Afleveringen
-
There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect.
In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led.
Impactful Moments:
00:00 - Introduction
02:00 - The good and bad of AI in security
04:00 - Google’s AI weapons controversy
06:30 - Deepfake scams and AI-powered phishing
09:00 - How AI helps (and fails) at programming
12:00 - Automating security research with AI
18:00 - AI-generated meeting notes & productivity hacks
21:00 - What AI should NEVER do
23:00 - The future of AI in cybersecurity
Links:
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology.
Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around.
Impactful Moments:
00:00 – Introduction01:22 – Keynote insights: Innovation meets tradition02:39 – From prosecutor to cybersecurity leader07:00 – Human-first approach to AI and security11:40 – LLMs in cybersecurity: opportunities and accuracy16:34 – Balancing risk with AI use in business23:06 – Bringing diverse talent into cybersecurity32:30 – Advice on leadership and collaboration
Links:
Connect with our guest, Edna Conway: https://www.linkedin.com/in/ednaconway/
Learn more about ISSA Middle TN here: https://issamidtn.org/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Zijn er afleveringen die ontbreken?
-
Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses.
Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses.
Impactful Moments:
00:00 - Introduction
04:15 - Why agentless devices dominate the next decade
06:30 - Insights from Ordr's “Rise of the Machines” report
08:50 - Hidden risks: 42% of devices are agentless
11:15 - Solving the "Swiss cheese" problem of security gaps
14:30 - Prioritizing vulnerabilities with business context
18:10 - Orchestration vs. automation: The harmony difference
22:00 - Why visibility is the foundation of security
27:30 - Ordr’s unique approach to securing the attack surface
Links:
Connect with our guest, Pandian Gnanaprakasam: https://www.linkedin.com/in/gpandian/
Check out Ordr’s Rise of the Machines report here: https://ordr.net/resources/rise-of-the-machines-report-2024
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible.
From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7.
Impactful Moments00:00 - Introduction
01:11 - The evolution of cybersecurity
03:03 - Cybersecurity Mergers & Acquisitions
05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation
06:00 - KC7 wins “Team of the Year” at the SANS DMAs
8:43 - Founding the KC7 Foundation
10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge
11:46 - How KC7 gamifies real-world cybersecurity
14:52 - Bringing KC7 to high school and middle school students
16:52 - Expanding access to cybersecurity careers
25:09 - A watchmaker’s journey to Microsoft
34:00 - How to get started with KC7
LinksConnect with our guest, Simeon Kakpovi on LinkedIn: https://www.linkedin.com/in/kakpovi/
Check out the Cybersecurity M&A Roundup Article here: https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity.
Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation.
Impactful Moment:00:00 - Introduction
03:00 - Defining attack surface management
06:13 - See-Know-Secure framework
09:05 - Analogies for explaining ASM to stakeholders
15:33 - Building an inventory for asset visibility
20:42 - Convincing leadership: Budget strategies
25:00 - Tools and methodologies for ASM
36:57 - Managed services vs. in-house approaches
43:00 - Starting your ASM journey
Links:
Connect with our guests –
Wes Wright: https://www.linkedin.com/in/4kidwes/
Jerich Beason: https://www.linkedin.com/in/jerich-beason/
Learn more about Ordr: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role.
In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025’s fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential.
Impactful Moments:
00:00 - Introduction
02:14 - Speed vs. safety: AI system challenges
05:30 - Why experience matters more than information
07:45 - Legal stakes for deepfakes and AI
18:36 - Marco’s creative journey in cybersecurity
28:00 - Jailbreaks: Risks and surprising AI findings
37:13 - 2025 predictions: The rise of agents
41:00 - Closing thoughts and the power of community
Links:
Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/
Chuck Brooks' 2025 Cybersecurity Predictions article: https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/
Focus Areas for the FaccT Conference News: https://facctconference.org/2025/focusareas
“Unreasonable Hospitality” by Will Guidara Book Link: https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could.
In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction.
Impactful Moments:
00:00 – Introduction
02:00 – David Shipley’s journey from journalist to cybersecurity leader
06:10 – Why motivation outshines knowledge in security training
08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity
11:17 – How overreliance on tech increases click rates
17:03 – Cybercriminals’ evolving tactics and emotional manipulation
25:00 – Gamification in cybersecurity: Changing security behaviors
30:56 – Using the SCARF model to enhance security culture
39:45 – Emotional intelligence as a defense against AI threats
Links:
Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/
Learn more about Beauceron Security here: www.beauceronsecurity.com/partner
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks.
Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.
Impactful Moments:
00:00 - Introduction
03:00 - Cole’s first exposure to cybersecurity
06:30 - Pivotal moment: a call for mentorship
11:40 - Breaking into cleared work
18:30 - Lessons learned at Booz Allen
22:00 - The art of work-life compartmentalization
27:45 - Leadership insights from landscaping days
32:50 - What’s next for Cole at Palo Alto Networks
Links:
Connect with our guest, Cole Lisko: https://www.linkedin.com/in/matthewlisko/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.
Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.
Impactful Moments:
00:00 - Intro 03:15 - The four traits of a hacker mindset 07:40 - Hacking the first iPhone and Tesla 11:50 - Why penetration testing is misunderstood 16:30 - Risks and realities of AI deepfakes 21:20 - Applying hacker traits to entrepreneurship 28:45 - Ted’s upcoming book: Inner Hacker 33:00 - Why mindset matters most
Links:
Connect with our guest, Ted Harrington: https://www.linkedin.com/in/securityted/
Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.
Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.
Impactful Moments:
00:00 - Introduction01:56 - Iain shares his journey with AI03:29 - Demonstrating voice cloning in real-time06:31 - Risks of automated synthetic voice attacks09:46 - Impact of AI on social engineering tactics11:00 - Importance of "vibe checks" in cybersecurity15:17 - Real-world phishing and HR scam example20:00 - Uncanny Valley: Defense against AI deception23:37 - The future of AI in adversary emulation
Links:
Connect with our guest, Iain Jackson: https://www.linkedin.com/in/iain-j-98578a238/
Learn more about CovertSwarm here: https://covertswarm.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.
In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.
Impactful Moments:00:00 - Introduction07:15 - Breaking down barriers in user design15:40 - Why empathy matters in cybersecurity solutions21:05 - Challenges in bridging tech and humanity28:30 - Designing systems with people, not just for them35:10 - Practical steps to empower users in security42:45 - Final reflections on human-centered innovation
Links:
Connect with our guest, Julie Haney here: https://www.linkedin.com/in/julie-haney-037449119
Check out NIST’s Online Community of Interest here: https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi
Learn more about Human-Centered Cybersecurity on NIST’s website here: https://csrc.nist.gov/projects/human-centered-cybersecurity
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.
Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.
Impactful Moments:00:00 - Introduction01:25 - You Deserve To Be Hacked03:05 - Emulating criminal behavior: The hive structure07:55 - Social engineering tactics that really work20:16 - Physical breaches: Pentesting in action24:09 - Past the firewall: Second- and third-layer testing29:14 - Digital exploits and real-world vulnerabilities35:24 - Why organizations hesitate to invest in red teams37:33 - Building muscle memory for security
Links:
Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/
Learn more about CovertSwarm here: https://covertswarm.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.
In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.
Impactful Moments
00:00 – Intro and the AI revolution in cybersecurity
01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer
03:00 – The story behind the name ‘Intezer’
06:14 – Key challenges facing today’s SOC teams
15:04 – Top use cases for AI in the SOC
21:27 – How Intezer automates alert triage and response
37:32 – Future predictions for SOC and cybersecurity roles
48:23 – Closing thoughts and call to action
Links:
Connect with our guest, Roy Halevi: https://www.linkedin.com/in/royhalevi
Learn more about Intezer here: https://intezer.com
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr
Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.
Impactful Moments:
00:00 – Introduction04:27 – Mentorship impact: Building future leaders10:14 – Embracing diversity and servant leadership18:03 – Founding EmpoW-ER: Supporting women in cyber24:13 – Navigating stereotypes and staying resilient30:00 – Recognizing and celebrating young talent36:45 – Building an inclusive cybersecurity community
Links:
Connect with our guest, Connie Matthews: https://www.linkedin.com/in/conniematthews/
Learn more about EmpoW-ER: https://www.empower-infosec.org/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.
In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.
Impactful Moments:
00:00 – Introduction
03:15 – Building a genuine presence on LinkedIn
07:40 – Founding the Cybersecurity Gatebreakers Foundation
12:00 – Why hiring juniors is a win for cybersecurity
17:58 – Relationship building in cybersecurity
25:27 – Lessons from layoffs and overcoming failure
35:45 – Setting goals and attracting opportunities
Links:
Connect with our guest, Naomi Buckwalter: https://www.linkedin.com/in/naomi-buckwalter/
Learn more about the Cybersecurity Gatebreakers Foundation: https://www.cybersecuritygatebreakers.org/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management.
Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.
Impactful Moments:00:00 – Intro00:49 – Synthetic voices surprise in mastermind01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions03:42 – Psychology's role in cybersecurity06:07 – Human risk management explained09:14 – Deepfakes in fraud and scams15:13 – Demo of deepfake voices20:22 – Using cakes to explain large language models 27:00 – AI helps overcome creative blocks32:00 – Managing AI hallucinations and risksConnect with our guest, Perry Carpenter: https://www.linkedin.com/in/perrycarpenter
Purchase a copy of Perry’s book FAIK here: https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact.
In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.
Impactful Moments:00:00 – Introduction
02:31 – Journey from AWS to Clarity
04:00 – Cyber Dominance
05:55 – Leading Through M&A
07:00 – Redefining the CISO Role
11:00 – Shared Security Responsibility
15:15 – Balancing Mission and Family
20:00 – AI in Security
28:30 – Leadership in Incident Response
32:00 – Woodworking and Perfectionism
35:00 – Leaders Are Chosen
Links:
Connect with our guest, Nathan Case: https://www.linkedin.com/in/nathancase/
Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: https://ventureinsecurity.net/p/a-different-take-on-security-incident
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.
John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.
Impactful Moments:
00:00 – Introduction01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS02:30 – Overview of the SANS Cyber Defense Curriculum03:30 – The Role of AI in Cybersecurity05:30 – How AI is Shaping Threat Detection in SOCs09:00 – Automation and AI: Practical Use Cases15:00 – AI in Network Traffic Analysis19:00 – The Future of SOC Operations with AILinks:
Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/
Check out the SANS Cybersecurity Courses & Certifications: https://www.sans.org/cyber-security-courses/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
-
Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees?
In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.
Impactful Moments:
00:00 - Introduction
01:11 - The Basics of the Dark Web and How Criminals Operate
07:16 - Flare's Role in Cybersecurity
11:14 - Common Security Mistakes
20:04 - Pen Testing with Flare
21:33 - Exploiting Exposed Credentials
22:19 - Reconnaissance Tools and Techniques
24:38 - Email Security Concerns
28:43 - The Power of Stealer Logs
38:21 - Dark Web Tactics and AI
39:33 - Advice for Cybersecurity Leaders
42:04 - Exploring Flare’s Platform for Threat Intelligence
44:26 - Conclusion and Final Thoughts
Links:
Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/
Check out Flare here: https://try.flare.io/hacker-valley-media/
Check out Arcanum here: https://www.arcanum-sec.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
- Laat meer zien