DiscoverUnscripted | David RavivFrom MMO RPGs to Cybersecurity Mastery
From MMO RPGs to Cybersecurity Mastery

From MMO RPGs to Cybersecurity Mastery

Update: 2024-05-29
Share

Description

Dive into the fascinating journey of Kyle Kelly, a cybersecurity expert who turned his childhood obsession with video games into a thriving career. Discover the hidden connections between gaming and cybersecurity, the complexities of software supply chain security, and the future of tech innovations.




00:00 - 00:03


Introduction and Early Days: Kyle Kelly discusses his initial journey into cybersecurity through video games, specifically MMO RPGs, and how his interest in automating game functions led to a deeper understanding of systems and security.




00:03 - 00:06


Gaming Influence: Kyle shares insights on how video games influenced his cybersecurity skills, including his experiences with bot development and the darker side of gaming communities.




00:06 - 00:09


Parental Perspective on Gaming: The discussion shifts to the impact of gaming on children and how it can spark interest in technical fields. Kyle reflects on his personal journey and the generational differences in gaming habits.




00:09 - 00:13


Professional Gaming and Indie Development: The conversation explores the viability of professional gaming careers and the growth of indie game development, highlighting Kyle's thoughts on the evolution of the gaming industry.




00:15 - 00:18


Current Role and Projects: Kyle outlines his current roles, including his work as an executive consultant at BankSec, his involvement with Semgrup in software supply chain security, and his personal project, Crime Hacks.




00:18 - 00:22


Software Supply Chain Security: A deep dive into the issues surrounding software supply chain security, the use of open source code, and the vulnerabilities associated with it. Kyle explains the importance of being mindful of dependencies.




00:22 - 00:25


Malicious Dependencies: Kyle discusses the risks posed by malicious dependencies in software development and the need for better tools and practices to detect and mitigate these threats.




00:25 - 00:29


Responsibilities and Best Practices: The conversation covers who should be responsible for ensuring software security, the role of developers, and the importance of continuous monitoring and updating of dependencies.




00:29 - 00:34


Future of Software Development: Kyle predicts the future of software development, touching on the potential impact of AI and no-code solutions on the industry and the need for innovative security measures.




00:34 - 00:38


Case Studies and Real-World Examples: Kyle shares examples of recent security incidents related to software supply chain vulnerabilities, highlighting the real-world implications of these threats.




00:38 - 00:42


SBOM and Industry Policies: The discussion turns to the Software Bill of Materials (SBOM), its importance, and the challenges companies face in implementing and utilizing SBOM effectively.




00:42 - 00:46


Tools and Solutions: Kyle talks about various tools and solutions available for improving software security, including fuzzing and static code analysis, and the role these tools play in the development process.




00:46 - 00:49


Ethical Dilemmas in Security: The conversation delves into the ethical challenges faced by developers and organizations when dealing with security vulnerabilities and policy compliance.




00:49 - 00:55


The Role of No-Code Development: Kyle discusses the potential of no-code development platforms to enhance software security and efficiency, while also considering the risks associated with widespread adoption.




00:55 - 00:56


Closing Remarks: The interview concludes with Kyle sharing his contact information, encouraging listeners to connect with him on LinkedIn and subscribe to his newsletter, Crime Hacks.




#Cybersecurity #GamingToTech #SupplyChainSecurity #OpenSourceRisks #FutureOfTech

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

From MMO RPGs to Cybersecurity Mastery

From MMO RPGs to Cybersecurity Mastery

David Raviv