 Upcoming Events and Closing Remarks
57:52 Phillip Wylie Show Outro Video.mp4
Resources:
White Knight Labs Website: White Knight Labs
Greg Hatcher's LinkedIn: Greg Hatcher
John Stigerwalt's LinkedIn: John Stigerwalt
White Knight Labs: **Navigating Advanced Red Team Operations (previous episode) **https://phillipwylieshow.com/episode/white-knight-security-navigating-advanced-red-team-operations
Summary
In this conversation, Ryan Feder and Phillip Wylie explore the themes of resilience, innovation, and personal growth. They discuss how challenges can be transformed into opportunities and the importance of maintaining a positive mindset in the face of adversity. The dialogue emphasizes the power of innovative thinking and the necessity of embracing change as a pathway to success.
Takeaways
Turning challenges into opportunities is key to success.
Resilience allows us to navigate through tough times.
Innovative thinking can lead to transformative solutions.
Growth often comes from overcoming significant challenges.
Embracing change is essential for personal development.
A positive mindset can alter our perception of adversity.
Learning from failures can pave the way for future success.
Collaboration can enhance innovative ideas and solutions.
Personal growth is a continuous journey, not a destination.
Adapting to change can unlock new possibilities.
Sound Bites
"You took a bad situation and made it good."
"The power of resilience is incredible."
"Innovative thinking can change everything."
Chapters
00:00 Meeting at Defcon
06:30 Finding Passion in the Cybersecurity Industry
12:50 Transitioning to Offensive Security
15:56 The Importance of Networking
18:46 The Supportive Cybersecurity Community
19:30 The Importance of Physical Security
24:34 Admitting Ignorance and Seeking Help
34:54 Networking and Continuous Learning
40:00 Understanding Technology for Effective Pen Testing
Resources
https://www.linkedin.com/in/ryan-feder-sscp/
https://x.com/Ano1X8
Takeaways
·
Snehal Antani emphasizes the importance of
product obsession in leadership.
·
The transition from a bull market to a bear
market requires quick strategic shifts.
·
A strong technical foundation is crucial for
success in offensive security roles.
·
Certifications signal a commitment to
self-improvement but are not the sole indicator of skill.
·
Bootcamps can provide a pathway into
cybersecurity but require ongoing learning to retain skills.
·
Autonomous pen testing offers a consistent and
comprehensive approach to security assessments.
·
The integration of offensive and defensive
security communities is essential for overall effectiveness.
·
Understanding the threat actor perspective is
vital for effective cybersecurity strategies.
·
Horizon 3 aims to leverage data advantage to
enhance its product offerings.
·
The future of cybersecurity will involve
algorithms fighting algorithms with human oversight.
Sound Bites
·
"Pen testing can be automated that
much."
·
"I am obsessed with the product."
·
"I took a 99% pay cut to serve."
Chapters
00:00 Introduction to Horizon 3 and Snehal Antani
03:26 Leadership and Company Culture at Horizon 3
06:30 Snehal's Hacker Origin Story
10:37 Transition from Corporate America to JSOC
13:45 Building Horizon 3's Culture and Team
16:28 The Unique Approach of Horizon 3
20:24 The Evolution of Pen Testing
24:34 The Role of Humans in Pen Testing
28:41 The Shift in Cybersecurity Mindset
32:31 Certifications and Bootcamps in Cybersecurity
36:26 The Future of Cybersecurity and Co-Pilots
40:21 The Importance of Data in Cybersecurity
44:22 The Impact of Autonomous Pen Testing
48:22 Conclusion and Future Outlook
58:33 Phillip Wylie Show Outro Video.mp4
Resources
https://www.linkedin.com/in/snehalantani/
https://x.com/snehalantani
https://www.horizon3.ai/
https://www.linkedin.com/company/horizon3ai/
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Christophe Foulon, a cybersecurity expert and podcaster, about his journey into the cybersecurity field, the importance of self-discovery for aspiring professionals, and the evolving landscape of hiring practices in the industry. They discuss the significance of certifications, the need for internal talent development, and the value of community involvement in cybersecurity education. Christophe shares practical advice for job seekers, emphasizing the importance of networking and curiosity in building a successful career in cybersecurity.
Takeaways
Christophe's journey into cybersecurity began at a young age.
Self-discovery is crucial for those entering the cybersecurity field.
Certifications are often necessary, especially for government roles.
Hiring practices are evolving, with less emphasis on traditional degrees.
Internal training and development can help fill cybersecurity roles.
Apprenticeships can provide valuable hands-on experience.
Community involvement is essential for building a skilled workforce.
Networking is key to finding job opportunities in cybersecurity.
Curiosity and continuous learning are vital for success in cybersecurity.
Understanding the job market and roles can prevent burnout.
Sound Bites
"I was just hooked."
"It all starts on the foundation of self-discovery."
"You need to be eternally curious."
Chapters
00:00 Introduction and Background
06:46 Recommendations for Breaking Into Cybersecurity
10:54 The Role of Certifications in Cybersecurity
16:08 Creating Career Paths and Apprenticeships in Cybersecurity
25:02 The Value of Networking and Building Relationships in Job Hunting
29:40 Staying Informed: Researching Industry Trends in Cybersecurity
32:14 Closing Remarks
32:39 Phillip Wylie Show Outro Video.mp4
Resources
https://www.linkedin.com/in/christophefoulon/
https://x.com/chris_foulon
Comments
Top Podcasts
The Best New Comedy Podcast Right Now – June 2024The Best News Podcast Right Now – June 2024The Best New Business Podcast Right Now – June 2024The Best New Sports Podcast Right Now – June 2024The Best New True Crime Podcast Right Now – June 2024The Best New Joe Rogan Experience Podcast Right Now – June 20The Best New Dan Bongino Show Podcast Right Now – June 20The Best New Mark Levin Podcast – June 2024
United States