PodParley PodParley
BrakeSec Education Podcast cover art

All Episodes

BrakeSec Education Podcast — 463 episodes

#
Title
1

Jay Beale discusses his K8s class at BlackHat, Kubernetes developments, and mental health

2

Socvel intel threat quiz, Pearson Breached, nintendo bricking stuff, and kevintel.com

3

Bronwen Aker - harnessing AI for improving your workflows

4

post-bsides SD discussion, EPSS, the answer I should have given, and 'Lord Brake'

5

March23: buy browser extensions, attackers don't need exploits, socvel CTI quiz

6

steam distributes malware in game form, RDP open from DOGE servers, hacking a supply chain for 50K

7

Tanya Janca Talks secure coding, Semgrep Academy, and community building, and more!

8

Josh Grossman - building Appsec programs, bridging security and developer gaps

9

Managing messaging with management, becoming a CISO with Mary Gardner from Goldiknox

10

p2-accidentalCISO, building trust in new places

11

AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec

12

1st show of 2024! Our 10th Anniversary...

13

Brakesec Call to Action 2023

14

How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

15

25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people

16

Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

17

John Aron, letters of marque, what does a "junior" job look like with AI?

18

Megan Roddie - co-author of "Practical Threat Detecion Engineering"

19

meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.

20

Bsides Seattle and Austin, SecureBoot patch, and more

21

lynsey wolf, conducting insider threat investigations, CASB and UEBA utlization to good use.

22

3CX supply chain attack, Mark Russinovich and Sysinternals, CISA ransomware notifications, and emotional intelligence

23

Dish Network is still busted, John Deere avoiding OSS requests, Is DAST dead?

24

Nickolas Means talks about Security, Devops velocity, blameless orgs, and conferences infosec should attend

25

SPECIAL INTERVIEW: John Aron and Jerod Brennen

26

Layoff discussions, another TMO breach, OneNote Malware, and more!

27

GPS car hacks, Google Threat report, notable topics of 2020, satellite threat modelling, twitter breach(?)

28

Josh-Whalen-risk-management-data_visualization-tools, value-creating activities -p2

29

John Whalen, data visualization tools, risk management, handling org risk-p1

30

Interview with Infrared - one of the Seattle Community Network organizers

31

JAMBOREE - an Android App testing platform from @operat0r -part2

32

JAMBOREE - an Android App testing platform from @operat0r

33

07-oct-news-twitch streaming

34

Uber Breach, MFA fatigue, who can help communicate biz risk?

35

Manual Code reviews/analysis, post-infosec Campout discussion

36

Amanda's Sysmon Talk -p2

37

Amanda's Sysmon Talk -p1

38

Tanya Janca, Securing APIs, finding Security Champions, and accepting Risk

39

Tanya Janca on secure coding practices, Swagger docs, and why documentation matters

40

PYPI enables 2FA, some devs have a problem with this

41

JW Goerlich on Training, phishing exercises, security metrics,getting the most from user training

42

RSA conference, Zero Trust, SSO, 2FA, and multi-cloud tenancy with J Goerlich

43

jon-dimaggio-part2-threat intel-hacking back-analyzing malware

44

Jon DiMaggio_Art-of-cyberwarfare_hacking_back-insider-threat-messaging_P1

45

news, infosystir's talk at RSA, conti has an 'image' problem

46

Mieng Lim, Ransomware actions, using insurance to offset risk, good IR/PR comms

47

Mieng-Lim-Ransomware-Best-Practices-p1

48

Mick Douglas on threat intel, customer worries about being hacked, and more

49

news, farmers affected by ransomware, protestware for the 3rd time, trusting opensource

50

Mick Douglas discusses What2Log, and guidance in light of Okta incident

51

logging analysis, log correlation, and threat analysis dicussion continues - p2

52

Amanda and Bryan discusses log analysis, finding, IOCs, and what to do about them.

53

Shannon Noonan and Stacey Cameron - process automation -p2

54

Shannon Noonan and Stacey Cameron - process automation

55

K12SIX-project-Doug_Levin-Eric_Lankford-threat_intel-edusec-p2

56

K12SIX's Eric Lankford and Doug Levin on helping schools get added security -p1

57

April Wright and Alyssa Miller - IoT platforms, privacy and security, embracing standards

58

Alyssa Miller, April Wright, on IoT Privacy & Security, using tech for stalking, what could be done? Part1

59

Bit of news, Belarus train system hack, VMware Horizon vulns, edge network device vulns

60

April Wright and Alyssa Miller- Open Source sustainabilty

61

Amélie Koran and Adam Baldwin discuss OSS sustainability, supply chain security,, governance, and outreach for popular applications - part2

62

OSS sustainability, log4j fallout, developer damages own code-p1

63

2021-046-Mick Douglas, Log4j vulnerabilities, egress mitigations- part2

64

2021-045-Mick Douglas, Log4j vulnerabilities, egress mitigations- part1

65

2021-044-Litmoose discusses stalking and protecting yourself

66

2021-043- Fred Jennings, Vuln Disclosure policy, VEP, and 0day disclosure - p2

67

2021-042- Fred Jennings, VDP, Vuln Equity, And 0day disclosure - p1

68

Blumira Sponsor #3 - Emily Eubanks, more actionable events, incident response help, and more

69

2021-041-0day disclosure, Randori, FBI email server pwnage

70

2021-040-Sweden's parents rebel over poor App design, US government forcing patching of systems, and Vuln chaining

71

2021-039-Minimum Viable vendor security sheet, Federal logging requirements, and more!

72

SPONSOR-Blumira's Nato Riley on Log Classification, Security Maturity,

73

2021-038-Liz Saling, 5 pillars of building a good team

74

2021-037-Tony Robinson, leveraging your home lab for job success - Part2

75

2021-036-Tony Robinson, twtich breach, @da_667 lab setup new book edition! -part1

76

2021-035-GRC selection discussion, TechSecChix, and the 'job description problem'

77

2021-034-Khalilah Scott, good GRC tool practices - part1

78

2021-033-Kim_Crawley, 8 steps to better security-Part2

79

SPONSOR: Blumira's Patrick Garrity

80

2021-032--Author_Kim_crawley-8-Simple_Rules_for_Cybersecurity

81

2021-031- back in the saddle, conference discussion, company privacy

82

2021-030-incident response, business goal alignment, showing value in IR -p2

83

2021-029- incident response, PICERL cycle, showing value in IR, aligning with business goals -p1

84

2021-028-Rebekah Skeete - social engineering techniques and influences

85

2021-027-Black Girls Hack COO Rebekah Skeete!

86

2021-026-Triaging threat research, Jira vulns, Serious Sam vuln, Systemd vulns, and HiveNightmare

87

2021-025-Dan Borges, Author of Adversarial Techniques from Packt Publishing

88

2021-024-Dan Borges, Author of Adversarial Techniques from Packt Publishing

89

2021-023-d3fend framework, DLL injection types, more solarwinds infections

90

2021-022-github policy updates targeting harmful software, Ms. Berlin discusses WWHF, CVSS discussion

91

2021-021-Security Sphynx, ZeroTrust, implementation prep- part2

92

2021-020: Security Sphynx, Preparing for ZeroTrust implementation - Part1

93

2021-019-Joe Gray, OSINT CTFs, gamifying and motivating to do the right thing

94

2021-018-LawyerLiz, Pres. Biden's EO, and the clueless professor

95

2021-017-Joe Gray on his future book, the OSINT loop, motivators, and gamification - part1

96

2021-016-researchers knowingly add vulnerable code to linux kernel, @pageinsec joins us to discuss -part2

97

2021-015-researchers knowingly add vulnerable code to linux kernel, @pageinsec joins us to discuss -part1

98

2021-014-Slipstreaming blocked by Chrome, Slack being used for malware, plus dork and deskjockeys!

99

2021-013-Liana_McCrea-Garrison_Yap-cecil_hotel, Elisa_Lam-physical_security-part2

100

2021-012-physical security discussion with @geecheethreat and @garrisony75 -pt1

101

2021-011- Dr. Catherine J Ullman, the art of communication in an Incident - Part 2

102

2021-010- Dr. Catherine J Ullman, the art of communication in an Incident - Part 1

103

2021-009-Jasmine_Jackson-TheFluffy007-analyzing_android_apps-FRida-Part2

104

2021-008-Jasmine jackson - TheFluffy007, Bio and background, Android App analysis - part 1

105

2021-007-News-Google asking for OSS to embrace standards, insider threat at Yandex, Vectr Discussion

106

2021-006-Ronnie Watson (@secopsgeek), building a security monitoring system with ELK, and Wazuh - part2

107

2021-005-Ronnie Watson (@secopsgeek), building a security monitoring system with ELK, and Wazuh

108

2021-004-Danny Akacki talks about Mergers and Acquisitions - Part 2

109

2021-003- Danny Akacki, open communications, mergers&acquistions

110

2021-002-Elastic Search license changes, Secure RPC patching for windows, ironkey traps man's $270 million in Bitcoin

111

2021-001-news, youtuber 'dream' doxxed, solarwind passwords bruteforced, malware attacks

112

2020-046-solarwinds-fireeye-breaches-GE-medical-device-issues-and-2021_predictions

113

SPONSORED- Nathanael Iversen from Illumio, future of microsegmentation,

114

2020-045-Marco Salvati, supporting open source devs, incentivizing leeching companies who don't give back- part2

115

2020-044-Marcello Salvati (@byt3bl33d3r), porchetta industries, supporting opensource tool creators, sponsorship model

116

2020-043-Software_Defined_Radio-Sebastien_dudek-RF-attacks- IoT and car RF attacks

117

SPONSORED Podcast: Katey Wood from Illumio on deployment and using WIndows Filtering Platform

118

2020-042-Kim Crawley and Phillip Wylie discuss "Pentester Blueprint", moving into pentesting career

119

2020-041- Conor Sherman, IR stories, cost of not prepping for an incident

120

2020-040- Jeremy Mio, State of Ohio Election Security

121

2020-039-Philip Beyer-leadership- making an impact

122

SPONSORED PODCAST: Neil Patel, Illumio on Microsegmentation, and adopting the Zero Trust philosophy

123

2020-038-Phil_Beyer-etsy-CISO-leadership-making-an-impact

124

2020-037-Katie Moussouris, Implementing VCMM, diversity in job descriptions - Part 2

125

2020-036-Katie Moussouris, Vulnerability Coordination Maturity Model, when are you ready for a bug bounty - Part 1

126

2020-035-ransomware death in Germany, Zerologon woes, drovorub, and corp data on personal devices

127

2020-034-Fortnite account selling, process change agility, IRS wanting to track the 'untrackable'

128

2020-033-garmin hack, Tesla employee thwarted IP espionage, Slack RCE payout, and more!

129

2020-032-Dr. Allan Friedman, SBOM, Software Transparency, and how the sausage is made - Part 2

130

2020-031-Allan Friedman, SBOM, software transparency, and knowing how the sausage is made

131

2020-030- Mick Douglas, Defenses against powercat, offsec tool release, SRUM logs, and more!

132

2020-029- Brad Spengler, Linux kernel security in the past 10 years, software dev practices in Linux, WISP.org PSA

133

2020-028-Shlomi Oberman, RIPPLE20, supply chain security discussion, software bill of materials

134

2020-027-RIPPLE20 Report, supply chain security, responsible disclosure, software development, and vendor care.

135

2020-026- WISP PSA, PAN-OS vuln redux, F5 has a bad weekend, vuln scoring, Twitter advice, and more!

136

2020-025-Cognizant breach, maze ransomware, PAN-OS CVE 2020-2021, SAML authentication walkthrough

137

2020-024-Bit of news, Ripple20 vulns, IoT Security, windows error codes, captchas used for evil, Marine Momma

138

2020-023-James Nelson from Illumio, cyber resilence, business continuity

139

2020-022-Andrew Shikiar, FIDO Alliance, removing password from IoT, and discussing FIDO implementation

140

2020-021- Derek Rook, redteam tactics, blue/redteam comms, and detection of testing

141

2020-020-Andrew Shikiar - FIDO Alliance - making Cybersecurity more secure

142

2020-019-Masha Sedova, customized training, phishing, ransomware, and privacy implications

143

2020-018- Masha Sedova, bespoke security training, useful metrics to tailor training

144

2020-017-Cameron Smith, business decisions, and how it affects Security

145

2020-016-Cameron Smith, Business decisions and their (in)secure outcomes - Part 1

146

2020-015-Tanya_Janca-Using Github Actions in your Devops Environment, workflow automation

147

2020-014-Server Side Request Forgery defense, Tanya Janca, AppSec discussion

148

2020-013- part 2, education security, ransomware, april mardock, Nathan McNulty, and Jared folkins

149

2020-012-April Mardock, Nathan McNulty, Jared Folkins, school security, ransomware attacks

150

2020-011-Alyssa miller, deep fakes, threatmodeling for Devops environments, and virtual conferences

151

2020-010-Dave Kennedy, offensive security tool release, Derbycom, and Esports

152

2020-009-Dave Kennedy, Offensive Tool release (Part 1)

153

2020-008-Nemesis_Taylor Mutch

154

2020-007-Roberto_Rodriguez-threat_hunting-juypter_notebooks_data-science

155

2020-006-Roberto Rodriguez, threat intel, threat hunting, hunter's forge, mordor setup

156

2020-005-Marcus J Carey, red team automation, and Tribe of Hackers book series

157

2020-004-Marcus Carey, ShmooCon Report, threat simulation

158

2020-003- Liz Fong Jones, tracking Pentesters, setting up MFA for SSH, and Developer Advocates

159

2020-002-Liz Fong-Jones discusses blog post about Honeycomb.io Incident Response

160

2020-001- Android malware, ugly citrix bugs, and Snake ransomware

161

2019-046-end of the year, end of the decade, predictions, and how we've all changed

162

2019-045-Part 2-Noid, Dave Dittrich, empowered teams, features vs. security

163

2019-044-Noid and Dave Dittrich discusses recent keybase woes - Part 1

164

2019-043-Bea Hughes, dealing with realistic threats in your org

165

2019-042-CircuitSwan, Gitlabs, Job descriptions that don't suck, layer8con

166

2019-041-circuitswan, diana initiative, diversity initiatives at conferences

167

2019-040-vulns in cisco kit, google's project 'nightmare', healthcare data issues, TAGNW conference update

168

2019-039-bluekeep_weaponized-npm_security_cracks-grrcon_report

169

2019-038-Deveeshree_Nayak-risk_analysis, and OWASP WIA

170

2019-038- Ethical dilemmas with offensive tools, powershell discussion with Lee Holmes - Part2

171

2019-037-Lee Holmes, Powershell logging, and why there's an 'execution bypass'

172

2019-036-RvrShell-graphql_defense-Part2

173

2019-035-Matt_szymanski-attack and defense of GraphQL-Part1

174

2019-034- Tracy Maleeff, empathy as a service, derbycon discussion

175

2019-033-Part 2 of the Kubernetes security audit discussion (Jay Beale & Aaron Small)

176

the last Derbycon Brakesec podcast

177

2019-032-kubernetes security audit dicussion with Jay Beale and Aaron Small

178

2019-031- Dissecting a Social engineering attack (Part 2)

179

2019-030-news, breach of PHI, sephora data breach

180

2019-029-dissecting a real Social engineering attack (part 1)

181

2019-028-fileless_malware_campaign,privacy issues with email integration-new_zip_bomb_record

182

2019-027-GDPR fines for British Airways, FTC fines Facebook, Zooma-palooza

183

2019-026-Ben Johnson discusses hanging your shingle, going independent

184

2019-025-Ben Johnson discusses identity rights management, and controlling your AuthN/AuthZ issues

185

2019-024-Tanya_Janca-mentorship-WoSec_organizations_what-makes-a-good-mentor

186

2019-023-Tanya Janca, Dev Slop, DevOps tools for free or cheap

187

2019-022-Chris Sanders-Rural_Tech_Fund-embracing_the_ATT&CK_Matrix

188

2019-021-Chris Sanders discusses a cognitive crisis, mental models, and dependence on tools

189

2019-020-email_security_controls-windows_scheduler

190

2019-019-Securing your RDP and ElasticSearch, InfoSec Campout news

191

2019-018-Lesson's I learned, github breach, ransoming github repos

192

2019-017-K8s Security, Kamus, interview with Omer Levi Hevroni

193

2019-016-Conference announcement, and password spray defense

194

2019-015-Kevin_johnson-incident_response_aftermath

195

2019-014-Tesla fails encryption, Albany and Sammamish ransomware attacks.

196

2019-013-ASVSv4 discussion with Daniel Cuthbert and Jim Manico - Part 2

197

2019-012: OWASP ASVSv4 discussion with Daniel Cuthbert and Jim Manico - Part 1

198

2019-011-part 2 of our interview with Brian "Noid" Harden

199

2019-010-Zach_Ruble-building_a_better_cheaper_C2_infra

200

2019-009- Log-MD story, Noid, communicating with Devs and security people-part1

201

2019-008-windows retpoline patches, PSremoting, underthewire, thunderclap vuln

202

2019-007-bsides_seattle_recap-new_phishing_vector-Kernel_use_after_free_vuln

203

2019-006: CSRF, XSS, infosec hypocrites, and the endless cycle

204

2019-005: Security Researcher attack, disabling SPECTER, and Systemd discussion

205

2019-004-ShmooCon, and Bsides Leeds discussion, Facetime bug (with update), a town for ransom

206

2019-003-Liz Rice, creating processes to shift security farther left in DevOps

207

2019-002-part 2 of the OWASP IoT Top 10 with Aaron Guzman

208

2019-001: OWASP IoT Top 10 discussion with Aaron Guzman

209

2018-045: end of the year podcast!

210

2018-044: Mike Samuels discusses NodeJS hardening initiatives

211

2018-043-Adam-Baldwin, npmjs Director of Security, event stream post mortem, and making your package system more secure

212

2018-042-Election security processes in the state of Ohio

213

2018-041: part 2 of Kubernetes security insights w/ ian Coldwater

214

2018-040- Jarrod Frates discusses pentest processes

215

2018-039-Ian Coldwater, kubernetes, container security

216

2018-038-InfosecSherpa, security culture,

217

2018-037-iWatch save man's life, Alexa detects your mood, and post-derby discussion

218

2018-036-Derbycon 2018 Audio with Cheryl Biswas and Tomasz Tula

219

2018-035-software bloat is forever; malicious file extensions; WMIC abuses

220

2018-034-Pentester_Scenario

221

2018-031-Derbycon ticket CTF, Windows Event forwarding, SIEM collection, and missing events... oh my!

222

2018-030: Derbycon CTF and Auction info, T-mobile breach suckage, and lockpicking

223

2018-029-postsummercamp-future_record_breached-vulns_nofix

224

2018-028-runkeys, DNS Logging, derbycon Talks

225

2018-027-Godfrey Daniels talks about his book about the Mojave Phonebooth

226

2018-026-insurers gathering data, netflix released a new DFIR tool, and google no longer gets phished?

227

2018-025-BsidesSPFD, threathunting, assessing risk

228

2018-024- Pacu, a tool for pentesting AWS environments

229

2018-023: Cydefe interview-DNS enumeration-CTF setup & prep

230

2018-022-preventing_insider_threat

231

2018-021-TLS 1.3 discussion, Area41 report, wireshark goodness

232

2018-020: NIST's new password reqs, Ms. Berlin talks about ShowMeCon, Pwned Passwords

233

2018-019-50 good ways to protect your network, brakesec summer reading program

234

2018-018-Jack Rhysider, Cryptowars of the 90s, OSINT techniques, and hacking MMOs

235

2018-017- threat models, vuln triage, useless scores, and analysis tools

236

2018-016- Jack Rhysider, DarkNet Diaries, and a bit of infosec history (Part 1)

237

2018-015-Data labeling, data classification, and GDPR issues

238

2018-014- Container Security with Jay Beale

239

2018-013-Sigma_malware_report, Verizon_DBIR discussion, proper off-boarding of employees

240

2018-012: SIEM tuning, collection, types of SIEM, and do you even need one?

241

2018-011: Creating a Culture of Neurodiversity

242

2018-010 - The ransoming of Atlanta, Facebook slurping PII, Dridex variants

243

2018-009- Retooling for new infosec jobs, sno0ose, Jay Beale, and mentorship

244

BDIR-001: Credential stealing emails, How do you protect against it?

245

2018-008- ransomware rubes, Defender does not like Kali, proper backups

246

2018-007- Memcached DDoS, Secure Framework Documentation, and chromebook hacking

247

2018-006- NPM is whacking boxes, code signing, and stability of code

248

2018-005-Securing_your_mobile_devices_and_CMS_against_plugin_attacks

249

2018-004 - Discussing Bsides Seattle, and Does Autosploit matter?

250

BDIR-000 ; The Beginning

251

2018-003-Privacy Issues using Crowdsourced services,

252

2018-002-John_Nye-Healthcare's_biggest_issues-ransomware

253

2018-001- A new year, new changes, same old trojan malware

254

2017-SPECIAL005-End of year Podcast with podcasters

255

2017-042-Jay beale, Hushcon, Apple 0Day, and BsidesWLG audio

256

2017-041- DFIR Hierarchy of Needs, and new malware attacks

257

2017-040-Expensify_privacy_issues-Something_is_rotten_at_Apple

258

2017-039-creating custom training for your org, and audio from SANS Berlin!

259

2017-038- Michael De Libero discusses building out your AppSec Team

260

2017-037 - Asset management techniques, and it's importance, DDE malware

261

2017-036-Adam Shostack talks about threat modeling, and how to do it properly

262

2017-SPECIAL004- SOURCE Conference Seattle 2017

263

2017-035-Business_Continuity-After_the_disaster

264

2017-SPECIAL003-Audio from Derbycon 2017!

265

2017-034-Preston_Pierce, recruiting, job_descriptions

266

2017-SPECIAL002-Derbycon-podcast with podcasters (NSF Kids/Work)

267

2017-033- Zane Lackey, Inserting security into your DevOps environment

268

2017-032-incident response tabletops, equifax breach

269

2017-031-Robert_Sell-Defcon_SE_CTF-OSINT_source

270

2017-030-Vulnerability OSINT, derbycon CTF walkthrough, and bsides Wellington!

271

2017-029-CIS benchmarks, Windows Update reverts changes used to detect malware

272

2017-028-disabling WU?, Comcast wireless hack, and was it irresponsible disclosure?

273

2017-026-Machine_Learning-Market Hype, or infosec's blue team's newest weapon?

274

2017-025-How will GDPR affect your Biz with Wendyck, and DerbyCon CTF info

275

2017-024-infosec_mental_health_defcon_contest-with-rand0h-and-tottenkoph

276

2017-023-Jay_Beale_Securing Linux-LXC-Selinux-Apparmor-Jails_and_more

277

2017-022-Windows Hardening, immutable laws of security admins, and auditpol

278

2017-SPECIAL- Michael Gough and Brian Boettcher discuss specific ransomware

279

2017-021-small_biz_outreach-614con-prenicious_kingdoms-ransomware-bonus

280

2017-020-Hector_Monsegur_DNS_OSINT_Outlaw_Tech_eClinicalWorks_fine

281

2017-019-Ms. Jessy Irwin, Effective Training in Small/Medium Businesses

282

2017-018-SANS_course-EternalBlue_and_Samba_vulnerabilities-DerbyCon contest details

283

2017-017-Zero_Trust_Networking_With_Doug_Barth,_and_Evan_Gilman

284

2017-016-Fileless_Malware, and reclassifying malware to suit your needs

285

2017-015-Being a 'security expert' vs. 'security aware'

286

2017-014-Policy_writing_for_the_masses-master_fingerprints_and_shadowbrokers

287

2017-013-Multi-factor Auth implementations, gotchas, and solutions with Matt

288

2017-012-UK Gov Apprenticeship infosec programs with Liam Graves

289

2017-011-Software Defined Perimeter with Jason Garbis

290

2017-010-Authors Amanda Berlin and Lee Brotherston of the "Defensive Security Handbook"

291

2017-009-Dave Kennedy talks about CIAs 'Vault7', ISC2, and Derbycon updates!

292

2017-008-AWS S3 outage, how it should color your IR scenarios, and killing the 'whiteboard' interview

293

2017-007- Audio from Bsides Seattle 2017

294

2017-006- Joel Scambray, infosec advice, staying out from in front of the train, and hacking exposed

295

2017-005-mick douglas, avoid bad sales people, blue team defense tools

296

2017-004-sandboxes, jails, chrooting, protecting applications, and analyzing malware

297

2017-003-Amanda Berlin at ShmooCon

298

2017-002: Threat Lists, IDS/IPS rules, and mentoring

299

2017-001: A New Year, malware legislation, and a new cast member!

300

2016-051: Steps to fixing risks you found, and the State of the Podcast

301

2016-050: Holiday Spectacular with a little help from our friends!

302

2016-049-Amanda Berlin, the art of the sale, and Decision making trees

303

2016-048: Dr. Gary McGraw, Building Security into your SDLC, w/ Special guest host Joe Gray!

304

2016-047: Inserting Security into the SDLC, finding Privilege Escalation in poorly configured Linux systems

305

2016-046: BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

306

2016-044: Chain of Custody, data and evidence integrity

307

2016-043: BSIMMv7, a teachable moment, and our new Slack Channel!

308

2016-042-Audio from Source Seattle 2016 Conference

309

2016-041- Ben Johnson, company culture shifts, job descriptions, cyber self-esteem

310

2016-040: Gene_Kim, Josh_Corman, helping DevOps and Infosec to play nice

311

2016-039-Robert Hurlbut, Threat Modeling and Helping Devs Understand Vulnerabilities

312

2016-038-Derbycon Audio and 2nd Annual Podcast with Podcasters!

313

2016-037: B1ack0wl, Responsible Disclosure, and embedded device security

314

2016-036: MSSP pitfalls, with Nick Selby and Kevin Johnson

315

2016-035-Paul Coggin discusses the future with Software Defined Networking

316

2016-034: Sean Malone from FusionX explains the Expanded Cyber Kill Chain

317

2016-033: Privileged Access Workstations (PAWs) and how to implement them

318

2016-032-BlackHat-Defcon-Debrief, Brakesec_CTF_writeup, and blending in while traveling

319

2016-031:DFIR rebuttal and handling incident response

320

2016-030: Defending Against Mimikatz and Other Memory based Password Attacks

321

2016-029: Jarrod Frates, steps when scheduling a pentest, and the questions you forgot to ask...

322

2016-028: Cheryl Biswas discusses TiaraCon, Women in Infosec, and SCADA headaches

323

2016-027: DFIR conference, DFIR policy controls, and a bit of news

324

2016-026-powershell exfiltration and hiring the right pentest firm

325

2016-025-Windows Registry, Runkeys, and where malware likes to hide

326

2016-024: Kim Green, on CISOaaS, the Redskins Laptop, and HIPAA

327

2016-023- DNS_Sinkholing

328

2016-022: Earl Carter dissects the Angler Exploit Kit

329

2016-021: Carbon Black's CTO Ben Johnson on EDR, the layered approach, and threat intelligence

330

2016-020-College Vs. Certifications Vs. Self-taught

331

2016-019-Creating proper business cases and justifications

332

2016-018-software restriction policies and Applocker

333

2016-017-The Art of Networking, Salted Hashes, and the 1st annual Podcast CTF!

334

2016-016-Exploit Kits, the "Talent Gap", and buffer overflows

335

2016-015-Dr. Hend Ezzeddine, and changing organizational security behavior

336

2016-014-User_Training,_Motivations,_and_Speaking_the_Language

337

2016-013-Michael Gough, the ISSM reference model, and the 5 P's

338

2016-012-Ben Caudill on App Logic Flaws, and Responsible Disclosure

339

2016-011-Hector Monsegur, deserialization, and bug bounties

340

2016-010-DNS_Reconnaissance

341

2016-009-Brian Engle, Information Sharing, and R-CISC

342

2016-008-Mainframe Security

343

2016-007-FingerprinTLS profiling application with Lee Brotherston

344

2016-006-Moxie_vs_Mechanism-Dependence_On_Tools

345

2016-005-Dropbox Chief of Trust and Security Patrick Heim!

346

2016-004-Bill_Gardner

347

2016-003-Antivirus (...what is it good for... absolutely nothing?)

348

2016-002-Cryptonite- or how to not have your apps turn to crap

349

2016-001: Jay Schulmann explains how to use BSIMM in your environment

350

2015-054: Dave Kennedy

351

2015-053: 2nd annual podcaster party

352

2015-052: Wim Remes-ISC2 board member

353

2015-051-MITRE's ATT&CK Matrix

354

2015-049-Can you achieve Security Through Obscurity?

355

2015-048: The rise of the Shadow... IT!

356

2015-047-Using BSIMM framework to measure the maturity of your software security lifecycle

357

2015-046: Getting Security baked in your web app using OWASP ASVS

358

2015-045: Care and feeding of Devs, podcast edition, with Bill Sempf!

359

2015-044-A MAD, MAD, MAD, MAD Active Defense World w/ Ben Donnelly!

360

2015-043: WMI, WBEM, and enterprise asset management

361

2015-042: Log_MD, more malware archaeology, and sifting through the junk

362

Derbycon Audio - post-Derby interviews!

363

Derbycon - A podcast with Podcasters! *explicit*

364

2015-040; Defending against HTML 5 vulnerabilities

365

2015-039: Hazards of HTML5

366

2015-038-Influence Vs. Mandate and Guardrails vs. Speedbumps

367

2015-037-making patch management work

368

2015-036: Checkbox security, or how to make companies go beyond compliance

369

2015-035: Cybrary.it training discussion and Bsides Austin Panel

370

Flashback: 2014-001_Kicking some Hash

371

2015-034: SANS Top20 Security Controls #9 - CTFs - Derbycon dicsussion

372

2015-033: Data anonymization and Valuation, Privacy, and Ethical medical research

373

2015-032: Incident response, effective communication, and DerbyCon Contest

374

2015-031: Fab and Megan-High_Math-Psychology_and Scarves

375

2015-030: Bsides Austin panel Discussion (Red Team vs. Blue Team)

376

2015-029: Big Brown cloud honeyblog with @theroxyd

377

2015-028: using log analytics to discover Windows malware artifacts

378

2015-027- detecting malware in Windows Systems with Michael Gough

379

2015-026- Cloud Security discussion with FireHost

380

2015-025: Blue Team Army, Powershell, and the need for Blue team education

381

2015-024: Is a good defense the best offense? Interview w/ Mick Douglas!

382

2015-023_Get to know a Security Tool: Security Onion!

383

2015-022: SANS Top 25 Critical Security Controls-#10 and #11

384

2015-021: 24 Deadly Sins: Command injection

385

2015-020 - Deadly Programming Sins - Buffer Underruns

386

2015-018- How can ITIL help you flesh out your infosec program?

387

2015-017: History of ITIL, and integrating Security

388

2015-016: Special Interview: Cybrary.it

389

2015-015: 2015 Verizon PCI report

390

2015-014-SANS Top 20 Controls - #12 and #13

391

2015-013-Hackerspaces and their sense of community

392

2015-012-Fill In podcast with Jarrod and Lee!

393

2015-011- Why does BeEF and metadata tracking keep I2P developers up at night?

394

2015-010 - How can you use I2P to increase your security and anonymity?

395

2015-009-Part 2 with Pawel Krawczyk

396

2015-008- Make your web Apps more secure with Content Security Policy (part 1)

397

2015-007-SANS_Top20_14and15--Proving_Grounds_Microcast with Megan Wu!

398

2015-006- Is your ISP doing a 'man-in-the-middle' on you?

399

2015-005: Threat Modeling with Lee Brotherston

400

2015-004-SANS Top 20: 20 to 16

401

All About Tor

402

Episode 2: Big Trouble in Small Businesses

403

2015-001- "unhackable" or "attacker debt"

404

Is Compliance running or ruining Security Programs?

405

Brakeing Down/Defensive Security Mashup!

406

Tyler Hudak (@secshoggoth) Discusses incident respose, and DIY malware research

407

Tyler Hudak discusses malware analysis

408

Part 2 w/ Ben Donnelly -- Introducing Ball and Chain (making password breaches a thing of the past)

409

Active Defense and the ADHD Distro with Ben Donnelly

410

WebGoat install video with Mr. Boettcher!

411

Active Defense: It ain't 'hacking the hackers'

412

Interview Part 2 with Paul Coggin: Horror stories

413

Interview with Paul Coggin (part 1)

414

Learning about SNMP, and microinterview with Kevin Johnson

415

Keep Calm and take a tcpdump! :)

416

Part 2 with Jarrod Frates - how pentesting is important

417

DerbyCon report and Shellshock news

418

Marcus J. Carey Interview Part 2 - China, IP, coming cyber war

419

Video: Using GPG and PGP

420

Marcus J. Carey, FireDrillMe, and the Rockstars of Infosec

421

Mr. Boettcher interviewed Ed Skoudis!

422

Malware, Threat Intelligence, and Blue Team talks at cons -- with Michael Gough Pt.2

423

Malware, and Malware Sentinel -- with Michael Gough Pt.1

424

Reconnaissance: Finding necessary info during a pentest

425

Mr. Boettcher made a thing! Setting up a proper Debian install!

426

Ratproxy and on being a better Infosec Professional

427

Introduction to Nmap, Part 2

428

Risk Management discussion with Josh Sokol - Part 2

429

Interview with creator of Simple Risk, Josh Sokol! (Part 1)

430

Flashback: Sqlmap - a little how-to, and getting your developers involved in using it.

431

Part 2 with Georgia Weidman!

432

Nmap (pt1)

433

Part 1 with Author and Mobile Security Researcher Georgia Weidman!

434

Establishing your Information Security Program - Part 2

435

Establishing your Information Security Program - Part 1

436

OWASP Top Ten: 1-5

437

OWASP Top Ten: Numbers 6 - 10

438

Talk with Guillaume Ross - Part 2 (all things cloud)

439

It all goes in "the cloud" (Part 1)

440

Video 2: BONUS!!!! Kismet Video!

441

Wireless scans with Kismet and Aircrack-ng

442

PGP and GPG -- protect your data

443

clearing up some terminology (hashing, encryption, encoding)

444

Browsing more Securely

445

Mandiant 2014 threat report

446

Episode 13 - 2014 Verizon PCI Report

447

Episode 12, Part 2 of our interview with Phil Beyer!

448

Special Report: Heartbleednado-apoco-geddon

449

Episode 11, Part 1: Interview with Phil Beyer

450

Video1: quick renaming shortcut with Sed

451

Phil Beyer's talk at Bsides Austin

452

Episode 10: IDS/IPS

453

Episode 9: Framework for Improving Critical Infrastructure Cybersecurity

454

Episode 8: Why a simple password is not so simple...

455

Episode 7, Part 2 with Kevin Johnson from SecureIdeas!

456

Episode 7, Part 1 - Kevin Johnson of SecureIdeas!

457

Episode 6 - Malware Interview with Michael Gough (Part 2)

458

Episode 6 - Malware Interview Michael Gough (Part 1)

459

Episode 5 - Interview with Frank Kim

460

Episode 4: Origin stories, and talking about reconnaissance

461

Episode 3 - Alerts, Events, and a bit of incident response

462

Episode 2 -- Feeling Vulnerable? - Vulnerability scanners - Go Exploit Yourself

463

Episode 1: Kicking some Hash!