Discover
Phillip Wylie Show

Phillip Wylie Show
Author: Phillip Wylie
Subscribed: 14Played: 978Subscribe
Share
© Phillip Wylie
Description
Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
138 Episodes
Reverse
In this video, I discuss the hands-on hacking labs from ThreatLocker' Zero Trust World 25.
SummaryIn this episode of the Phillip Wylie Show, Naveen Sunkavally shares his unique journey from software engineering to offensive security. He discusses his experiences at Horizon3.ai, the importance of coding in cybersecurity, and the evolving role of automation and AI in pen testing. Naveen emphasizes the need for a solid foundation in IT and development for those looking to break into cybersecurity, and he provides insights into vulnerability research and the future of the industry.Takeaways• Naveen's journey from software engineering to offensive security is inspiring.• Understanding both offensive and defensive security is crucial.• Automation is becoming increasingly important in pen testing.• A solid coding background is essential for success in cybersecurity.• Vulnerability research can lead to impactful discoveries.• AI tools are changing the landscape of software development and security.• The disconnect between offensive and defensive security needs to be addressed.• Continuous learning and adaptation are key in cybersecurity.• Naveen encourages exploring lesser-known applications for vulnerabilities.• The future of cybersecurity is promising with emerging trends. Sound Bites• "I got my OSCP and it was a lot of grinding."• "AI tools are great for senior coders."• "The future is bright in cybersecurity."Chapters00:00 Introduction to Naveen Sunkavally's Journey01:35 Naveen's Hacker Origin Story09:30 Transitioning to Offensive Security17:50 The Role of Automation in Pen Testing23:24 Vulnerability Research Insights27:59 The Future of Cybersecurity and AIResourceshttps://www.linkedin.com/in/naveensunkavally/https://www.linkedin.com/company/horizon3ai/https://www.horizon3.ai/
Last week, I had a great time at ThreatLocker 's Zero Trust World 25. In this video, I share my experience attending the event.
SummaryIn this episode of the Philip Wylie Show, host Phillip Wylie interviews Nicholas DiCola from Zero Networks, exploring his background in cybersecurity, the importance of foundational IT skills, and the innovative solutions offered by Zero Networks in the realm of micro-segmentation and zero trust networks. The conversation delves into the challenges of traditional security measures, the efficiency of Zero Networks' approach, and valuable career advice for those looking to enter the cybersecurity field.Takeaways• Nicholas DiCola emphasizes the importance of foundational IT skills for a successful career in cybersecurity.• Micro-segmentation is a critical component of a zero trust security model.• Zero Networks automates the micro-segmentation process, saving significant time for organizations.• Many micro-segmentation projects fail to complete within the tenure of a CISO due to complexity.• Certifications can validate basic skills and show initiative in the cybersecurity field.• Hands-on experience through internships is crucial for aspiring cybersecurity professionals.• Understanding the entire network stack is essential for effective security practices.• Zero Networks' solutions are scalable for organizations of all sizes.• The simplicity of Zero Networks' product allows for easy management and implementation.• Exploring different areas within cybersecurity can help individuals find their true interests. Sound Bites• "I think it's really good that people explore other areas."• "We save them a ton of time."• "Most micro-segmentation projects outlive the tenure of the CISO."• "Micro-segmentation is at the end of the journey."• "It's not your legacy micro-segmentation that you think of."• "I always love to share and talk to people about what I've done."Chapters00:00 Introduction to Nicholas DiCola and Zero Trust Networks02:20 Nicholas DiCola's Background and Career Journey06:06 The Importance of Foundational IT Skills10:25 Navigating Certifications and Career Paths in Cybersecurity12:40 Understanding the Role of Micro-Segmentation19:44 Zero Networks: Solutions and Innovations23:19 Time Savings and Efficiency with Zero Networks28:03 Final Thoughts on Micro-Segmentation and Security PostureResourceshttps://www.linkedin.com/in/ndicola/https://www.linkedin.com/company/zeronetworks/90% of security pros say Zero Trust is critical, yet only 5% use microsegmentation. Why? Network segmentation project are notoriously complex, expensive, with extensive downtime. No longer! Zero Networks makes it easy—fast deployment, no manual work, no headaches.Get the report: https://zeronetworks.com/resource-center/white-papers/network-segmentation-zero-trust-architectures-survey-of-it-security-professionals?utm_medium=social&utm_source=linkedin&utm_campaign=pwpodcast&utm_content=vibresearch&cid=701Uc00000SpVUhIAN
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with cybersecurity expert Lesley Carhart about her journey into the field, the importance of community and mentorship, and the unique challenges of working in industrial control systems (ICS) forensics. Leslie shares her hacker origin story, discusses the complexities of ICS security, and recounts a fascinating case study involving a mysterious incident at a power plant. The conversation emphasizes the need for diversity in tech and the vital role of community support in navigating cybersecurity careers.Takeaways• Lesley Carhart's journey into cybersecurity began at a young age with a passion for computers.• The importance of mentorship in the cybersecurity community cannot be overstated.• Industrial Control Systems (ICS) present unique challenges in cybersecurity due to their critical nature.• Understanding processes is key to succeeding in ICS cybersecurity.• Diversity in the tech field has improved over the years, allowing for more varied backgrounds in cybersecurity.• Real-world investigations in ICS can lead to unexpected and humorous outcomes, like the moth story.• Community involvement is crucial for career advancement in cybersecurity.• Self-study and networking are essential for breaking into the cybersecurity field.• The job market for junior cybersecurity professionals is competitive, making community connections vital.• Lesley encourages senior professionals to mentor newcomers to the field. Sound Bites• "I hope we don't end up back there."• "It's been a grand adventure."• "Mentorship can be so, so valuable."Chapters00:00 Introduction to Cybersecurity Community Connections01:43 Lesley Carhart's Hacker Origin Story06:57 Diving into ICS and OT Forensics09:47 Challenges in Industrial Cybersecurity Training13:25 The Complexity of Digital Forensics in ICS15:45 The Moth Story: A Case Study in ICS25:34 The Importance of Community in Cybersecurity30:37 Closing Thoughts and Social Media ConnectionsResourceshttps://www.linkedin.com/in/lcarhart/https://bsky.app/profile/hacks4pancakes.comhttps://infosec.exchange/@hacks4pancakes
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Eva Benn, a leader in the cybersecurity field. Eva shares her inspiring journey from a disadvantaged background in Bulgaria to leading the Microsoft Red Team. She discusses the importance of resilience, the role of gaming in developing cybersecurity skills, and offers valuable advice for aspiring professionals in the field. The conversation also covers personal branding, networking authentically, and the significance of continuous learning and growth in one's career.Takeaways• Eva Benn's journey from Bulgaria to leading the Microsoft Red Team is inspiring.• Resilience and determination are key to overcoming challenges.• Gaming can develop strategic thinking skills beneficial for cybersecurity.• Participating in CTFs is crucial for building skills and credibility.• Networking should be genuine and not forced.• Personal branding involves sharing valuable insights and experiences.• Continuous learning is essential in the ever-evolving field of cybersecurity.• Diverse backgrounds can provide unique advantages in cybersecurity roles.• It's important to understand the entire cybersecurity landscape before specializing.• Building meaningful connections takes time and authenticity. Sound Bites• "You have to do what you need to do."• "Be genuine, take it slow."• "You have what it takes."Chapters00:00 Introduction and Background01:12 Eva's Hacker Origin Story04:50 Overcoming Challenges and Embracing Opportunities10:19 The Importance of Hands-On Experience14:05 Advice for Aspiring Pen Testers17:22 Tips for Job Seekers in Cybersecurity21:57 Building a Personal Brand24:51 Networking Naturally30:01 Final Words of WisdomResourceshttps://www.linkedin.com/in/evabenn/https://www.evabenn.com/
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Ben Sadeghipour, known as NahamSec, a prominent figure in the bug bounty community. They discuss NahamSec's journey into hacking, his achievements in bug bounties, and the importance of personal branding and content creation in the cybersecurity field. NahamSec shares insights on transitioning from part-time to full-time bug bounty hunting, the role of automation and AI in the industry, and offers advice for newcomers looking to break into bug bounties. The conversation emphasizes the value of creativity, curiosity, and continuous learning in becoming a successful hacker.Takeaways• NahamSec's journey into hacking began unintentionally as a child.• He achieved the milestone of earning over a million dollars in bug bounties.• Transitioning from part-time to full-time bug bounty hunting requires dedication and understanding of the ecosystem.• Diverse ventures in cybersecurity can enhance skills and knowledge.• Understanding web applications is crucial for bug bounty hunters.• Automation should come after mastering manual exploitation techniques.• AI tools can assist in bug bounty hunting but should not replace manual skills.• Personal branding is essential for career growth in cybersecurity.• Content creation can take many forms, including writing and blogging.• Continuous learning is vital in the ever-evolving field of cybersecurity.Sound Bites• "I have a company called Hacking Hub."• "You need to understand how web apps work."• "Writing is content creation."Resourceshttps://x.com/NahamSechttps://www.linkedin.com/in/nahamsec/https://www.instagram.com/nahamsechttps://www.nahamsec.com/https://www.youtube.com/nahamsecHands-On Web Exploitation Course (NahamSec's Bug Bounty Course)https://app.hackinghub.io/hubs/nahamsec-bug-bounty-course?v=nahamsecdotcom&_trk=09934e30d001cfb67886dca52660e548
Summary
In this episode of the Phillip Wylie Show, Phillip Wylie interviews Fletus Poston, discussing his journey in cybersecurity, the evolution of email security, and the shift to cloud technology. Fletus shares valuable advice for those looking to break into the field, emphasizing the importance of networking, mentorship, and soft skills. He also provides insights from his experience as a hiring manager, discusses career paths in cybersecurity, and highlights the significance of work-life balance. The conversation concludes with Fletus encouraging listeners to engage with their community and prioritize their well-being.
Takeaways
• Networking and mentorship are crucial for career growth.
• Soft skills are as important as technical skills in cybersecurity.
• Your resume should highlight your most relevant experiences at the top.
• Participating in community events can lead to job opportunities.
• It's okay to transition out of cybersecurity if it's not fulfilling.
• Understanding the evolution of technology is key to staying relevant.
• Cloud technology has transformed disaster recovery and business continuity.
• Engaging with peers can provide valuable insights and support.
• Career paths in cybersecurity can vary widely; explore different roles.
• Work-life balance is essential for long-term success and happiness.
Sound Bites
• "It's okay to try this field and not stay."
• "You can transition out of the field."
• "Are you regretting Monday morning?"
Chapters
00:00 Introduction and New Year Reflections
04:51 The Shift to Cloud Solutions
12:02 Networking and Online Platforms
20:13 The Importance of Soft Skills
29:57 Maintaining Work-Life Balance
Resources
https://www.linkedin.com/in/fletusposton/
https://x.com/fletusposton
Summary
In this episode of the Phillip Wylie Show, Marina Ciavatta shares her unique journey into the world of physical pen testing and social engineering. From her origins in journalism to her current role as a red teamer, Marina discusses the challenges and experiences she has faced in the field. She shares thrilling stories of her pen tests, including moments of fear and unexpected encounters, while also emphasizing the importance of training and awareness in cybersecurity. Marina provides insights for those looking to enter the field, highlighting the blend of creativity and strategy required for successful penetration testing.
Takeaways
• Marina's journey began with event organizing and content production in cybersecurity.
• Physical pen testing requires a deep understanding of security protocols and ethical considerations.
• Experience in event management can enhance skills in physical pen testing.
• Being caught during a pen test can provide valuable insights into security effectiveness.
• Security guards play a crucial role in preventing unauthorized access.
• Creative approaches, such as using costumes, can aid in infiltration during pen tests.
• Combining social engineering with physical pen testing can yield better results.
• Training and awareness are essential for both red and blue teams in cybersecurity.
• Practicing social engineering ethically can help develop skills without causing harm.
• Marina emphasizes the importance of leaving positive feedback in security reports.
Sound Bites
• "I had to crawl a lot on the floor."
• "Being caught is part of the job."
• "I tend to collect my costumes as I go."
Chapters
00:00 Introduction to Marina's Journey
06:53 Breaking into Cybersecurity: Tips for Newcomers
13:20 Getting Caught: Lessons from the Field
29:55 Combining Social Engineering with Physical Pen Testing
34:37 Training and Ethical Considerations in Social Engineering
Resources
https://www.linkedin.com/in/mciavatta/
https://x.com/MarinaCiavatta
https://linktr.ee/marinaciavatta
Phillip's New Free Penetration Testing Methodology Training on Just Hacking Training
https://www.justhacking.com/uc/uc-penetration-testing-methodology/
Summary
In this episode of the Phillip Wylie Show, Chris Wysopal, a renowned hacker and cybersecurity expert, shares his journey from his early days of hacking to founding Veracode. He discusses the evolution of hacking culture, the importance of hands-on experience in cybersecurity, and the challenges posed by generative AI in software development. Wysopal emphasizes the need for understanding coding and the risks associated with supply chain security in the ever-evolving landscape of cybersecurity.
Takeaways
• Chris Wysopal's journey into hacking began with a modem in college.
• The hacker culture has evolved from building to breaking into systems.
• Starting Veracode was driven by a passion for application security technology.
• The CTO role is flexible and evolves with the company's needs.
• Hands-on experience is crucial for aspiring cybersecurity professionals.
• Understanding coding is beneficial, but not strictly necessary for cybersecurity roles.
• Supply chain security is a growing concern in the cybersecurity landscape.
• Generative AI is changing the way software is developed and tested.
• Automated tools are essential for managing increased code vulnerabilities.
• Security must be integrated seamlessly into the development process.
Resources
https://www.linkedin.com/in/wysopal/
https://x.com/WeldPond
https://en.wikipedia.org/wiki/Chris_Wysopal
https://www.linkedin.com/company/veracode/
Chapters
00:00 Introduction to Chris Wysopal
07:55 The Evolution of Hacking Culture
15:35 The Role of a CTO and Company Evolution
23:22 Advice for Aspiring Cybersecurity Professionals
29:47 Cybersecurity Risks in 2025
35:03 Generative AI and Its Impact on Security
Summary
In this episode of the Phillip Wylie Show, Stök shares his journey from a technical background in infrastructure to becoming a successful bug bounty hunter and content creator. He emphasizes the importance of communication skills in the cybersecurity field, offers tips for aspiring content creators, and discusses the significance of building a personal brand. Stök also highlights the need for balance in life, the value of understanding target needs in bug bounty hunting, and the challenges of dealing with online criticism.
Takeaways
• Stök transitioned from infrastructure to web hacking.
• Communication skills are crucial in bug bounty reporting.
•Content creation can open many professional doors.
• Being authentic helps in building a personal brand.
• Understanding the target's needs is key in bug bounty.
• Balancing hobbies with work is essential for mental health.
• Starting with simple tools is enough for bug bounty beginners.• Automation should aid, not replace manual testing.
• Building a personal brand requires consistency and authenticity.
• Online criticism is common; focus on constructive feedback.
Chapters
00:00 Introduction to Stök and His Journey
01:21 The Allure of Bug Bounty Hunting
06:15 Stök 's Technical Background and Transition to Web Hacking
08:32 The Path to Bug Bounty: A Personal Story
13:48 The Importance of Communication in Bug Bounty
16:57 Content Creation Tips and Building a Personal Brand
22:22 Dealing with Criticism and Haters
29:04 Building an Authentic Personal Brand
32:04 The Importance of Hobbies and Balance
35:39 Getting Started in Bug Bounty Hunting
Resources
https://www.linkedin.com/in/fredrikalexandersson/
https://x.com/stokfredrik
https://www.stokfredrik.com/
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Han Kanthi, a seasoned entrepreneur and cybersecurity expert. They discuss Han's journey from the corporate world to starting his own company, the importance of data security, and how AI is transforming the cybersecurity landscape. Han shares insights on building a motivated team, the challenges of sales, and the significance of proactive data security measures in today's digital age.
Takeaways
Han Kanthi has over 25 years of corporate experience before starting his entrepreneurial journey.
The adoption of AI has significantly revamped Han's platform.
Networking and attending smaller conferences can yield better results than larger events.
Proactive data security is crucial in preventing breaches.
Han emphasizes the importance of a motivated and young team in a startup.
Lessons from the corporate world are invaluable for entrepreneurs.
Sales acumen can be developed through networking and experience.
AI is being leveraged for anomaly detection in data security.
The journey of entrepreneurship is challenging but rewarding.
Data security is a critical aspect of cybersecurity that needs attention.
Resources
https://www.linkedin.com/in/kanthi/
https://www.linkedin.com/company/kdex-global/
https://www.linkedin.com/company/anciledspm/
http://www.ancile.ai
http://www.kdexglobal.com/
Summary
In this episode of the Phillip Wylie Show, Celina Stewart, Directory of Cyber Risk Management at Neuvik, discusses her journey in cybersecurity, focusing on the often-overlooked area of risk management. She emphasizes the importance of translating technical cybersecurity insights into business language, the need for diverse career paths in the field, and the value of education and certifications. The conversation also covers frameworks for effective risk management, the challenges faced in the industry, and the importance of communication between technical and non-technical teams.
Takeaways
Risk management is essential for understanding business impact.
There is a significant divide between offensive security and risk management.
Non-technical skills can be valuable in cybersecurity roles.
Understanding risk can enhance communication with executives.
Education and certifications are important for a career in risk management.
Familiarity with NIST frameworks is crucial for risk management professionals.
Risk quantification is a specialized skill that is in demand.
Effective communication is key to translating technical findings for business leaders.
Mindset shifts are necessary for executives to embrace risk management.
There are numerous opportunities for diverse backgrounds in cybersecurity.
Sound Bites
"Risk management is crucial in cybersecurity."
"Communication is key in risk management."
"Mindset shifts are needed in risk management."
Resources
https://www.linkedin.com/in/celina-r-stewart/
https://neuvik.com/
Summary
In this episode, Phillip Wylie engages with David Malicoat and Vivek Ramachandran to discuss the evolving role of the Chief Information Security Officer (CISO) in today's cybersecurity landscape. They explore the unique challenges faced by CISOs, particularly in the context of direct marketing and data protection, the impact of AI and automation on security practices, and the limitations of traditional security solutions. The conversation also delves into the future challenges for CISOs and the importance of adapting to new threats in an increasingly digital world.
Takeaways
David Malicoat emphasizes the importance of understanding threats in the context of specific tools.
The browser is becoming a critical endpoint for security measures.
CISOs need to identify and address vulnerabilities among users.
AI and automation are essential for scaling security efforts.
Traditional security solutions often fall short in addressing modern threats.
The demand for effective cybersecurity solutions is continuously increasing.
CISOs must prioritize application security (AppSec) in their strategies.
There is a need for better visibility into user behavior and security risks.
The uptake of SASE solutions has not met expectations in the industry.
Future cybersecurity strategies must focus on browser security and threat detection.
Sound Bites
"The uptake on SASE just hasn't been there."
"I need to understand how that threat looks."
"We need to make AppSec a priority."
Chapters
00:00 Introduction to the CISO Perspective
09:38 The Journey into Cybersecurity and Podcasting
13:52 Challenges in Direct Marketing and Data Protection
18:46 Addressing Browser-Based Vulnerabilities
22:09 Enhancing Security Awareness Training
23:13 AI and Automation in Cybersecurity
26:36 Navigating Risks with AI Tools
27:33 Browser DLP: A New Approach to Security
31:23 Limitations of Traditional Security Solutions
32:27 The Evolution of Secure Web Gateways
35:53 Architectural Vulnerabilities in Web Security
40:00 Challenges Faced by CISOs
41:43 Future Directions for Square X and Browser Security
Resources
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
https://www.linkedin.com/in/david-malicoat-cissp/
https://www.theprofessionalciso.com/
https://www.linkedin.com/in/vivekramachandran/
Summary
In this episode, Phillip Wylie engages with Robert Pace and Vivek Ramachandran to discuss the evolving landscape of cybersecurity, particularly focusing on browser security, fraud prevention in real estate, and the challenges posed by remote work and BYOD policies. They emphasize the importance of education, transparency, and innovative solutions in addressing security threats. The conversation also highlights the need for organizations to adapt to new technologies and approaches to effectively manage risks and protect their assets.
Takeaways
Education is crucial for residents to understand security risks.
Risks and vulnerabilities are universal across industries.
The browser has become the primary endpoint for security.
Traditional security measures may not address modern threats.
BYOD policies need to be flexible and secure.
Transparency in security solutions builds trust with users.
Organizations must adapt to the evolving threat landscape.
Effective communication with vendors is essential for security.
Policy-based access control can streamline security processes.
User-centric policies can enhance security without hindering productivity.
Sound Bites
"Risks do not discriminate."
"The browser is the new endpoint."
"We need to manage risk intelligently."
Chapters
00:00 Introduction and Backgrounds
03:29 Cybersecurity Landscape and Education
06:45 Fraud Prevention in Real Estate
09:39 Transparency in Security Solutions
12:32 Understanding Industry-Specific Threats
15:41 The Role of EDR and Browser Security
18:33 BYOD and Remote Work Policies
27:19 Dynamic Policy Management in Cybersecurity
37:17 The Future of Browser Security
46:28 Innovations in Security Solutions for 2025
Resources
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
https://www.linkedin.com/in/robert-pace097/
https://www.linkedin.com/in/vivekramachandran/
Summary
In this episode of the Phillip Wylie Show, Int Eighty from Dualcore shares insights into his journey in cybersecurity and music. He discusses the evolution of bug bounty programs, the importance of hands-on experience in cybersecurity education, and his personal hacker origin story. Int Eighty also delves into red teaming, physical pentesting, and career hacking strategies for aspiring professionals. He emphasizes the significance of leveraging AI in cybersecurity and shares his experiences as a musician in the hacking community.
Takeaways
Int Eighty has performed at various cybersecurity events, including Nolacon and Bugcrowd events.
Bug bounty programs have evolved to provide opportunities for hackers globally.
Hands-on experience is crucial in cybersecurity education, often lacking in traditional university settings.
Int Eighty's hacker origin story began with creative problem-solving as a child.
Red teaming involves finding vulnerabilities without causing actual damage to the business.
Physical pentesting can be approached creatively, often involving social engineering.
Building a portfolio through free projects is essential for career advancement in cybersecurity.
Avoiding burnout involves optimizing work schedules and understanding personal productivity patterns.
AI can be leveraged to enhance productivity and efficiency in cybersecurity tasks.
Dualcore combines Int Eighty's passion for hacking with his love for music, creating a unique niche.
Sound Bites
"I prefer to sit at home."
"I just like computers."
"Hack all the things."
Chapters
00:00 Introduction to Dualcore and Live Performances
03:44 The Evolution of Bug Bounty Programs
06:20 The Role of Education in Cybersecurity
09:38 Hacker Origin Stories
12:22 Red Teaming and Offensive Security
15:39 Physical Pen Testing Experiences
24:32 The Art of Red Teaming
28:25 Career Hacking: Getting Your Foot in the Door
32:18 Optimizing Work and Avoiding Burnout
36:23 Leveraging AI in Red Teaming
41:26 The Intersection of Hacking and Music
Resources
https://x.com/int0x80
https://t.co/myhSQyweOp
https://github.com/int0x80
https://inteighty.bandcamp.com/album/loyalty-2
Summary
In this episode of the Phillip Wylie Show, host Phillip Wylie welcomes Lauren Lynch, a marketing professional and podcast producer, to discuss her journey into the world of marketing and podcasting. They explore the evolution of podcasting, the importance of video content, and the growth of HOU.SEC.CON, a cybersecurity conference that emphasizes community engagement and accessibility. Lauren shares insights on how to get started in podcasting and content creation, highlighting the low-cost opportunities available for aspiring creators. The conversation also touches on the significance of quality content in conferences and the collaborative efforts behind HOU.SEC.CON's success.
Takeaways
Lauren Lynch shares her unexpected journey into marketing.
Podcasting is a low-cost way to disseminate information.
The importance of video content in modern podcasting.
Community engagement is key to successful conferences.
Quality content is essential for attracting attendees.
HOU.SEC.CON has seen significant growth in attendance.
Accessibility in conferences helps include more participants.
Aspiring podcasters should leverage free resources to learn.
Networking and community involvement can lead to job opportunities.
The balance between vendor sponsorship and quality content is crucial.
Sound Bites
"I think we've seen that over and over again."
"We grew our audience by 46% in that first year."
"We blew past that really quick."
Chapters
00:00 Introduction to the Podcast and Guest
06:32 The Evolution of Podcasting and Content Creation
14:32 Getting Started in Content Creation and Marketing
25:03 Accessibility and Community Engagement in Conferences
Resources
https://www.linkedin.com/in/laurenandruslynch/
https://www.linkedin.com/company/houseccon/
http://houstonseccon.org/
Summary
In this episode of the Philip Wylie Show, host Phillip Wylie interviews cybersecurity expert John Hammond. They discuss John's journey into hacking, the importance of Capture the Flag competitions, and the value of training and certifications in cybersecurity. John shares insights about his new educational platform, Just Hacking Training, and emphasizes the role of content creation in advancing one's career in the cybersecurity field. The conversation highlights the collaborative nature of cybersecurity education and encourages listeners to share their knowledge and experiences.
Takeaways
John Hammond's journey into cybersecurity began with a passion for video games and hacking.
Capture the Flag competitions provide valuable skills that are applicable in real-world scenarios.
Training resources for penetration testing are abundant and accessible online.
Just Hacking Training aims to provide free and affordable cybersecurity education.
Collaboration with other experts enhances the quality of educational content.
Certifications can help beginners get their foot in the door in cybersecurity.
The OSCP certification is highly regarded in the penetration testing community.
Content creation can significantly impact career opportunities in cybersecurity.
Sharing knowledge and experiences is crucial for community growth in cybersecurity.
Continuous learning and adaptation are essential in the ever-evolving field of cybersecurity.
Sound Bites
"CTF is more difficult than real world."
"Building up free accessible training."
"It's a buffet assortment of training."
Chapters
00:00 Introduction to John Hammond
01:36 John's Hacker Origin Story
04:07 The Value of Capture the Flag Competitions
07:08 Training for Aspiring Penetration Testers
09:11 Introducing Just Hacking Training
10:57 Collaborators in Cybersecurity Education
13:24 The Role of Certifications in Cybersecurity
16:55 Navigating Penetration Testing Certifications
19:14 The Impact of Content Creation on Career Growth
23:23 Encouragement for Aspiring Cybersecurity Professionals
Resources
https://www.linkedin.com/in/johnhammond010/
https://www.youtube.com/@_JohnHammond
https://x.com/_JohnHammond
https://www.justhacking.com/
Summary
In this episode of the Phillip Wylie Show, Jayson E. Street shares his journey from a troubled childhood to becoming a prominent figure in the cybersecurity community. He discusses the importance of understanding the hacker mindset, the value of starting in blue team roles before transitioning to red team positions, and the significance of empathy and kindness in both personal and professional interactions. Through engaging stories and valuable insights, Jayson emphasizes the need for effective communication in security roles and the importance of fostering a supportive community.
Takeaways
Jayson E. Street emphasizes that everyone has a hacker origin story.
Starting in blue team roles provides a solid foundation for cybersecurity careers.
Effective communication is crucial for red teamers to convey findings to management.
Success in security is measured by the impact on client awareness and behavior.
Empathy and kindness are essential in navigating personal and professional relationships.
The hacker mindset is about questioning and challenging the status quo.
Networking and community support are vital in the cybersecurity field.
Red teaming should focus on improving blue team defenses, not just breaking in.
Personal growth often comes from overcoming past traumas and making conscious choices.
It's important to remain humble and recognize that everyone has valuable insights to share.
Sound Bites
"You're one of my inspirations."
"I was able to destroy them."
"It's always time to be kind."
Chapters
00:00 Introduction and Inspiration
03:18 The Hacker Origin Story
07:40 Starting in Cybersecurity: Blue Team First
13:03 Engaging Stories from the Field
21:58 The Importance of Communication in Security
25:26 Active Intrusions and Real-World Experiences
26:19 The Art of Social Engineering
30:56 The Hacker's Humility
36:05 From Rage to Empathy
41:02 Choosing Kindness Over Anger
Resources
https://www.linkedin.com/in/jstreet/
https://x.com/jaysonstreet
https://jaysonestreet.com/
About the Guest:
Rob Allen is a seasoned cybersecurity expert currently working as the Chief Product Officer at ThreatLocker. With over 25 years of experience in the IT industry, Rob has a rich background in managing IT environments, having spent nearly two decades at an MSP (Managed Service Provider) in Ireland. He transitioned from cleaning up ransomware attacks to helping organizations actively prevent them through Threat Locker's innovative cybersecurity solutions. Rob is known for his in-depth understanding of evolving cyber threats and promoting effective preventive measures against them.
Episode Summary:
In this engaging episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity veteran Rob Allen from Threat Locker. Together, they delve into the intricacies of modern cybersecurity threats, focusing on Threat Locker's innovative approaches to tackling ransomware and other malicious attacks. Listeners get a unique insight into the Threat Locker software, known for its preventive rather than reactive approach to cybersecurity, which includes features like default deny policies, ring fencing, and network control.
Rob Allen unveils how the default deny approach helps mitigate cyber threats, including ransomware and living-off-the-land binaries, by blocking unauthorized actions before they happen. He emphasizes the need for robust security measures to limit what applications and scripts like PowerShell can do, thus preventing these tools from being weaponized by cybercriminals. Besides discussing practical security steps, Rob highlights how Threat Locker addresses the ever-evolving threat landscape using its innovative network control and threat detection capabilities. This conversation is packed with insights into how organizations can safeguard their IT environments in an era of increasingly complex cyber threats.
Key Takeaways:
* Default Deny Approach: Rob highlights the efficiency of Threat Locker's default deny policy, preventing unauthorized programs from running by approving only necessary applications.
* Living Off the Land Prevention: The discussion covers methods to control and restrict the use of common Windows utilities like PowerShell, preventing them from serving malicious purposes.
* Network Control: Insights into handling remote encryption threats through a unique approach to network traffic control, ensuring only trusted devices can connect.
* The Role of AI: A glimpse into how AI can be both a tool for cybersecurity advancements and a potential threat when used by bad actors for phishing and malware development.
* Zero Trust World Conference: Rob invites listeners to the Zero Trust World event focusing on hands-on cybersecurity training and knowledge exchange.
Notable Quotes:
* "100% of successful cyber attacks are not detected in time or at all."
* "Prevent ransomware, lock it by default."
* "AI is just as likely to be used against you as it is to protect you."
* "The fact of the matter is, if nobody ever paid, there would be no such thing as ransomware."
* "You cannot trust a ransomware gang."
Resources:
* Threat Locker Website: https://www.threatlocker.com
* ThreatLocker LinkedIn: https://www.linkedin.com/company/threatlockerinc/
* Zero Trust World Event: Explore more at ZTW.com
* Zero Trust World $200 off discount code: ZTWPW25
* ThreatLocker YouTube: https://www.youtube.com/@ThreatLocker
* Rob's LinkedIn: https://www.linkedin.com/in/threatlockerrob/
Chapters
00:00 Introduction to ThreatLocker and Rob Allen
03:30 Rob Allen's Hacker Origin Story
06:23 Understanding ThreatLocker’s Approach to Cybersecurity
12:29 Living Off the Land: A Cybersecurity Challenge
16:39 Macro Vulnerabilities in Office Applications
19:20 Ransomware Prevention Strategies
23:40 The Importance of Network Control
31:55 AI in Cybersecurity: A Double-Edged Sword
37:37 Zero Trust World Conference Overview
39:56 Closing Thoughts and Resources
42:02 Zero Trust World discount code
Comments
Top Podcasts
The Best New Comedy Podcast Right Now – June 2024The Best News Podcast Right Now – June 2024The Best New Business Podcast Right Now – June 2024The Best New Sports Podcast Right Now – June 2024The Best New True Crime Podcast Right Now – June 2024The Best New Joe Rogan Experience Podcast Right Now – June 20The Best New Dan Bongino Show Podcast Right Now – June 20The Best New Mark Levin Podcast – June 2024