Cybersecurity career, technology, and success tips.
…
continue reading
1
Infiltrating a cybercrime group wearing a wire with ex-FBI Supervisory Special Agent
34:56
34:56
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:56
Shane Sims is back on the show with a gripping story. Seriously, if Netflix decided to make a movie or mini-series about this, I wouldn’t even be surprised…except this really happened and you’re about to get a front-row seat to how it unfolded. Shane wore a wire and infiltrated a cybercrime group back in 2005 that was stealing intellectual property…
…
continue reading
1
The evolution of cybercrime and career advice with ex-FBI Supervisory Special Agent Shane Sims
29:38
29:38
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:38
This is our most intense episode to date, and it's a fascinating one. Peer into the world of the FBI and its response to cybercrime all the way back to the 1990s. Shane was a Supervisory Special Agent responsible for building a cyber offense unit and capabilities & led all cyber offensive operations in support of counterterrorism, counterintelligen…
…
continue reading
1
AWS Security: Getting started, in-demand jobs, and what to focus on
22:11
22:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:11
In this episode, Kostas and I discuss how to get started with AWS security, what beginners and practitioners should focus on, and what’s currently hot and in-demand job wise. Kostas is the co-author of our course on Cybr: Introduction to AWS Security.
…
continue reading
1
Land your first Pentester job without prior IT experience
53:31
53:31
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
53:31
In this episode, Cybr community member Eric Gimbel walks us through step-by-step how he landed a Junior Penetration Tester job without having prior cybersecurity or IT experience. If you’ve ever been told “you need help desk experience first” or “you need 5+ years in IT before you can apply” then you need to listen to this episode, because our gues…
…
continue reading
1
DevOps, Containers, Kubernetes, and their security implications
34:39
34:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:39
In this episode, we talk about DevOps, what containers are and when they’re helpful, and Kubernetes. We also discuss security concerns to be aware of when using these technologies. Our guest, Chad Crowell, has extensive experience as a DevOps engineer and working with cloud environments. He’s a Microsoft Certified Trainer and author, and currently …
…
continue reading
1
Terraform and Infrastructure as Code with Derek Morgan
28:11
28:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:11
Heard of Terraform and Infrastructure as Code, but not too sure what it is or how to get started? In this episode, Derek Morgan explains why IaC is important, how tools like Terraform can be used, and we talk about an infrastructure delivery platform called Spacelift.
…
continue reading
1
Starting a passwordless authentication company with Dan Frye
39:10
39:10
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:10
Dan Frye joins us to talk about becoming a CISO, and then leaving that position to start his own cybersecurity startup company. His startup (Rocketansky) aimed to replace passwords and 2FA with passwordless authentication. We chat about his experience founding that business, the challenges he went through during the 2 years of running it, and why h…
…
continue reading
1
Vulnerability assessments, bug bounties, pentests, and red team engagements with Daniel Miessler
36:20
36:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:20
Daniel Miessler joins us to talk about how security assessments often get confused and misused. We talk about vulnerability assessments versus bug bounties versus pentests versus red team engagements. Oh and what’s purple team really supposed to be anyway? We wrap up by talking career advice for those interested in a role related to security assess…
…
continue reading
1
A day in the life of a Threat Researcher at the Microsoft Threat Intelligence Center
45:28
45:28
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:28
Roberto Rodriguez (@Cyb3rWard0g) talks to us about what it’s like to be a Threat Researcher at the Microsoft Threat Intelligence Center. We talk about how he got started, what a day in his life looks like, what the differences are between threat research, threat hunting, pentesting, etc...and we talk about resources that he’s created and that could…
…
continue reading
1
Becoming a Threat Intelligence Analyst and Warrior with Nicole Hoffman
28:33
28:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:33
Nicole Hoffman (@threathuntergrl) talks to us about what it’s like to be in threat intelligence and how she became an intel analyst. What I love about her story is that it’s *not* a straightforward path. Her path to cybersecurity is a winding road with lots of twists and turns. I hope that by hearing Nicole’s story, it can help you break through an…
…
continue reading
1
Managing IT & Security for businesses with Joel Miller
26:33
26:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:33
Joel is an experienced IT security professional with over 25 years of experience in the design, development, deployment, and management of enterprise systems. In this episode, he shares how he manages IT & security for multiple car dealership locations simultaneously, and what he looks for when hiring.…
…
continue reading
1
From baker to Full-Stack Developer with Miwha Geschwind
28:48
28:48
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:48
I met Miwha at a local meetup here in Denver, and we started talking about her job, how she got that job, and what led her down the path of web development. She told me that she used to have her own pastry baking business but a series of events led to her joining a coding boot camp, and then getting a full-time dev job soon after that. Then, as we …
…
continue reading
1
How to get your first IT/cybersec job with Jenny Codes
27:35
27:35
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:35
When I met Jenny about a year ago, she was wrapping up her Master’s degree. A year later, she’d transitioned from being an intern, to freelancing, contracting, and now, landing a full-time software engineering role. I invited her to the show so that we could learn how she pulled this off in such a short period of time.…
…
continue reading
1
How to get started and breakthrough in Bug Bounty Hunting with Hakluke
34:12
34:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:12
Luke Stephens (aka Hakluke) has been a Pentester, Bug Bounty Hunter, and he recently worked at Bugcrowd before striking out on his own. In this episode, I ask him about his role at Bugcrowd (a bug bounty platform), how he got started in bug bounty hunting, and how he found his first bug. Coming from a pentesting background, he initially struggled t…
…
continue reading
1
Building and maturing AppSec programs in startups
29:18
29:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:18
Spyros Gasteratos (@0xfde) is an AppSec Lead at a Fintech startup, where he manages their AppSec team in charge of securing their application’s code. We talk about their current architecture, their biggest security challenges as a Fintech organization, and how Spyros helped take the beginnings of an Application Security program to a higher maturity…
…
continue reading
1
Landing your first job and certification in cybersecurity with Emily Pearson
30:46
30:46
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:46
After working in Signals Intelligence for the Navy, Emily decided she wanted to pursue a career in cybersecurity. In this episode, she shares the steps she took to transition from active duty to being a full-time student, getting her Security+ certification, and landing her first job as a SOC Analyst in Seattle. She also shares whether her educatio…
…
continue reading
1
Incident Response as a career with Matt Trostel
34:12
34:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:12
Hear from a Cybersecurity Incident Response Team Lead at a Fortune 50 company what it’s like to be on the Blue Team fighting off threats and Red Teams with fascinating stories. On top of that, we get career advice from Matt on how to get started in this field with practical tips.
…
continue reading
1
So you want to be CIO? Here’s how to stand out and make the cut (3 of 3)
33:19
33:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:19
In our 3rd episode of the CIO mini-series with Kevin Christ, we talk about the last stretch to becoming CIO. This episode is for those who are mid-career and who want to enhance their chances to join the CIO ranks. The episode starts out with bad news based on chilling facts that odds aren’t in your favor. But, that doesn’t mean you should throw in…
…
continue reading
1
Public schools are being targeted by Cybercriminals
30:17
30:17
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:17
In this episode, Eric Lankford and Doug Levin join us to shine a light on the disturbing and dangerous cyber threats academic institutions are facing. Cyberattacks are a significant and growing threat to our nation’s K-12 public schools, students, and employees. There were ~350 publicly disclosed cybersecurity incidents that impacted K-12 schools i…
…
continue reading
1
How to increase diversity & inclusion in IT organizations with Roshanda King
40:21
40:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:21
In this episode, Roshanda King joins Shawna & Christophe in discussing how organizations (and the people within them) can work to proactively increase diversity and inclusion. As she is part of a Diversity & Inclusion Program at her current organization, you will get direct insights into what has worked for them, all the way from onboarding new hir…
…
continue reading
1
Have you heard of the National Cyber Moonshot initiative?
19:20
19:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
19:20
In this episode, our guests Bobbie Stempfley, Tom Patterson, and Eric Lankford explain and share what the National Cyber Moonshot initiative is, and the six strategic pillars for a safe and secure internet to bring economic growth, national security, enhanced privacy, technology advances, and global leadership benefits. Specifically, this episode f…
…
continue reading
1
Build a career story that will kick open the doors to CIO with Kevin Christ (2 of 3)
31:41
31:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:41
In this 2nd episode (series of 3), we welcome back Kevin Christ to pick up where we left off with the 1st episode: answering the question of “what can I do in my early career to set myself up for the CIO position?” If you have aspirations to become a CIO/CTO/etc... then definitely check out this episode because it will be full of actionable tips yo…
…
continue reading
1
Luck is when opportunity meets preparation. Start preparing to become a CIO now, with Kevin Christ (1 of 3)
27:20
27:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:20
In this episode, we explain what it means to be a CIO/CTO and we answer the question of “who makes it to that level, and how?” We explain the roles and responsibilities that CIOs face, how those are constantly evolving every few years, and how CIOs must re-invent themselves over time. We then talk about the typical paths to becoming a CIO, as well …
…
continue reading
1
A day in the life at a SOC, and entry-level positions, skills, and success tips with Bob Salmans
35:40
35:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:40
Bob Salmans, a repeat guest, has led a Security Operations Center (SOC) team with various roles and responsibilities including: threat hunting, pen testing, incident response, security risks assessments, compliance, and training. In this episode, he shares what a day in the life of a SOC team looks like, as well as tips, skills, and knowledge to fo…
…
continue reading
1
Top skills and technologies to focus on as a beginner in cybersecurity with Bob Salmans
27:00
27:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:00
Bob Salmans has over 25 years of IT experience in various roles, including serving as the Security Team Lead for the AME Group which is an IT Services company, where he leads a team that provides managed security services to their clients. In this episode, we talk about top skills to build if you’re a beginner in cybersec looking for entry-level jo…
…
continue reading
1
Lack IT or cybersecurity experience? Here’s how to stand out with Tom Sweet
32:21
32:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:21
Tom Sweet is a VP of IT Solutions at GM Financial, where he has successfully implemented and led training and upskilling programs. In this episode, he shares tips on how to overcome a lack of experience when applying for IT or cybersec jobs, and what skills/technologies to focus on learning. He also shares advice on how to make your resume, experie…
…
continue reading