Episodes
Published 04/02/24
Red team versus blue team. All should become a purple team!! Searching for a way around the rockstar mentality all too common within the infosec industry, as the proposal to build a team of teams is announced. Deception technology mixed with an actual true cost analysis of threat intelligence lending questionable returns. The roller coaster of topics reaches a pinnacle with a reflection on being allocentric within the security industry versus viewing security solely through the lens of...
Published 06/18/20
Actor engagement, and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of hack-back arises but this takes us down the rabbit trails of the roles synthetic identities play in the cognitive landscape, actor engagement and experiences found only in the trenches. Blake Butler from Paypal joins us in exploring very specific topics that are not discussed enough. Topics...
Published 04/29/20
Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners, advisors or CISO's. We cover some of the following items: AI & Turing Integrity Assessments Risk Management strategies that work. Historical reference points to the beginnings of the threat intelligence industry. Similarities between an evolving TI landscape, and red teaming over the last...
Published 04/20/20
In our podcast, we aren’t always the experts in all of the topics at hand, but we know where to get experts and have candid conversations. Standard Disclaimer The intent is to explore information around this topic. This episode is long, and we will get a bibliography put together. In no way should the questions fan the flame of conspiracies, fear or panic. The information discussed are opinions and dialogue. Please verify the information or theories shared on your own time. The doctor...
Published 04/14/20
The hack of old Zack Payton describes his role in pushing the boundaries of incident response, threat hunting and scaling up SOC teams and MSSPs with the innovations Westward.AI is pushing. Mr. Payton spent years providing in the trench incident response, reversing, exploit development and so much more. Special mentions to the following: @insanitybit grapl project: https://github.com/insanitybit/grapl @rw_access Ross Wolf designer of EQL https://github.com/endgameinc/eql...
Published 04/13/20
Truly Advanced Persistent attacks where physical exploitation and even death are rarely discussed. We cover some of this along with security within the Healthcare and Government space. Security Within Healthcare and government is always hard. Tensions between information security and the business make this harder. Hospitals hit in fall of 2019 had a taste of exploitation. Similarly, state governments have had issues with cartel related attackers. CISO's that enable assessment, and...
Published 04/06/20
*A variety of topics are covered in this episode. * Candor on the Infosec industry. VC Trends & Startup trends. Tools vs. Process. Brian Dykstra, shares some of the high's and low's after doing forensics for the last 24 years. If you don't have a CSI room while doing forensics, you are totally lame. Hotness with getting 500g/sec on forensic image acquisition. Evaluating Sandbox technologies in use. What is hot or not. ThreatGrid, Joe's Sandbox, or bare metal. Dan's Inbox...
Published 04/02/20