PODCAST · technology
Phillip Wylie Show
by Phillip Wylie
The Phillip Wylie Show is a premier cybersecurity podcast and media source for offensive security professionals. Hosted by Phillip Wylie, globally recognized ethical hacking expert, keynote speaker, and co-author of The Pentester Blueprint, the show features elite red team operators, penetration testers, and security leaders sharing real-world tradecraft, advanced tactics, career strategy, and insights on AI-driven cyber threats.
-
192
Winn Schwartau: Hacker Culture, Cognitive Security, and the Human Element
Computer security analyst and author Winn Schwartau joins Phillip Wylie for a deep conversation on hacker culture, cognitive security, information warfare, and the evolution of cybersecurity from the early days of computing to today’s AI-driven world.Winn shares stories from his early days bypassing locked telephone systems as a child, his transition from the live recording industry into cybersecurity in the 1980s, and how his engineering mindset shaped his approach to systems hacking. The conversation explores the rise of cloud computing, the increasing specialization required in cybersecurity, and why human behavior remains one of the industry’s biggest vulnerabilities.The episode also dives into Winn’s groundbreaking work around cognitive security, misinformation, disinformation, and “critical ignoring” — the idea that filtering out noise is becoming just as important as critical thinking in today’s information-overloaded society.Listeners will also hear Winn’s thoughts on hiring practices in cybersecurity, why failure is essential for growth, and how the industry still overlooks talented people who do not fit traditional hiring molds.========================= Connect with Winn Schwartau:LinkedIn: https://www.linkedin.com/in/winnschwartauWebsite: https://www.winnschwartau.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
191
Amar Sonik: Why Cybersecurity Fundamentals Still Matter
In this episode of The Phillip Wylie Show, Phillip sits down with Amar Sonik to talk about what really matters in cybersecurity.They dig into why fundamentals like networking and Linux still separate good security professionals from great ones, how conferences like B-Sides Singapore and CYBR.HAK.CON. help shape careers, and how AI is changing the way people learn hacking.Amar Sonik shares practical advice for anyone trying to break into cybersecurity, along with lessons from organizing security events and working in the field.If you’re trying to get started or level up your skills, this episode keeps it real.========================= Connect with Amar Sonik:LinkedIn: https://www.linkedin.com/in/amarjitsonik/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie========================= Information about CYBR.HAK.CON. and tickets:https://cybrhakcon.com/
-
190
Zach Tackett: How Hands-On Experience and Networking Open Doors in Cybersecurity
In this episode of The Phillip Wylie Show, Phillip sits down with Zach Tackett, a listener-turned-guest who carved his path into cybersecurity and pentesting through persistence, hands-on learning, and networking.Zach shares his unconventional journey from a blue-collar upbringing and early struggles with asthma to discovering programming, cybersecurity, and ultimately landing roles supporting NASA and later becoming a security consultant at Secure Ideas. Along the way, he highlights the importance of real-world experience, building labs, and developing the hacker mindset.This conversation is packed with practical advice for aspiring pentesters, including how to stand out in a competitive job market, the role of certifications vs. experience, and why networking can be more powerful than submitting resumes online.========================= Connect with Zach Tackett:LinkedIn: https://www.linkedin.com/in/zach-t-4862b487/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
189
Marie Hamilton: From Rejections to Success
In this episode of The Phillip Wylie Show, Phillip sits down with Marie Hamilton to explore her unconventional and inspiring path into cybersecurity. From early curiosity about computers and creative problem-solving as a teenager to serving in the military, navigating career pivots, and ultimately launching her own cybersecurity and investigations business, Marie shares a candid look at her journey.They discuss the realities of breaking into cybersecurity, the value of community and networking, lessons learned from entrepreneurship, and how emerging technologies like AI are shaping the future of the field. Marie also dives into her current work in digital forensics, OSINT, and cyber law, offering valuable insights for anyone looking to enter or grow in the industry.========================= Connect with Marie Hamilton:LinkedIn: https://www.linkedin.com/in/wcymar2/Opis website: https://www.opis-cybersecurity.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
188
From Pro Wrestler to Pentester: My Cybersecurity Origin Story
How do you go from professional wrestling and powerlifting to a career in cybersecurity and penetration testing?In this special solo episode of The Phillip Wylie Show, Phillip Wylie shares his personal hacker origin story and the unconventional path that led him from wrestling matches and construction jobs to becoming a penetration tester, security evangelist, author, and podcast host.If you're trying to break into cybersecurity, transition from IT, or wondering if it's too late to start, this episode shows that there is no single path into security.Phillip discusses how curiosity, persistence, mentorship, public speaking, and content creation helped shape his career and how you can apply these same principles to your own journey.========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
187
Jamy Casteel: From Small Town IT to Offensive Security
In this episode of The Phillip Wylie Show, host Phillip Wylie sits down with offensive security professional Jamy Casteel to discuss his journey from small-town IT technician to penetration tester and red teamer. Jamy shares how an early exposure to social engineering and physical pentesting sparked his interest in security and shaped his career path.The conversation explores the differences between pentesting and red teaming, the value of consulting experience, and why understanding business risk is just as important as technical skill. Jamy also shares his thoughts on certifications versus real-world experience, the emerging role of AI in security testing, and why cybersecurity professionals should develop interests outside of technology to maintain balance and mental clarity.This episode offers practical advice for aspiring cybersecurity professionals along with insights into how offensive security continues to evolve.========================= Connect with Jamy Casteel:LinkedIn: https://www.linkedin.com/in/jamy-casteel========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
186
Travis Stein: Mastering Cybersecurity: Hands-On Skills and Networking Strategies
In this episode of the Phillip Wylie Show, host Phillip Wylie sits down with cybersecurity professional Travis Stein to discuss practical strategies for breaking into cybersecurity, building technical skills, and advancing from IT into security roles. Travis shares his journey from help desk roles into cybersecurity engineering and offers actionable advice for aspiring professionals looking to stand out in a competitive field.The conversation highlights the importance of hands-on experience, networking, home labs, certifications, and building a personal portfolio to demonstrate real-world skills. Travis also discusses how soft skills like communication and presentations can accelerate career growth and open new opportunities.========================= Connect with Travis Stein:LinkedIn: https://www.linkedin.com/in/twstein86/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
185
Gregory Carpenter: Beyond the Network | Threat Modeling, AI, and Real-World Pen Testing
In this episode, Phillip Wylie sits down with Dr. Gregory Carpenter to explore his journey from early childhood curiosity to a distinguished career in cybersecurity, military operations, and advanced threat modeling. Greg shares how his early interest in security evolved from physical lockpicking and unconventional problem solving into work involving digital security, NSA operations, and space-related missions.The conversation dives into what effective threat modeling really looks like and why too many security assessments fail to account for real-world conditions. Greg explains the importance of looking beyond traditional network boundaries to include physical access, RF exposure, social engineering, environmental conditions, and human behavior. He also discusses the limits of narrowly scoped pen tests and why deeper, more realistic engagement is critical for understanding how attackers actually operate.Phillip and Greg also examine the growing role of AI and automation in offensive security. Greg shares his perspective on how AI can improve security assessments, where automation adds value, and why creativity and adaptability still matter just as much as tools. They also cover dynamic defenses, deception, critical infrastructure risk, and how organizations can use intelligence sources such as MITRE, DOD, FBI, and DHS to strengthen their defensive strategies.========================= Connect with Gregory Carpenter:LinkedIn: https://www.linkedin.com/in/gcarpenter-cso-kbi/ Gregory's book: https://www.amazon.com/Reverse-Deception-Organized-Counter-Exploitation-McGraw-Hill/dp/B00E6T3VRA/ ========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylie X: https://x.com/PhillipWylie Instagram: https://www.instagram.com/phillipwylie
-
184
Allie Mellen: Code War
In this episode of the Phillip Wylie Show, Allie Mellen shares her journey from a computer engineering student to a cybersecurity expert and industry analyst. She discusses the importance of hands-on experience in cybersecurity, the evolution of cybersecurity tools, and the significance of a hacker mindset. Allie also emphasizes the need for clear communication in cybersecurity for non-technical audiences and provides advice on selecting cybersecurity products. Additionally, she introduces her new book, 'Code Nations,' which explores the intersection of cybersecurity and geopolitics, highlighting the impact of global events on cyber warfare strategies.========================= Connect with Allie Mellen:LinkedIn: https://www.linkedin.com/in/hackerxbella/ Allie's book: https://www.amazon.com/dp/1394285574========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
183
Eve Maler: The Evolution of Identity Security
In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Eve Maler, a prominent figure in identity security. They discuss the importance of community in cybersecurity, Eve's journey into the field, the evolution of identity technologies like SAML and OAuth, advancements in authentication methods, and the impact of AI on identity management. Eve also shares insights from her upcoming book on digital identity, emphasizing the need for a user-centric approach to security.========================= Connect with Eve Maler:LinkedIn: https://www.linkedin.com/in/evemaler/Eve's book: https://masteringdigitalidentity.com/Website: https://www.vennfactory.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
182
Sudhanshu Chauhan: Navigating the New Landscape of Cyber Threats
In this episode, Sudhanshu Chauhan discusses the transformative impact of AI on the cybersecurity landscape. He explains how AI has introduced new attack vectors and the dual nature of AI in cybersecurity, serving both as a tool for attacks and as a target for attacks. The conversation emphasizes the need for security professionals to adapt to these changes and explore innovative approaches to penetration testing and security measures.========================= Connect with Sudhanshu Chauhan:LinkedIn: https://www.linkedin.com/in/sudhanshuchauhanWebsite: https://redhuntlabs.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
181
Dorota Kozlowska: Empowering Women in Cybersecurity
In this episode of the Phillip Wylie Show, Dorota Kozlowska shares her inspiring journey from a hesitant high school student to a successful professional in offensive security and content creation. She discusses her challenges in breaking into the male-dominated field of cybersecurity, her passion for pen testing, and her commitment to empowering other women in tech through her podcast, 'The Woman in Red.' Dorota emphasizes the importance of personal branding, continuous learning, and the courage to pursue one's dreams despite obstacles. ========================= Connect with Dorota Kozlowskahttps://www.linkedin.com/in/dorota-kozlowska/https://www.woman-in-red.com/https://www.youtube.com/@womaninredpresents========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
180
Keelan Knox: Breaking Things to Building Defenses
In this episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity expert Keelan Knox, who shares his fascinating hacker origin story. Keelan recounts his early curiosity about technology, which led him to dismantle various devices and eventually discover the world of hacking and cybersecurity. He emphasizes the importance of social engineering in the field and how it became a natural skill for him. The conversation delves into Keelan's educational background, his diverse roles in cybersecurity, and the significance of networking in building a successful career in the industry.As the discussion progresses, Keelan offers valuable advice for aspiring cybersecurity professionals, highlighting the importance of understanding one's interests and strengths. He shares insights on how to effectively communicate technical concepts to non-technical stakeholders, emphasizing that cybersecurity should complement business objectives. The episode wraps up with Keelan discussing his ongoing learning methods, including hands-on practice in home labs and engaging with the cybersecurity community at conferences. This episode is a treasure trove of insights for anyone interested in pursuing a career in cybersecurity or enhancing their skills in the field.========================= Connect with Keelan Knoxhttps://www.linkedin.com/in/mrkknox/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie
-
179
Michael Farnum & Sam Van Ryder: Building CYBR.SEC.Community
In this episode of The Phillip Wylie Show, Phillip Wylie sits down with Michael Farnum and Sam Van Ryder to discuss the growth of CYBR.SEC.Community, formerly known as HOU.SEC.CON. They share their hacker origin stories and how a grassroots conference evolved into a national, community-driven cybersecurity movement.The conversation covers the expansion of CYBR.SEC.Community to include OT.SEC.CON, EXEC.SEC.CON, YOUTH.SEC.CON, CYBR.HAK.CON, and CYBR.SEC.Media, the community’s media platform focused on education, storytelling, and amplifying voices across the cybersecurity ecosystem. The episode highlights accessibility, youth and veteran involvement, bridging IT and OT security, and why curiosity and real-world experience remain essential to building the future of cybersecurity.========================= Connect with Michael Farnum and Sam Van Ryder:https://www.linkedin.com/in/mfarnum/https://www.linkedin.com/in/svanryder/CYBR.SEC.Community Links:https://www.cybrsec.community/https://www.cybrseccon.com/https://www.otseccon.com/https://www.cybrsec.community/execsecconhttps://www.cybrhakcon.com/https://www.cscusergroup.com/https://www.cybrsecmedia.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie/=========================
-
178
Travis Weathers: From Military to Physical Security Expert
In this episode of the Phillip Wylie Show, host Phillip’s guest is Travis Weathers, a seasoned professional in cybersecurity and penetration testing. Travis shares his unique journey from military service to becoming a successful entrepreneur in the cybersecurity field. He discusses the importance of specialized training, the differences between red teaming and traditional pen testing, and offers valuable advice for those looking to advance their careers in cybersecurity. The conversation also touches on the role of AI in the industry and the innovative tools being developed for physical pen testing.This episode is sponsored by Teleport, an identity-first security platform. Learn more: https://fandf.co/4p98SC6========================= Connect with Travis Weathers:https://www.linkedin.com/in/trweathers/https://mwgroup.io/https://vtemlabs.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie/=========================Chapters00:00 Introduction and Guest Background01:32 Travis Weathers' Hacker Origin Story05:31 Transitioning to Business Ownership09:33 Training and Course Offerings13:01 Advice for Aspiring Pen Testers18:17 Understanding Red Teaming vs. Pen Testing21:50 Career Advancement Strategies24:40 The Role of AI in Cybersecurity27:31 Teleport Ad30:09 Phillip Wylie Show Outro
-
177
Unpacking Cybersecurity: Stories from the Cyber Distortion Podcast
SummaryIn this episode of the Phillip Wylie Show, Phillip welcomes Jason and Kevin from the Cyber Distortion Podcast, diving deep into their hacker origin stories and the evolution of their podcasting journey. Kevin shares his unconventional path from marketing and graphic design to IT, highlighting how a conversation about salaries led him to pursue Microsoft certifications and a long-standing career in technology. Jason recounts his early fascination with technology, from building science projects to coding on his first home computer, illustrating how his inquisitive nature laid the groundwork for his future in cybersecurity.The conversation shifts to their experiences in podcasting, detailing how their shared passion for technology and cybersecurity led them to create the Cyber Distortion Podcast. They discuss the challenges and joys of producing content, including their recent involvement in the IAM Machine documentary, which explores transhumanism and the impact of AI. As they prepare for their upcoming live event in North Texas, they emphasize the importance of community and collaboration in the tech space, inviting listeners to engage with their work and the hacker community.Connect with Kevin & Jasonhttps://twitter.com/DistortionCyberhttps://www.linkedin.com/in/jason-popillion-cissp-863a464/https://www.linkedin.com/in/kevin-pentecost-cissp-cism-ceh-cpt-mcse-cca-itil-f-4a61404/https://www.youtube.com/@TheCyberDistortionPodcasthttps://cyberdistortionpodcast.com/========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylie YouTube: https://youtube.com/@PhillipWylie========================= Chapters00:00 Welcome and Introduction01:32 Hacker Origin Stories: Kevin's Journey03:28 Hacker Origin Stories: Jason's Journey10:24 The Transition to Podcasting14:40 Inspiration Behind the Podcast19:54 Season Five Changes and Innovations24:20 The Return of Vito28:54 Building a Virtual Personality33:03 The Art of Problem Solving33:28 Creating the IAM Machine Documentary42:12 Upcoming Events and Community Engagement
-
176
Shubham Khichi: Journey The Future of AI in Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Shubham Khichi, a cybersecurity expert and entrepreneur. They discuss Shubham's journey from a computer science student to the founder of CyberAGI, a company focused on enhancing cybersecurity through AI. The conversation covers the importance of human involvement in cybersecurity, innovative threat modeling techniques, and the role of AI in augmenting the capabilities of security professionals. Shubham emphasizes the need for privacy in AI applications and offers advice for aspiring pen testers, highlighting the significance of self-belief and continuous learning in the rapidly evolving tech landscape.This episode is sponsored by Teleport, an identity-first security platform. Learn more: https://fandf.co/4pVfIwk=========================Connect with Shubham: https://www.linkedin.com/in/shubhamkhichihttps://www.cyberagi.ai/=========================Connect with your host, Phillip Wylie:LinkedIn: https://linkedin.com/in/phillipwylieYouTube: https://youtube.com/@PhillipWylie=========================Chapters00:00 Introduction and Background01:55 Shubham's Hacker Origin Story04:39 The Importance of Human Element in Cybersecurity07:20 Excalibur: A Human-Centric Security Platform10:02 Building Intuitive Security Tools11:45 The Role of Experience in Cybersecurity Startups14:27 Understanding Red Teaming vs. Pen Testing19:26 Inversion Theory in Threat Modeling24:00 AI and Privacy in Cybersecurity29:17 AI's Role in Augmenting Human Work33:19 Advice for Aspiring Pen Testers34:55 Closing Thoughts and Future Outlook
-
175
Ron Eddings: Hacker to Podcaster
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Ron Eddings, a prominent figure in cybersecurity and podcasting. They discuss Ron's journey into cybersecurity, his experiences in podcasting, and the evolution of Hacker Valley Media. The conversation delves into the importance of video and audio quality in content creation, the role of AI in cybersecurity, and the future of jobs in the industry. Ron shares insights on tools for penetration testing and the impact of AI on traditional cybersecurity roles, emphasizing the need for professionals to adapt and future-proof their careers in an AI-driven landscape.TakeawaysRon Eddings shares his unique hacker origin story.The importance of storytelling in cybersecurity careers.Podcasting can be a powerful tool for sharing knowledge.Quality video and audio are crucial for engaging content.Lighting and color correction significantly impact video quality.AI is transforming the landscape of cybersecurity.Understanding AI vulnerabilities is essential for security research.Tools like Claude code and Gemini are valuable for pentesting.Future cybersecurity roles will require adaptability to AI.Positive energy and collaboration are key to job security in the AI era.Connect with Ron:https://www.linkedin.com/in/ronaldeddings/https://hackervalley.com/Connect with Phillip:LinkedIn https://www.linkedin.com/in/phillipwylie/X (formerly Twitter) https://x.com/PhillipWylieInstagram https://www.instagram.com/phillipwylie/Chapters00:00 Introduction to Cybersecurity Podcasting01:43 Ron Eddings' Hacker Origin Story04:29 The Journey into Podcasting06:33 Evolution of Hacker Valley Media08:17 Understanding Video and Audio Quality10:38 Lighting and Its Importance in Video Production12:47 Color Grading and Post-Production Techniques14:24 Marketing and Branding in Cybersecurity17:00 AI Security Research and Prompt Injection19:11 Tools for AI Pentesting22:30 AI in Traditional Pen Testing24:12 The Future of Cybersecurity with AI27:09 Job Security in the Age of AI29:18 The Importance of Education and Experience32:53 Conclusion and Future Outlook33:39 Outro
-
174
Chris Glanden: The Power of Content in Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Chris Glanden, a cybersecurity professional and podcaster. They discuss Chris's journey into cybersecurity, his experiences in podcasting, and his recent ventures into documentary filmmaking. The conversation also touches on public speaking, community engagement through events like the Lone Star Cyber Circus, and advice for aspiring podcasters. Chris shares insights on the importance of storytelling in cybersecurity and the impact of podcasts on listeners' lives.TakeawaysChris Glanden's journey into cybersecurity began after high school.He transitioned from IT to cybersecurity in 2011.Chris started his podcast during the pandemic in 2020.He has produced two documentaries focusing on cybersecurity themes.The Lone Star Cyber Circus is a community event Chris is passionate about.Public speaking was a challenge for Chris, but he has embraced it.Chris aims to create a conference for content creators in cybersecurity.He encourages aspiring podcasters to start with a clear purpose.Feedback from listeners motivates podcasters to continue their work.Community engagement is vital for personal and professional growth.Connect with Chris:https://www.linkedin.com/in/chrisglanden/https://pr0ph-1t.com/https://www.barcodesecurity.com/
-
173
Gideon Rasmussen: Preparing for Promotion in Cybersecurity & Tech Leadership
SummaryIn this conversation, Gideon Rasmussen discusses the importance of understanding one's professional development areas and how to prepare for promotion. He emphasizes the need for individual contributors to demonstrate leadership and deliver solid performance over time to be considered for advancement.TakeawaysKnow what your areas of professional development are.Pursue your professional development actively.Prove yourself ready for promotion now.No one will provide a clear path to promotion.Write performance plans to guide your development.Run projects to showcase your skills.Demonstrate leadership even as an individual contributor.Aim for three to four years of solid performance.Deliver on projects consistently to advance.Seek feedback to improve your performance.Connect with Gideon:https://www.linkedin.com/in/gideonrasmussen/Gideon's book:Program Architecture: Fight the Good Fight (Security, Audit and Leadership Series) https://www.amazon.com/Program-Architecture-Fight-Security-Leadership/dp/1032896000
-
172
Christopher Russell: Balancing Skills in Cybersecurity
SummaryIn this conversation, Christopher Russell emphasizes the importance of being well-rounded in the field of cybersecurity. He discusses the necessity of understanding both offensive and defensive strategies, as well as the need for security professionals to grasp the business aspects of their roles. Russell highlights that a successful CISO must not only be technically proficient but also understand how security tools can support and enhance business operations.TakeawaysBeing well-rounded is essential in cybersecurity.A balance of offensive and defensive skills is necessary.Understanding various technologies is crucial.One must grasp how the business operates.An appetite for business knowledge is important.Security professionals should not just be cost centers.Enabling security tools can improve business areas.Tinkering and experimenting is part of the learning process.Thinking like a CISO involves business alignment.Collaboration between security and business is key.Connect with Christopher:https://www.linkedin.com/in/christopher-russell-5a9b20a7/
-
171
Ted Harrington: Demystifying the Hacker Mindset
SummaryIn this episode of the Philip Wylie Show, host Phillip Wylie speaks with Ted Harrington, a fellow podcaster and author, about the hacker mindset and its implications in cybersecurity. They discuss the misconceptions surrounding hackers, the importance of curiosity and creativity, and how the hacker mindset can be applied beyond technology. Ted shares his personal journey into the world of hacking, the motivation behind his new book, and offers insights on building a personal brand in the cybersecurity field. The conversation concludes with a message of optimism regarding the future of cybersecurity and the role of hackers in creating a safer digital world.TakeawaysThe hacker mindset is about curiosity and creativity.Not all hackers are malicious; many are ethical.It's never too late to pivot into cybersecurity.The hacker mindset can be applied to various fields, not just tech.Building a personal brand requires authenticity and consistency.Helping others should be the primary goal of content creation.The hacker community is diverse and includes many positive contributors.Innovation and disruption are key aspects of the hacker mindset.Ted's journey illustrates that anyone can become a hacker.Optimism is essential in the face of cybersecurity challenges.Connect with Ted:https://www.tedharrington.com/https://www.linkedin.com/in/securityted/https://www.amazon.com/Inner-Hacker-New-Way-Thinking-ebook/dp/B0FQR1SWWHChapters00:00 Introduction to the Hacker Mindset04:09 Ted Harrington's Hacker Origin Story11:27 The Inspiration Behind 'Inner Hacker'16:42 Defining the Hacker Mindset20:12 Building a Personal Brand in Cybersecurity26:46 Optimism in the Security Profession
-
170
Bat: The Evolution of a Threat Hunter
SummaryIn this episode of the Philip Wylie Show, Bat shares her journey from a childhood fascination with computers to a career in cybersecurity, specifically in threat hunting. Bat discusses her early experiences with hacking, the transition from wanting to be a pen tester to discovering a passion for digital forensics, and the day-to-day responsibilities of a threat hunter. The conversation also touches on the importance of education, certifications, and the evolving role of AI in cybersecurity.TakeawaysBat emphasizes the importance of privacy in their work.The journey into hacking often starts from a young age.Career paths in cybersecurity can vary widely.Exploring different disciplines can lead to fulfilling careers.Threat hunting involves a lot of research and documentation.AI is becoming more integrated into cybersecurity roles.Hands-on experience is crucial for success in threat hunting.Certifications can be beneficial but are not always necessary.Education in cybersecurity can be outdated and expensive.Defensive security roles are essential for protecting systems.Connect with Bat:https://x.com/batloggedChapters00:00 Introduction to the Guest and Their Background01:29 Bat's Hacker Origin Story05:14 Career Path and Transition to Cybersecurity10:14 Exploring Different Areas in Cybersecurity12:24 Day-to-Day in Threat Hunting17:49 Leveraging AI in Threat Hunting19:28 Training and Experience for Threat Hunting21:32 The Importance of Building Narratives in Security24:07 Certifications and Their Value27:12 The Value of Formal Education vs. Self-Study29:06 Closing Thoughts on Defensive Security
-
169
Mike Bell: AI Won't Take Your Job - If You Learn This
AI Won't Take Your Job - If You Learn This | Cybersecurity & Employment in the AI EraIs AI going to take your job? In this essential episode, Phillip Wylie sits down with Michael Bell, CEO and Co-founder of Suzu Labs, to dive deep into the intersection of artificial intelligence, employment security, and the future of cybersecurity. Learn why adapting to AI is crucial for your career survival and discover how to make yourself invaluable in an AI-driven workforce. From Suzu Labs' cutting-edge services to practical advice for aspiring cybersecurity professionals, Michael shares everything you need to know about thriving alongside AI technology.Whether you're a seasoned professional worried about job displacement or someone looking to break into cybersecurity, this conversation provides actionable strategies for integrating AI into your skill set and future-proofing your career.🎯 KEY TAKEAWAYS✅ AI is a tool for enhancement, not replacement✅ Focus on making yourself invaluable by integrating AI skills✅ Continuous learning is non-negotiable in the AI age✅ Human creativity and critical thinking remain irreplaceable✅ New opportunities emerge as technology evolves✅ Collaboration with AI > Competition against AI✅ Adaptability is your greatest asset✅ The future belongs to those who embrace changeConnect with Michael and Suzu Labs:https://www.linkedin.com/in/artificial-mike/https://www.linkedin.com/company/suzu-labs/https://suzulabs.com/Chapters00:00 Introduction to AI and Cybersecurity04:06 Overview of SUSE Labs and Its Services10:01 The Impact of AI on Cybersecurity14:35 The Future of Offensive Security20:19 AI's Role in Job Security23:10 The Importance of the Human Element in AI25:04 Advice for Aspiring Cybersecurity Professionals26:56 Starting Your Own Business in Cybersecurity30:06 Phillip Wylie Show Outro Video.mp4
-
168
Victoria Mosby - Embracing Ideas: Overcoming Self-Doubt
SummaryIn this conversation, Victoria Mosby emphasizes the importance of overcoming self-doubt and embracing new ideas. She encourages listeners to take risks and not let insecurities hold them back from pursuing opportunities for growth and learning.TakeawaysDon't let it talk, don't let yourself talk yourself out of a good idea.It's the fact that you tried it and this goes out to a coworker who you know it's insecurity.Embrace the possibility of failure as a learning opportunity.Reach out to others to learn more, despite insecurities.Taking risks can lead to personal and professional growth.Insecurity shouldn't prevent you from pursuing your interests.Trying new things is more valuable than the outcome.Encouragement can help others overcome their doubts.Learning is a continuous journey, not a destination.Support each other in overcoming self-doubt.Connect with Victoria:https://www.linkedin.com/in/victoria-mosby/https://www.victoriamosby.com/Chapters00:00 Introduction and Background01:52 Victoria's Hacker Origin Story04:51 The Importance of Networking07:36 Balancing Work and Personal Life10:06 The Role of AI in Policy Writing11:37 Compliance and Its Impact on Security Roles13:53 Getting into Policy Work16:44 Understanding the Sales Engineer Role19:53 Skills and Experience for Sales Engineers22:06 Breaking into Sales Engineering25:47 Overcoming Imposter Syndrome29:05 Phillip Wylie Show Outro Video.mp4
-
167
Marshall Livingston: From Restaurant to Cybersecurity
SummaryIn this episode of the Philip Wylie Show, host Phillip Wylie interviews Marshall Livingston, who shares his journey from the restaurant industry to cybersecurity. They discuss the importance of coding in cybersecurity, the impact of AI on the industry, and how it can be leveraged for business opportunities. Marshall also talks about the role of sales engineering as a career path and his current ventures in creating engaging cybersecurity training solutions. The conversation emphasizes the need for understanding AI and its implications for job automation and decision-making in the tech industry.Connect with Marshall!https://www.linkedin.com/in/marshall-livingston-007031337/Chapters00:00 Introduction and Guest Background01:09 Marshall's Hacker Origin Story04:17 The Role of Coding in Cybersecurity06:26 AI's Impact on Cybersecurity and Coding10:12 Leveraging AI for Business Opportunities12:05 Market Analysis and AI Trends15:39 The Importance of Understanding AI17:29 AI's Role in Decision Making21:28 Job Automation and AI's Impact on Employment23:54 Sales Engineering as a Career Path26:44 Marshall's Current Ventures and Future Plans
-
166
Edna Jonsson: From Coding to Cybersecurity
SummaryIn this episode of the Philip Wylie Show, Edna Jonsson shares her journey into cybersecurity, detailing her transition from coding to becoming a SOC analyst. She discusses the importance of education, certifications, and self-study, as well as the value of community and networking in the field. Edna also highlights her podcast aimed at helping newcomers to cybersecurity and encourages listeners to engage with their local cybersecurity communities.Takeaways• Edna's journey into cybersecurity began with coding and attending DEF CON.• Working in a SOC involves monitoring alerts and understanding security events.• Certifications like Security Plus and CYSA+ are beneficial for breaking into cybersecurity.• Self-study and continuous learning are crucial in the ever-evolving field of cybersecurity.• Networking and community involvement can significantly enhance career opportunities.• Edna emphasizes the importance of hands-on experience and participating in CTFs.• Volunteering at cybersecurity events can lead to valuable connections and learning opportunities.• Having a degree is not mandatory, but it can help in job applications.• Edna's podcast aims to support newcomers in their cybersecurity careers.• Resource sharing is a vital part of contributing to the cybersecurity community.Connect with Edna! https://www.linkedin.com/in/ednajonsson/https://www.youtube.com/ @EdnaJonsson Chapters00:00 Introduction to Cybersecurity Journey02:55 Edna's Hacker Origin Story05:23 Understanding the SOC Role07:46 Career Pathways from SOC10:20 Degrees and Certifications in Cybersecurity12:54 The Importance of Self-Study15:50 Community Engagement in Cybersecurity18:21 Launching the Security Chipmunks Podcast20:55 Networking and Community Building
-
165
Anand Singh: Data Security in the Age of AI
SummaryJoin Phillip Wylie as he interviews Anand Singh about his new book on AI security and the critical intersection of data protection, cybersecurity, and artificial intelligence. Anand shares his journey from working on Cray supercomputers to becoming a cybersecurity leader, and provides practical frameworks for organizations adopting AI securely.TakeawaysAI can be a useful tool for individuals.Malicious actors also leverage AI for attacks.It's crucial to secure the use of AI.AI is transforming security tooling.Understanding AI's dual nature is essential.Security for AI and AI for security are interconnected.The landscape of AI includes both benefits and risks.Organizations must be proactive in AI security.AI's potential for misuse is a growing concern.Cybersecurity strategies must evolve with AI advancements.Sound bites"AI is a very useful tool for individuals.""How are you securing your use of AI?""AI for security is becoming more important."Chapters00:00 Introduction to Anand Singh and His Book07:01 Anand's Hacker Origin Story12:30 The Importance of AI in Cybersecurity20:15 Risks of AI and Data Security25:04 Implementing AI Securely in Organizations28:02 AI vs Machine Learning and Final Thoughts29:49 Phillip Wylie Show Outro VideoConnect with Anand and get his book! https://www.linkedin.com/in/anandsinghmn/https://www.amazon.com/Data-Security-Age-Protecting-AI-Driven/dp/1968433015/My interview with Anand for the Phosphorus IoT Security Podcast:https://phosphorus.io/securing-the-foundation-cyber-strategy-in-the-age-of-smart-infrastructure-with-global-ciso-anand-singh/
-
164
Emily Dobson: From Family Influence to Cybersecurity Success
SummaryIn this episode of the Phillip Wylie Show, Emily Dobson shares her journey into cybersecurity, influenced by her family's background in technology. She discusses her experiences in digital forensics, the importance of networking, and her role in organizing conferences. Emily emphasizes the value of certifications and soft skills in the industry, as well as the significance of public speaking. The conversation concludes with her advice for newcomers in cybersecurity and her future aspirations in the field.TakeawaysEmily's interest in cybersecurity was sparked by her father's career.Networking is crucial for breaking into the cybersecurity field.Running conferences has helped Emily build valuable connections.Certifications can provide an edge in the job market.Soft skills are often as important as technical skills in cybersecurity.Public speaking can significantly enhance one's career opportunities.There are various career paths in cybersecurity beyond penetration testing.GRC roles are often overlooked but offer great starting points.Emily encourages newcomers to speak at conferences to gain experience.The importance of passion in choosing topics for presentations.Connect with Emily! https://www.linkedin.com/in/emily-dobson-cyber-technology/Chapters00:00 Introduction and Background03:23 Emily's Journey into Cybersecurity06:08 The Importance of Networking08:47 Running Conferences and Building Connections11:50 The Role of Certifications in Cybersecurity14:27 Exploring Career Paths in Cybersecurity17:27 Soft Skills in Cybersecurity20:10 Public Speaking and Overcoming Fears22:52 Future Aspirations and Closing Thoughts
-
163
Emile Fugulin: The Future of Bug Bounty Tools
SummaryIn this episode of the Phillip Wylie Show, Emile Fugulin, co-founder of Caido, discusses the evolution of cybersecurity tools, his personal journey into hacking, and the importance of community engagement in the bug bounty space. He highlights the performance challenges faced by traditional security tools and how Caido aims to address these issues through innovative design and architecture. Emile also shares insights on the integration of AI in cybersecurity, the learning curve for new users, and the future of automation in the industry.TakeawaysEmile Fugulin emphasizes the importance of competition in the cybersecurity tool market.Caido aims to improve performance and usability compared to traditional tools.The tool is designed to facilitate collaboration between hackers and developers.Caido's architecture allows for remote deployment, enhancing flexibility for users.Community engagement is crucial for Caido's development, especially in plugin creation.The bug bounty community has been a primary focus for Caido's growth and features.Efficiency in manual testing is a key consideration in Caido's design.The learning curve for Caido is designed to be less steep than traditional tools.AI integration is being approached with user control and privacy in mind.The future of cybersecurity will likely see increased automation, but human intuition remains essential.Connect with Emile!https://www.linkedin.com/in/efugulin/https://caido.io/Chapters00:00 Introduction to Caido and Emil's Background03:19 Emil's Hacker Origin Story06:05 Performance and Usability Challenges in Security Tools09:35 Caido's Technical Architecture and Community Engagement12:11 Plugin Development and Community Contributions14:14 Focus on Bug Bounty Community15:34 The Role of Automation in Pen Testing18:05 Learning Curve and Documentation for Caido21:35 AI Integration and Future of Pen Testing24:39 The Future of Cybersecurity Jobs26:51 Closing Remarks and Community Engagement
-
162
Lisa Landau: From Military Intelligence to Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Lisa Landau, a cybersecurity expert and co-founder of Threat Light. They discuss Lisa's unique journey from military intelligence to the startup world, the challenges and opportunities in cybersecurity, and the importance of hiring talent with diverse backgrounds. Lisa shares insights on how to break into the cybersecurity field, the significance of passion and critical thinking in candidates, and her vision for making cybersecurity solutions more accessible. The conversation culminates in an exploration of the founding of Threat Light and its mission to provide effective incident response solutions.TakeawaysLisa Landau emphasizes the importance of diverse experiences in cybersecurity.Working in startups allows individuals to wear many hats and gain varied skills.Hiring managers should consider potential over specific past experience.Passion for cybersecurity is crucial for success in the field.Critical thinking and the ability to work under pressure are essential traits.Cybersecurity roles often require a mindset that goes beyond a 9-to-5 job.The startup environment can be daunting but offers unique learning opportunities.Threat Light aims to make enterprise-level security accessible to all.Incident response requires speed and efficiency to mitigate risks.Hiring managers should be open-minded to candidates from non-traditional backgrounds.Connect with Lisa!http://linkedin.com/in/lisa-landau/https://www.linkedin.com/company/threatlight/https://www.threatlight.comChapters00:00 Introduction and Background03:09 Lisa's Origin Story in Cybersecurity08:46 Transitioning from Corporate to Startup Life11:33 Opportunities for New Graduates in Startups20:31 Hiring Strategies for Cybersecurity Talent23:23 The Birth of ThreatLight and Its Mission
-
161
Jon Baker: Exploring MITRE's Impact on Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, John Baker from MITRE discusses the organization's role in cybersecurity, including the development of the ATT&CK framework and the importance of threat intelligence. He shares his personal journey into the field, MITRE's structure as a nonprofit, and the evolution of their resources. The conversation also touches on the integration of AI in cybersecurity, the significance of CVEs, and the need for continuous learning in the ever-evolving landscape of cyber threats.Connect with Jon! https://www.linkedin.com/in/jonathanobaker/MITREhttps://www.mitre.org/focus-areas/cybersecurity/threat-informed-defenseChapters00:00 Introduction to MITRE and Cybersecurity Resources03:16 John Baker's Hacker Origin Story06:34 Understanding MITRE's Role and Structure08:18 Exploring MITRE's Initiatives and Projects11:04 The Development of MITRE ATT&CK15:13 The Importance of Cyber Threat Intelligence17:21 Center for Threat-Informed Defense20:11 Leveraging AI in Cybersecurity23:35 The Role of CVEs in Vulnerability Management29:36 Closing Thoughts on Cybersecurity Learning
-
160
Casey Cammilleri: From Hacker to CEO
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Casey Camilleri about the evolution of offensive security, the importance of continuous penetration testing, and the role of automation and AI in the cybersecurity landscape. They discuss Casey's hacker origin story, the shift in mindset required for modern security practices, and provide advice for aspiring penetration testers. The conversation emphasizes the need for continuous learning and adaptation in the ever-changing field of cybersecurity.Connect with Casey!https://www.linkedin.com/in/caseycammilleri/https://www.sprocketsecurity.com/Chapters00:00 Introduction and Equipment Enthusiasm02:12 The Hacker Origin Story05:03 Evolution of Penetration Testing07:33 Continuous Penetration Testing and Automation10:29 The Role of AI in Pen Testing13:03 Challenges in Application Pen Testing15:37 Mindset Shift in Cybersecurity18:31 Advice for Aspiring Pen Testers21:21 Closing Thoughts on Continuous Security
-
159
Jennifer Leggio: Building Your Personal Brand in Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, Jennifer Leggio shares her insights on personal branding, the evolution of marketing in cybersecurity, and the importance of community engagement. With a rich background in cybersecurity marketing, Jennifer discusses her journey from journalism to becoming a key player in the cybersecurity community. She emphasizes the need for marketers to understand the technical aspects of their products and the significance of authentic content creation. The conversation also touches on resilience in the face of career challenges and the importance of mental health in the industry.Chapters00:00 Introduction and Personal Branding04:02 Jennifer Leggio's Origin Story06:58 Building Personal Brands10:09 The Importance of Technical Understanding in Marketing13:04 Evolution of Marketing in Cybersecurity15:53 Content Creation and Its Value18:53 Influencer Marketing and Subject Matter Expertise22:01 The Challenges of Faking Expertise25:06 Resilience in Cybersecurity Careers28:09 Mental Health and Personal Growth31:00 Closing Thoughts and Community SupportConnect with Jennifer!https://www.linkedin.com/in/jenniferleggio/https://x.com/mediaphyter
-
158
Kat Cosgrove: From Developer to Advocate
Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Kat Cozgrove, a developer advocate and Kubernetes maintainer. They discuss Kat's journey into technology, her hacker origin story, and her transition from software engineering to developer advocacy. Kat shares insights on getting started with Kubernetes, the importance of open source contributions, and the value of networking and community engagement. They also touch on misconceptions about sales roles, the benefits of attending smaller conferences, and the significance of kindness in the open source community.Chapters00:00 Introduction 04:03 Kat's Hacker Origin Story06:59 Career Path in Technology09:50 Transition to Developer Advocacy13:00 Getting Started with Kubernetes15:52 The Importance of Community and Networking19:04 Career Evolution and Opportunities22:07 The Value of Learning to Code25:09 Exploring Non-Traditional Career Paths28:10 The Role of Sales in Tech31:08 Conferences and Community Engagement33:51 Closing Thoughts and Open Source AdvocacyConnect with Kat!https://www.linkedin.com/in/katcosgrove/https://bsky.app/profile/kat.lol
-
157
Filipi Pires: 10 Years of Cybersecurity Lessons on Patience, Growth & Career Success
**"In this inspiring cybersecurity conversation, Filipi Pires reflects on his decade-long journey in the industry, sharing lessons on patience, persistence, and embracing your personal career path. He discusses the realities of professional growth, the importance of continuous learning, and why comparing yourself to others can hold you back. Perfect for aspiring ethical hackers, penetration testers, and anyone navigating the cybersecurity career landscape."**Timestamps:00:00 Introduction02:15 Filipi’s career beginnings07:40 Lessons from a decade in cybersecurity12:30 The importance of patience and persistence17:55 Overcoming self-comparison23:10 Career advice for aspiring professionalsConnect with Filipi Pires:🔗 LinkedIn: https://www.linkedin.com/in/filipipires/🔗 Twitter/X: https://x.com/FilipiPiresFollow The Phillip Wylie Show:🎙 Podcast: https://phillipwylieshow.com📺 YouTube: https://www.youtube.com/c/phillipwylie🔗 Website: https://thehackermaker.com
-
156
Alethe Denis: The Art of Social Engineering
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Alethe Denis from Bishop Fox, exploring her journey into hacking, the significance of social engineering in cybersecurity, and the evolving landscape of phishing and red teaming. Alethe shares her unique origin story, insights into the importance of real phishing engagements, and creative methods for gaining access during physical pen tests. The conversation also touches on the ethical implications of social engineering, the challenges posed by increasing security awareness, and valuable advice for aspiring security professionals.TakeawaysAlethe's journey into hacking began with an interest in social engineering as a child.The evolution of hacking has always involved human manipulation.Real phishing engagements provide a more accurate assessment of security posture.Red teaming is essential for testing security assumptions and controls.Physical pen testing requires creative strategies to gain access.Voice phishing techniques are becoming increasingly sophisticated.Security awareness training is improving, but challenges remain.Ethical considerations are crucial in social engineering practices.AI is being misused to create fake explicit images for extortion.Networking and community engagement are vital for career growth in cybersecurity.Connect with Alethe! https://www.linkedin.com/in/alethe/https://alethedenis.com/Chapters00:00 Introduction and Background02:29 Alethe's Hacker Origin Story06:40 The Evolution of Hacking and Social Engineering08:11 Role of Social Engineering in Red Teaming10:23 The Importance of Realistic Phishing Engagements13:42 Physical Pen Testing and Access Strategies16:15 Creative Methods for Gaining Access20:03 Voice Phishing Techniques and Challenges22:56 Navigating Social Engineering and Security Awareness28:02 The Evolution of Scams and Manipulation Techniques32:43 Career Pathways in Cybersecurity40:31 Balancing Offensive and Defensive Security Roles
-
155
Damien Burks: From Aspiring Game Dev to Cloud Security Leader
SummaryIn this episode, Phillip Wylie interviews Damien Burks, who shares his journey from aspiring video game developer to a successful career in cybersecurity and cloud technologies. Damien discusses his hacker origin story, the importance of cloud computing, and the differences between major cloud service providers like AWS, Google Cloud, and Azure. He emphasizes the significance of scripting languages, particularly Python, in cloud engineering and offers advice for those looking to enter the field. Additionally, Damien talks about his community-building efforts through the DevSec Blueprint and the impact of content creation on his career.TakeawaysDamien started his journey in cybersecurity through a college club.He emphasizes the importance of cloud technologies in modern IT.AWS is seen as a more mature cloud provider compared to others.Scripting, especially in Python, is crucial for cloud engineering.Content creation can significantly enhance career opportunities.The DevSec Blueprint aims to guide aspiring DevSecOps professionals.Community engagement is vital for learning and growth in tech.Damien encourages starting content creation with what feels comfortable.Google Cloud is praised for its user-friendly interface.Continuous learning and certification are essential in tech careers.Connect with Damien Burks:LinkedIn: https://www.linkedin.com/in/damienjburks/X/Twitter: https://x.com/damienjburksDevSec Blueprint: https://www.devsecblueprint.com/YouTube: https://www.youtube.com/@damienjburks
-
154
Ryan Williams: Building Community and Creativity in Cybersecurity Media
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Ryan Williams, the publisher of HVCK Magazine. They discuss the importance of networking within the cybersecurity community, the evolution of content creation, and the aesthetic of cybersecurity media. Ryan shares his journey into cybersecurity, the creative process behind HVCK Magazine, and the role of AI in art. They also delve into offensive security practices, advice for aspiring professionals, and the significance of pro bono initiatives in making a positive impact in the community.TakeawaysNetworking is crucial in the cybersecurity community.Content creation can take many forms beyond video.Cybersecurity media can be visually appealing and engaging.Conferences should focus on networking and real connections.Starting a magazine can help build connections in a new industry.AI can enhance creative processes, but should be used ethically.Foundational knowledge in programming and systems is essential for security professionals.Pro bono work can help develop soft skills and give back to the community.Small, focused conferences can foster better networking opportunities.Passion for the field is key to success in cybersecurity.Connect with Ryan! LinkedIn: https://www.linkedin.com/in/ryan-williams-4068351b8/HVCK eZine: https://heyzine.com/flip-book/cd19181153.htmlHVCK eZine back issues: https://hvck-magazine.github.io/Chapters00:00 Introduction to the Phillip Wylie Show and Guests02:50 Networking in the Cybersecurity Community05:30 Content Creation in Cybersecurity08:10 The Aesthetic of Cybersecurity Media11:17 The Evolution of Cybersecurity Conferences13:46 The Journey to Starting HVCK Magazine16:22 The Creative Process Behind HVCK Magazine18:51 The Role of AI in Creative Work21:36 Offensive Security and Cybersecurity Practices24:26 Advice for Aspiring Offensive Security Professionals26:53 Pro Bono Initiatives in Cybersecurity29:50 Closing Thoughts and Future Endeavors
-
153
Jessica Hoffman: Live from Boardwalk Bytes 2025
SummaryIn this engaging conversation, Phillip Wylie and Jessica Hoffman discuss the importance of community in cybersecurity, sharing insights on networking, hiring practices, and the value of volunteering. Jessica shares her hacker origin story and emphasizes the need for soft skills in the industry. They also explore the significance of mentorship and leadership in advancing careers within cybersecurity, encouraging individuals to seek connections and support in their professional journeys.TakeawaysNetworking is essential for success in cybersecurity.Community involvement can significantly enhance career opportunities.Hiring managers should prioritize skills and initiative over degrees.Volunteering can open doors and create valuable connections.Soft skills are crucial for effective communication in cybersecurity roles.Mentorship is vital for personal and professional growth.Imposter syndrome is common; everyone experiences it.A diverse network of mentors can provide guidance and support.Being proactive and showing up can lead to unexpected opportunities.Leadership in cybersecurity requires emotional intelligence and support for team members.Sound bites"Networking is your secret weapon.""Forget about the college, right?""You should have a gang gang of mentors."Chapters00:00 Community Connections in Cybersecurity02:10 Jessica Hoffman's Hacker Origin Story05:08 The Importance of Networking and Community08:44 Hiring Insights: Skills Over Degrees11:53 Volunteering: A Pathway to Career Advancement15:43 Building a Supportive Network18:27 The Role of Soft Skills in Cybersecurity22:17 Leadership and Mentorship in CybersecurityConnect with Jessica! https://www.linkedin.com/in/jessica-hoffman-cissp/
-
152
Matt Brown: Hardware Hacking & Content Creation
Episode OverviewJoin host Phillip Wylie as he interviews Matt Brown, a cybersecurity professional, hardware hacker, and successful YouTuber who has grown from zero to over 100,000 subscribers in just two years. This episode dives deep into hardware security, IoT penetration testing, content creation strategies, and the future of cybersecurity careers in the age of AI.Guest BioMatt Brown is a cybersecurity professional specializing in hardware hacking and IoT security. He's the creator of a popular YouTube channel focused on unedited, real-time hardware hacking tutorials. Matt has experience in offensive security, bug bounty hunting, and has won multiple live hacking events, including competitions hosted by Amazon. He holds degrees in IT and computer engineering with a focus on information assurance.Key Topics CoveredHardware Security & IoT HackingGetting started in hardware hacking without expensive equipmentEssential tools and techniques for IoT penetration testingMicrocontroller vs. Linux-based device securityHardware security conference insights from Hardwear.io USAThe growing demand for hardware security professionalsContent Creation SuccessHow Matt grew from 0 to 100K+ YouTube subscribers in 2 yearsThe power of unedited, mistake-inclusive contentEquipment setup for hardware hacking videosMonetization through bug bounty opportunitiesBuilding authentic connections with technical audiencesCareer DevelopmentBreaking into offensive security and penetration testingThe value of diverse technical backgrounds (sysadmin, development, blue team)Academic vs. self-taught paths in cybersecurityWhy communication skills are crucial for pen testersJob market opportunities in hardware securityAI and the Future of CybersecurityHow AI tools can enhance rather than replace security professionalsUsing AI for reconnaissance and information gatheringThe importance of critical thinking when using AI toolsCareer advice for staying relevant in an AI-driven worldHacker Origin StoryMatt's journey began in junior high with an electronics and soldering class - an opportunity he notes many people don't have today. His first real introduction to hacking came through a YouTube video demonstrating WEP cracking using a bootable Linux CD. This experience of seeing his home network's Wi-Fi password decrypted sparked his passion for cybersecurity.Connect with Matt BrownYouTube Channel: https://www.youtube.com/ @mattbrwn LinkedIn: https://www.linkedin.com/in/mattbrwn/Website: https://brownfinesecurity.com/
-
151
Matt Toussain: From JAG Aspirations to Cybersecurity
SummaryIn this engaging episode of "The Phillip Wylie Show," host Phillip Wylie welcomes cybersecurity expert Matthew Toussain. Known for his extensive history in the cybersecurity field, Matt opens up about his unconventional career path, from aspiring to be an Air Force lawyer to developing a passion for cybersecurity. This episode covers a multitude of insights into the world of offensive security, open-source development, and vulnerability management, all backed by Matt's diverse experiences and successes in the cybersecurity landscape.Throughout the episode, Matt shares invaluable advice for those entering the offensive security field, highlighting the importance of contributing to open-source projects and understanding key programming languages. He elaborates on his project, SeriousScan, an open-source vulnerability scanner aimed at providing affordable security solutions for mid-cap firms. Discussing the evolving landscape of cybersecurity, Matt emphasizes the impact of artificial intelligence on security practices and development, shedding light on modern strategies to secure environments against potential threats. Listeners are treated to an in-depth look at the significance of vulnerability management and how organizations can optimize their cybersecurity efforts.Takeaways: The advanced capabilities of modern AI tools enable them to understand programming languages like TypeScript, Golang, and Python significantly better than others. The podcast discusses the importance of vulnerability management, emphasizing that organizations must actively manage vulnerabilities to prevent exploitation. Penetration testing provides a crucial opportunity to not only identify vulnerabilities but also to understand the context and potential risks associated with them. Listeners are encouraged to leverage real-world examples and case studies to justify security budgets and improve vulnerability management programs. The conversation highlights the significance of hands-on experience and practical application in learning cybersecurity skills, particularly through capture-the-flag competitions. The necessity of open-source contributions is reiterated as a vital avenue for aspiring cybersecurity professionals to demonstrate their skills and commitment to the field.Resources:https://www.linkedin.com/in/matthew-toussain/https://www.linkedin.com/company/open-security/https://opensecurity.com/https://sirius.publickey.io/
-
150
Kevin Woods: Why Companies MUST Invest in Junior Cyber Talent
SummaryIn this episode of the Phillip Wylie Show, Kevin Woods from GuidePoint Security shares his unique journey into cybersecurity, emphasizing the importance of community support, hands-on experience, and investing in entry-level talent. He discusses the various paths one can take in the cybersecurity field, the value of certifications, and the role of education in preparing individuals for careers in this industry. The conversation highlights the need for companies to take risks on junior talent and the significance of providing opportunities for growth and development in cybersecurity.Takeaways• Kevin Woods transitioned from a biology background to cybersecurity through military service.• Community support plays a crucial role in career development in cybersecurity.• Investing in entry-level talent can yield long-term benefits for companies.• Hands-on experience is essential for success in cybersecurity roles.• There are various paths in cybersecurity beyond just pen testing.• Certifications can help demonstrate foundational knowledge to employers.• Boot camps can be beneficial, but research is necessary to find quality programs.• Passion for cybersecurity can be showcased through personal projects and contributions.• Companies need to take risks on junior talent to address the skills gap in the industry.• Education must evolve to meet the demands of the cybersecurity landscape.Sound Bites"Education is key for our success.""We have to invest in people."Chapters00:00 Introduction to Cybersecurity Journeys02:28 Kevin's Unique Path to Cybersecurity05:27 The Importance of Community and Support07:50 Investing in Entry-Level Talent09:47 The Role of Education in Cybersecurity11:05 Exploring Different Cybersecurity Roles13:13 Hands-On Experience vs. Theory17:17 Finding Your Passion in Cybersecurity20:01 Showcasing Skills on LinkedIn21:46 The Value of Certifications23:48 Boot Camps: Pros and Cons27:25 Encouraging Risk-Taking in Hiring29:21 The Future of Cybersecurity CareersResourceshttps://www.linkedin.com/in/krwoods/
-
149
From Military to Cybersecurity: John Rodriguez on Mentorship, Ransomware, and Building Resilient Defenses
The Phillip Wylie Show episode featuring John Rodriguez from Cyber Dagger:🔍 Episode Summary:In this episode of The Phillip Wylie Show, cybersecurity expert John Rodriguez, founder of Cyber Dagger, shares his inspiring journey from the military to launching a cybersecurity company. John dives into the critical challenges faced by educational institutions and nonprofits, the growing threat of ransomware, and why a holistic security strategy is vital. He emphasizes the power of mentorship, community service, and continuous hands-on learning in shaping the next generation of cybersecurity professionals. This conversation is packed with real-world insights, career tips, and practical approaches to improving cyber defenses.✅ Key Takeaways:Giving back through cybersecurity strengthens communities and builds talent pipelines.Diverse backgrounds, like military service, offer valuable skills for cyber careers.Schools and nonprofits are prime targets for ransomware and must prioritize security.Mentorship and guidance are essential to developing future cyber leaders.Adversarial thinking is crucial for effective red teaming and threat response.Building in-house tools and platforms can greatly improve cyber resilience.Don’t rush—take time to master the fundamentals and stay curious.🎧 Memorable Sound Bites:"It's important that we stay together.""Don't rush through it.""Leave it better than what you found it."🕒 Episode Chapters:00:00 – Intro to John Rodriguez & Cyber Dagger02:22 – From Military to Cybersecurity04:45 – Mentorship's Role in Cybersecurity07:05 – Securing K–12 and Nonprofits09:31 – Ransomware Realities in Education12:16 – Why Incident Response Matters15:48 – Pen Testing vs. Incident Response18:18 – Real-World Testing in Cybersecurity21:38 – Role of EDR & Security Platforms24:53 – Military Influence on Cyber Strategy27:49 – Holistic Security: Why It Matters31:05 – Building In-House Security Tools36:09 – Career Advice for Aspiring Pros41:15 – The Power of Mentorship & Community🔗 Resources & Links:Connect with John Rodriguez: LinkedInLearn more about Cyber Dagger: Website | LinkedIn
-
148
Dan DeCloss: The Evolution of Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Dan DeCloss, founder of PlexTrac, about his journey in cybersecurity, the evolution of pen testing, and the challenges faced in the industry. Dan shares his hacker origin story, insights on recruiting talent, and the inspiration behind PlexTrac, a tool designed to streamline the pen testing reporting process. They discuss the future of cybersecurity, including the role of AI and the importance of community engagement in recruiting talent.Takeaways• Dan DeCloss has over 20 years of experience in cybersecurity.• PlexTrac aims to simplify the pen testing reporting process.• Networking is crucial for breaking into cybersecurity.• BSides events are great for recruiting talent.• The cybersecurity landscape has evolved significantly over the years.• AI is becoming increasingly important in cybersecurity tools.• Pen testing is not just about finding vulnerabilities but also about effective reporting.• Community engagement is vital for talent acquisition in cybersecurity.• PlexTrac was inspired by the challenges of report writing in pen testing.• The future of PlexTrac includes enhanced features and AI integration.Sound Bites"I feel like we truly helped the industry.""AI is going to help our customers.""We do have a free trial."Chapters00:00 Introduction to PlexTrac and Dan DeCloss03:01 Dan's Hacker Origin Story07:19 Evolution of Cybersecurity and Pen Testing13:39 Types of Pen Testing and Experience16:31 Advice for Aspiring Pen Testers20:33 Recruiting Talent in Cybersecurity23:13 Inspiration Behind PlexTrac30:10 Future Roadmap for PlexTracResourceshttps://www.linkedin.com/in/ddecloss/https://www.linkedin.com/company/plextrac/Try PlexTrac Core for Free
-
147
Ashley Sequeira: The Importance of Community in Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, Ashley Sequeira shares her journey into cybersecurity, discussing her new role at Census, her hacker origin story, and the importance of community and networking in the field. She provides valuable advice for those looking to break into cybersecurity, emphasizing the need for persistence, mentorship, and the significance of understanding the geopolitical context in security research. Ashley also delves into her research on streaming devices and the importance of community involvement in the cybersecurity space.Takeaways• Ashley started her career in music and martial arts before pivoting to IT and cybersecurity.• Networking and mentorship are crucial for career advancement in cybersecurity.• Persistence is key; many rejections can lead to success.• Community involvement can accelerate your career and connections.• Research in cybersecurity can benefit from understanding geopolitical contexts.• Security research can be approached from various angles, not just technical.• Volunteering in the community can lead to valuable connections and opportunities.• Reading and self-education are essential for getting started in security research.• The cybersecurity community is supportive and fosters lifelong friendships.• Foundational knowledge in IT and networking is vital for success in cybersecurity.Sound Bites"This is where I'm supposed to be.""Community is everything.""I was in that Google video!"Chapters00:00 Introduction to Cybersecurity Community04:51 Hacker Origin Stories and Career Advice11:21 Research on Hardware Security Risks16:56 The Importance of Community in CybersecurityResourceshttps://www.linkedin.com/in/ashleyars/
-
146
Eric Cole: From CIA to Cybersecurity
SummaryIn this episode of the Phillip Wylie Show, Dr. Eric Cole shares his journey from a computer science student to a cybersecurity expert with a rich history at the CIA. He discusses the importance of personal branding in the cybersecurity field, the transition from offensive to defensive security, and the need for CISOs to be recognized as chief officers within organizations. Eric emphasizes the significance of teaching and contributing to the cybersecurity community while also addressing the challenges posed by misinformation and the evolving landscape of technology.Takeaways• Personal branding can significantly enhance your career opportunities.• Eric Cole's journey into cybersecurity began with a CIA internship.• The transition from offensive to defensive cybersecurity is crucial.• Teaching is a natural progression for those passionate about cybersecurity.• CISOs should be recognized as chief officers, not just technical roles.• Cybersecurity is fundamentally a business problem that requires risk management.• Building a personal brand in cybersecurity is essential for visibility.• Embracing technology is vital for modern cybersecurity practices.• Data quality and correlation are more pressing issues than data storage.• Cybersecurity professionals must adapt to the evolving technological landscape.Sound Bites"CISO role is broken in most companies.""Embrace technology, don't fight it.""Don't think of cybersecurity as a roadblock."Chapters00:00 Introduction to Personal Branding in Cybersecurity01:11 Eric Cole's Hacker Origin Story09:44 Transitioning from CIA to Cybersecurity Leadership14:54 The Importance of Experience Over Pay20:11 Misinformation and Data Quality Issues24:36 The Role of the CISO in Modern Organizations30:24 Building a Strong Personal Brand32:42 Embracing Technology in CybersecurityResourceshttps://www.linkedin.com/in/ericcole1/https://secure-anchor.com/
-
145
Chris Traynor: Hack Your Way Into a Cyber Security Career
SummaryIn this episode of the Phillip Wylie Show, Chris Traynor shares his journey into the cybersecurity field, discussing his hacker origin story, the impact of post-breach opportunities, and the nuances of breaking into offensive security. He emphasizes the importance of hands-on experience, the role of certifications, and shares engaging stories from his pen testing career. Chris also provides valuable insights on the security mindset and the collaborative nature of cybersecurity.Takeaways• Chris Traynor emphasizes the importance of community involvement in cybersecurity.• Post-breach organizations often have better budgets for security training and tools.• Transitioning into offensive security requires a shift in mindset to think like an attacker.• Certifications can help get past initial job screenings but are not always indicative of skill.• Hands-on experience is crucial for success in pen testing roles.• Building home labs can provide practical experience in cybersecurity.• Understanding the stories behind security incidents is vital for effective communication.• Not all security systems can be 100% secure; it's about managing risks effectively.• Collaboration between security teams and organizations is essential for improvement.• Training should focus on practical applications and real-world scenarios.Sound Bites"I wanted to figure out how things work.""Certifications do serve their purpose.""Hands-on experience is the biggest thing."Chapters00:00 Introduction to Cybersecurity and Community Engagement01:40 Chris Traynor's Hacker Origin Story05:06 Leveraging Post-Breach Opportunities07:24 Breaking into Offensive Security13:04 The Role of Certifications in Cybersecurity19:38 Gaining Hands-On Experience in Pen Testing22:45 Notable Pen Testing Stories and Experiences29:02 Final Thoughts on Security and CollaborationResourceshttps://www.linkedin.com/in/chris-traynor/https://www.antisyphontraining.com/instructor/chris-traynor/
-
144
From Hacking to Entrepreneurship: The PhantomSec Story
SummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie engages with cybersecurity experts Grant Smith and Justin Perez, exploring their unique journeys into the world of hacking and cybersecurity. The conversation delves into their origins as hackers, the founding of their company PhantomSec, and the innovative techniques they are developing for EDR evasion. They discuss the importance of hands-on experience in cybersecurity education, the value of certifications, and what qualities they look for in ideal candidates for cybersecurity roles. The episode provides insights into the evolving landscape of cybersecurity and the challenges faced by newcomers in the field.Takeaways• Justin's early fascination with technology led to his hacking journey.• Grant's childhood pranks sparked his interest in cybersecurity.• PhantomSec was born out of a need for better EDR evasion tools.• Hands-on experience is crucial for success in cybersecurity.• Curiosity drives innovation in the cybersecurity field.• Many educational institutions lack practical cybersecurity training.• Certifications can help but shouldn't be the only focus for candidates.• Real-world experience often outweighs theoretical knowledge in hiring.• CVE contributions can enhance a candidate's profile significantly.• Passion and curiosity are key traits for success in cybersecurity.Sound Bites• "That's like kind of the hacker story."• "You have to learn those things."• "Don't get discouraged as well."Chapters00:00 Introduction to Cybersecurity Journeys01:13 Hacker Origin Stories: Justin Perez04:12 Hacker Origin Stories: Grant Smith06:57 The Birth of PhantomSec10:08 Innovations in EDR Evasion13:49 Getting Started in Offensive Security16:20 The Role of Education in Cybersecurity21:01 The Importance of Hands-On Experience24:50 Certifications and Their Value29:32 Evaluating Candidates in CybersecurityResourceshttps://www.linkedin.com/in/justin-perez215/https://www.linkedin.com/in/grant-smith-cyber/https://www.linkedin.com/company/phantom-cyber-group/https://phantomsec.tools/
-
143
Luke McOmie: Pyr0's Red Team Journey
SummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Luke McOmie, also known as Pyro, a prominent figure in the hacker and cybersecurity community. They discuss the value of smaller conferences, Luke's journey into hacking, memorable red teaming experiences, and the importance of community engagement in the cybersecurity field. Luke shares insights on getting started in red teaming, the evolution of the industry, and the significance of building relationships at conferences.Takeaways• Smaller conferences foster better relationships.• Luke's first computer was an AST-486SX.• Hacking the school district led to early trouble.• Red teaming involves both physical and digital penetration testing.• Community engagement is crucial in cybersecurity.• Training and certifications are essential for aspiring red teamers.• Physical security assessments are increasingly required by insurance underwriters.• Networking at conferences can lead to lifelong relationships.• Urban exploration can provide valuable skills for red teaming.• The landscape of cybersecurity is evolving with new challenges.Sound Bites"I got to play with Commodore 64.""I am God.""I had a backpack full of data."Chapters00:00 Introduction to the Hacker Community03:02 The Value of Smaller Conferences06:10 Luke's Hacker Origin Story08:59 Red Teaming Experiences and War Stories17:57 Close Calls and Getting Caught24:13 The Unexpected Consequences of Cyber Operations30:37 Navigating the Path to Red Teaming35:15 The Evolution of Penetration Testing38:19 Building Connections in the Cybersecurity CommunityResourceshttps://www.linkedin.com/in/lmcomie/
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
The Phillip Wylie Show is a premier cybersecurity podcast and media source for offensive security professionals. Hosted by Phillip Wylie, globally recognized ethical hacking expert, keynote speaker, and co-author of The Pentester Blueprint, the show features elite red team operators, penetration testers, and security leaders sharing real-world tradecraft, advanced tactics, career strategy, and insights on AI-driven cyber threats.
HOSTED BY
Phillip Wylie
CATEGORIES
Loading similar podcasts...