Afleveringen

  • There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect.

    In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led.

    Impactful Moments:

    00:00 - Introduction

    02:00 - The good and bad of AI in security

    04:00 - Google’s AI weapons controversy

    06:30 - Deepfake scams and AI-powered phishing

    09:00 - How AI helps (and fails) at programming

    12:00 - Automating security research with AI

    18:00 - AI-generated meeting notes & productivity hacks

    21:00 - What AI should NEVER do

    23:00 - The future of AI in cybersecurity

    Links:

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology.

    Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around.

    Impactful Moments:

    00:00 – Introduction01:22 – Keynote insights: Innovation meets tradition02:39 – From prosecutor to cybersecurity leader07:00 – Human-first approach to AI and security11:40 – LLMs in cybersecurity: opportunities and accuracy16:34 – Balancing risk with AI use in business23:06 – Bringing diverse talent into cybersecurity32:30 – Advice on leadership and collaboration

    Links:

    Connect with our guest, Edna Conway: https://www.linkedin.com/in/ednaconway/

    Learn more about ISSA Middle TN here: https://issamidtn.org/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses.

    Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses.

    Impactful Moments:

    00:00 - Introduction

    04:15 - Why agentless devices dominate the next decade

    06:30 - Insights from Ordr's “Rise of the Machines” report

    08:50 - Hidden risks: 42% of devices are agentless

    11:15 - Solving the "Swiss cheese" problem of security gaps

    14:30 - Prioritizing vulnerabilities with business context

    18:10 - Orchestration vs. automation: The harmony difference

    22:00 - Why visibility is the foundation of security

    27:30 - Ordr’s unique approach to securing the attack surface

    Links:

    Connect with our guest, Pandian Gnanaprakasam: https://www.linkedin.com/in/gpandian/

    Check out Ordr’s Rise of the Machines report here: https://ordr.net/resources/rise-of-the-machines-report-2024

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible.

    From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7.

    Impactful Moments

    00:00 - Introduction

    01:11 - The evolution of cybersecurity

    03:03 - Cybersecurity Mergers & Acquisitions

    05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation

    06:00 - KC7 wins “Team of the Year” at the SANS DMAs

    8:43 - Founding the KC7 Foundation

    10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge

    11:46 - How KC7 gamifies real-world cybersecurity

    14:52 - Bringing KC7 to high school and middle school students

    16:52 - Expanding access to cybersecurity careers

    25:09 - A watchmaker’s journey to Microsoft

    34:00 - How to get started with KC7

    Links

    Connect with our guest, Simeon Kakpovi on LinkedIn: https://www.linkedin.com/in/kakpovi/

    Check out the Cybersecurity M&A Roundup Article here: https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity.

    Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation.

    Impactful Moment:

    00:00 - Introduction

    03:00 - Defining attack surface management

    06:13 - See-Know-Secure framework

    09:05 - Analogies for explaining ASM to stakeholders

    15:33 - Building an inventory for asset visibility

    20:42 - Convincing leadership: Budget strategies

    25:00 - Tools and methodologies for ASM

    36:57 - Managed services vs. in-house approaches

    43:00 - Starting your ASM journey

    Links:

    Connect with our guests –

    Wes Wright: https://www.linkedin.com/in/4kidwes/

    Jerich Beason: https://www.linkedin.com/in/jerich-beason/

    Learn more about Ordr: https://ordr.net/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role.

    In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025’s fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential.

    Impactful Moments:

    00:00 - Introduction

    02:14 - Speed vs. safety: AI system challenges

    05:30 - Why experience matters more than information

    07:45 - Legal stakes for deepfakes and AI

    18:36 - Marco’s creative journey in cybersecurity

    28:00 - Jailbreaks: Risks and surprising AI findings

    37:13 - 2025 predictions: The rise of agents

    41:00 - Closing thoughts and the power of community

    Links:

    Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/

    Chuck Brooks' 2025 Cybersecurity Predictions article: https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/

    Focus Areas for the FaccT Conference News: https://facctconference.org/2025/focusareas

    “Unreasonable Hospitality” by Will Guidara Book Link: https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could.

    In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction.

    Impactful Moments:

    00:00 – Introduction

    02:00 – David Shipley’s journey from journalist to cybersecurity leader

    06:10 – Why motivation outshines knowledge in security training

    08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity

    11:17 – How overreliance on tech increases click rates

    17:03 – Cybercriminals’ evolving tactics and emotional manipulation

    25:00 – Gamification in cybersecurity: Changing security behaviors

    30:56 – Using the SCARF model to enhance security culture

    39:45 – Emotional intelligence as a defense against AI threats

    Links:

    Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/

    Learn more about Beauceron Security here: www.beauceronsecurity.com/partner

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks.

    Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.

    Impactful Moments:

    00:00 - Introduction

    03:00 - Cole’s first exposure to cybersecurity

    06:30 - Pivotal moment: a call for mentorship

    11:40 - Breaking into cleared work

    18:30 - Lessons learned at Booz Allen

    22:00 - The art of work-life compartmentalization

    27:45 - Leadership insights from landscaping days

    32:50 - What’s next for Cole at Palo Alto Networks

    Links:

    Connect with our guest, Cole Lisko: https://www.linkedin.com/in/matthewlisko/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.

    Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.

    Impactful Moments:

    00:00 - Intro 03:15 - The four traits of a hacker mindset 07:40 - Hacking the first iPhone and Tesla 11:50 - Why penetration testing is misunderstood 16:30 - Risks and realities of AI deepfakes 21:20 - Applying hacker traits to entrepreneurship 28:45 - Ted’s upcoming book: Inner Hacker 33:00 - Why mindset matters most

    Links:

    Connect with our guest, Ted Harrington: https://www.linkedin.com/in/securityted/

    Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.

    Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.

    Impactful Moments:

    00:00 - Introduction01:56 - Iain shares his journey with AI03:29 - Demonstrating voice cloning in real-time06:31 - Risks of automated synthetic voice attacks09:46 - Impact of AI on social engineering tactics11:00 - Importance of "vibe checks" in cybersecurity15:17 - Real-world phishing and HR scam example20:00 - Uncanny Valley: Defense against AI deception23:37 - The future of AI in adversary emulation

    Links:

    Connect with our guest, Iain Jackson: https://www.linkedin.com/in/iain-j-98578a238/

    Learn more about CovertSwarm here: https://covertswarm.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.

    In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.

    Impactful Moments:

    00:00 - Introduction07:15 - Breaking down barriers in user design15:40 - Why empathy matters in cybersecurity solutions21:05 - Challenges in bridging tech and humanity28:30 - Designing systems with people, not just for them35:10 - Practical steps to empower users in security42:45 - Final reflections on human-centered innovation

    Links:

    Connect with our guest, Julie Haney here: https://www.linkedin.com/in/julie-haney-037449119

    Check out NIST’s Online Community of Interest here: https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi

    Learn more about Human-Centered Cybersecurity on NIST’s website here: https://csrc.nist.gov/projects/human-centered-cybersecurity

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.

    Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.

    Impactful Moments:00:00 - Introduction01:25 - You Deserve To Be Hacked03:05 - Emulating criminal behavior: The hive structure07:55 - Social engineering tactics that really work20:16 - Physical breaches: Pentesting in action24:09 - Past the firewall: Second- and third-layer testing29:14 - Digital exploits and real-world vulnerabilities35:24 - Why organizations hesitate to invest in red teams37:33 - Building muscle memory for security

    Links:

    Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/

    Learn more about CovertSwarm here: https://covertswarm.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.

    In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.

    Impactful Moments

    00:00 – Intro and the AI revolution in cybersecurity

    01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer

    03:00 – The story behind the name ‘Intezer’

    06:14 – Key challenges facing today’s SOC teams

    15:04 – Top use cases for AI in the SOC

    21:27 – How Intezer automates alert triage and response

    37:32 – Future predictions for SOC and cybersecurity roles

    48:23 – Closing thoughts and call to action

    Links:

    Connect with our guest, Roy Halevi: https://www.linkedin.com/in/royhalevi

    Learn more about Intezer here: https://intezer.com

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.

    In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.

    Impactful Moments:

    00:00 - Introduction

    01:35 - Asset visibility and blind spots

    03:47 - What keeps CTOs and CISOs up at night

    08:45 - Bridging IT and OT: CAASM explained

    12:10 - Real-world use cases for CAASM

    18:37 - The power of automated asset management

    25:00 - Why continuous inventory is a game-changer

    35:59 - Wes’s advice for getting started with Ordr

    Links:

    Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/

    Learn more about Ordr here: https://ordr.net/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.

    Impactful Moments:

    00:00 – Introduction04:27 – Mentorship impact: Building future leaders10:14 – Embracing diversity and servant leadership18:03 – Founding EmpoW-ER: Supporting women in cyber24:13 – Navigating stereotypes and staying resilient30:00 – Recognizing and celebrating young talent36:45 – Building an inclusive cybersecurity community

    Links:

    Connect with our guest, Connie Matthews: https://www.linkedin.com/in/conniematthews/

    Learn more about EmpoW-ER: https://www.empower-infosec.org/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.

    In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.

    Impactful Moments:

    00:00 – Introduction

    03:15 – Building a genuine presence on LinkedIn

    07:40 – Founding the Cybersecurity Gatebreakers Foundation

    12:00 – Why hiring juniors is a win for cybersecurity

    17:58 – Relationship building in cybersecurity

    25:27 – Lessons from layoffs and overcoming failure

    35:45 – Setting goals and attracting opportunities

    Links:

    Connect with our guest, Naomi Buckwalter: https://www.linkedin.com/in/naomi-buckwalter/

    Learn more about the Cybersecurity Gatebreakers Foundation: https://www.cybersecuritygatebreakers.org/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management.

    Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.

    Impactful Moments:00:00 – Intro00:49 – Synthetic voices surprise in mastermind01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions03:42 – Psychology's role in cybersecurity06:07 – Human risk management explained09:14 – Deepfakes in fraud and scams15:13 – Demo of deepfake voices20:22 – Using cakes to explain large language models 27:00 – AI helps overcome creative blocks32:00 – Managing AI hallucinations and risks

    Connect with our guest, Perry Carpenter: https://www.linkedin.com/in/perrycarpenter

    Purchase a copy of Perry’s book FAIK here: https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact.

    In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.

    Impactful Moments:

    00:00 – Introduction

    02:31 – Journey from AWS to Clarity

    04:00 – Cyber Dominance

    05:55 – Leading Through M&A

    07:00 – Redefining the CISO Role

    11:00 – Shared Security Responsibility

    15:15 – Balancing Mission and Family

    20:00 – AI in Security

    28:30 – Leadership in Incident Response

    32:00 – Woodworking and Perfectionism

    35:00 – Leaders Are Chosen

    Links:

    Connect with our guest, Nathan Case: https://www.linkedin.com/in/nathancase/

    Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: https://ventureinsecurity.net/p/a-different-take-on-security-incident

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.

    John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.

    Impactful Moments:

    00:00 – Introduction01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS02:30 – Overview of the SANS Cyber Defense Curriculum03:30 – The Role of AI in Cybersecurity05:30 – How AI is Shaping Threat Detection in SOCs09:00 – Automation and AI: Practical Use Cases15:00 – AI in Network Traffic Analysis19:00 – The Future of SOC Operations with AI

    Links:

    Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/

    Check out the SANS Cybersecurity Courses & Certifications: https://www.sans.org/cyber-security-courses/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees?

    In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.

    Impactful Moments:

    00:00 - Introduction

    01:11 - The Basics of the Dark Web and How Criminals Operate

    07:16 - Flare's Role in Cybersecurity

    11:14 - Common Security Mistakes

    20:04 - Pen Testing with Flare

    21:33 - Exploiting Exposed Credentials

    22:19 - Reconnaissance Tools and Techniques

    24:38 - Email Security Concerns

    28:43 - The Power of Stealer Logs

    38:21 - Dark Web Tactics and AI

    39:33 - Advice for Cybersecurity Leaders

    42:04 - Exploring Flare’s Platform for Threat Intelligence

    44:26 - Conclusion and Final Thoughts

    Links:

    Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/

    Check out Flare here: https://try.flare.io/hacker-valley-media/

    Check out Arcanum here: https://www.arcanum-sec.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/