Afleveringen

  • How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks.

    Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.

    Impactful Moments:

    00:00 - Introduction

    03:00 - Cole’s first exposure to cybersecurity

    06:30 - Pivotal moment: a call for mentorship

    11:40 - Breaking into cleared work

    18:30 - Lessons learned at Booz Allen

    22:00 - The art of work-life compartmentalization

    27:45 - Leadership insights from landscaping days

    32:50 - What’s next for Cole at Palo Alto Networks

    Links:

    Connect with our guest, Cole Lisko: https://www.linkedin.com/in/matthewlisko/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.

    Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.

    Impactful Moments:

    00:00 - Intro 03:15 - The four traits of a hacker mindset 07:40 - Hacking the first iPhone and Tesla 11:50 - Why penetration testing is misunderstood 16:30 - Risks and realities of AI deepfakes 21:20 - Applying hacker traits to entrepreneurship 28:45 - Ted’s upcoming book: Inner Hacker 33:00 - Why mindset matters most

    Links:

    Connect with our guest, Ted Harrington: https://www.linkedin.com/in/securityted/

    Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.

    Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.

    Impactful Moments:

    00:00 - Introduction01:56 - Iain shares his journey with AI03:29 - Demonstrating voice cloning in real-time06:31 - Risks of automated synthetic voice attacks09:46 - Impact of AI on social engineering tactics11:00 - Importance of "vibe checks" in cybersecurity15:17 - Real-world phishing and HR scam example20:00 - Uncanny Valley: Defense against AI deception23:37 - The future of AI in adversary emulation

    Links:

    Connect with our guest, Iain Jackson: https://www.linkedin.com/in/iain-j-98578a238/

    Learn more about CovertSwarm here: https://covertswarm.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.

    In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.

    Impactful Moments:

    00:00 - Introduction07:15 - Breaking down barriers in user design15:40 - Why empathy matters in cybersecurity solutions21:05 - Challenges in bridging tech and humanity28:30 - Designing systems with people, not just for them35:10 - Practical steps to empower users in security42:45 - Final reflections on human-centered innovation

    Links:

    Connect with our guest, Julie Haney here: https://www.linkedin.com/in/julie-haney-037449119

    Check out NIST’s Online Community of Interest here: https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi

    Learn more about Human-Centered Cybersecurity on NIST’s website here: https://csrc.nist.gov/projects/human-centered-cybersecurity

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.

    Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.

    Impactful Moments:00:00 - Introduction01:25 - You Deserve To Be Hacked03:05 - Emulating criminal behavior: The hive structure07:55 - Social engineering tactics that really work20:16 - Physical breaches: Pentesting in action24:09 - Past the firewall: Second- and third-layer testing29:14 - Digital exploits and real-world vulnerabilities35:24 - Why organizations hesitate to invest in red teams37:33 - Building muscle memory for security

    Links:

    Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/

    Learn more about CovertSwarm here: https://covertswarm.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.

    In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.

    Impactful Moments

    00:00 – Intro and the AI revolution in cybersecurity

    01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer

    03:00 – The story behind the name ‘Intezer’

    06:14 – Key challenges facing today’s SOC teams

    15:04 – Top use cases for AI in the SOC

    21:27 – How Intezer automates alert triage and response

    37:32 – Future predictions for SOC and cybersecurity roles

    48:23 – Closing thoughts and call to action

    Links:

    Connect with our guest, Roy Halevi: https://www.linkedin.com/in/royhalevi

    Learn more about Intezer here: https://intezer.com

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.

    In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.

    Impactful Moments:

    00:00 - Introduction

    01:35 - Asset visibility and blind spots

    03:47 - What keeps CTOs and CISOs up at night

    08:45 - Bridging IT and OT: CAASM explained

    12:10 - Real-world use cases for CAASM

    18:37 - The power of automated asset management

    25:00 - Why continuous inventory is a game-changer

    35:59 - Wes’s advice for getting started with Ordr

    Links:

    Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/

    Learn more about Ordr here: https://ordr.net/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.

    Impactful Moments:

    00:00 – Introduction04:27 – Mentorship impact: Building future leaders10:14 – Embracing diversity and servant leadership18:03 – Founding EmpoW-ER: Supporting women in cyber24:13 – Navigating stereotypes and staying resilient30:00 – Recognizing and celebrating young talent36:45 – Building an inclusive cybersecurity community

    Links:

    Connect with our guest, Connie Matthews: https://www.linkedin.com/in/conniematthews/

    Learn more about EmpoW-ER: https://www.empower-infosec.org/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.

    In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.

    Impactful Moments:

    00:00 – Introduction

    03:15 – Building a genuine presence on LinkedIn

    07:40 – Founding the Cybersecurity Gatebreakers Foundation

    12:00 – Why hiring juniors is a win for cybersecurity

    17:58 – Relationship building in cybersecurity

    25:27 – Lessons from layoffs and overcoming failure

    35:45 – Setting goals and attracting opportunities

    Links:

    Connect with our guest, Naomi Buckwalter: https://www.linkedin.com/in/naomi-buckwalter/

    Learn more about the Cybersecurity Gatebreakers Foundation: https://www.cybersecuritygatebreakers.org/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management.

    Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.

    Impactful Moments:00:00 – Intro00:49 – Synthetic voices surprise in mastermind01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions03:42 – Psychology's role in cybersecurity06:07 – Human risk management explained09:14 – Deepfakes in fraud and scams15:13 – Demo of deepfake voices20:22 – Using cakes to explain large language models 27:00 – AI helps overcome creative blocks32:00 – Managing AI hallucinations and risks

    Connect with our guest, Perry Carpenter: https://www.linkedin.com/in/perrycarpenter

    Purchase a copy of Perry’s book FAIK here: https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact.

    In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.

    Impactful Moments:

    00:00 – Introduction

    02:31 – Journey from AWS to Clarity

    04:00 – Cyber Dominance

    05:55 – Leading Through M&A

    07:00 – Redefining the CISO Role

    11:00 – Shared Security Responsibility

    15:15 – Balancing Mission and Family

    20:00 – AI in Security

    28:30 – Leadership in Incident Response

    32:00 – Woodworking and Perfectionism

    35:00 – Leaders Are Chosen

    Links:

    Connect with our guest, Nathan Case: https://www.linkedin.com/in/nathancase/

    Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: https://ventureinsecurity.net/p/a-different-take-on-security-incident

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.

    John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.

    Impactful Moments:

    00:00 – Introduction01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS02:30 – Overview of the SANS Cyber Defense Curriculum03:30 – The Role of AI in Cybersecurity05:30 – How AI is Shaping Threat Detection in SOCs09:00 – Automation and AI: Practical Use Cases15:00 – AI in Network Traffic Analysis19:00 – The Future of SOC Operations with AI

    Links:

    Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/

    Check out the SANS Cybersecurity Courses & Certifications: https://www.sans.org/cyber-security-courses/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees?

    In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.

    Impactful Moments:

    00:00 - Introduction

    01:11 - The Basics of the Dark Web and How Criminals Operate

    07:16 - Flare's Role in Cybersecurity

    11:14 - Common Security Mistakes

    20:04 - Pen Testing with Flare

    21:33 - Exploiting Exposed Credentials

    22:19 - Reconnaissance Tools and Techniques

    24:38 - Email Security Concerns

    28:43 - The Power of Stealer Logs

    38:21 - Dark Web Tactics and AI

    39:33 - Advice for Cybersecurity Leaders

    42:04 - Exploring Flare’s Platform for Threat Intelligence

    44:26 - Conclusion and Final Thoughts

    Links:

    Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/

    Check out Flare here: https://try.flare.io/hacker-valley-media/

    Check out Arcanum here: https://www.arcanum-sec.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&T Business.

    Senthil shares information about how a new product, AT&T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evolving cybersecurity threats, including real-world examples like the Log4j vulnerability, and how its simplicity allows for a zero-touch experience.

    Impactful Moments:

    00:00 - Welcome

    01:01 - Introducing guest, Senthil Ramakrishnan

    04:01 - Security at the Network Edge

    05:57 - Fitting in With Businesses

    08:00 - “Can You Just Block It For Us?”

    10:05 - Stopping Log4j

    11:18 - Default Enabled Policy

    15:57 - How Involved is the Customer?

    16:40 - Simplifying Security for Customers

    Links:

    Connect with our guest Senthil Ramakrishnan: https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/

    Check out AT&T Dynamic Defense™:

    https://www.business.att.com/products/att-dynamic-defense.html

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Check out our upcoming events: hackervalley.com/livestreams

  • Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales.

    From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech.

    Evgeniy Kharam has authored “Architecting Success: The Art of Soft Skills and Technical Sales”, to teach the art of soft skills, and the importance of building connections through vulnerability.

    Impactful Moments:

    00:00 - Introduction

    01:08 - Meet Evgeniy Kharam

    02:21 - Ski & Snowboard Cybersecurity Conference

    06:22 - Impact of Events and Community Building

    10:19 - ‘Architecting Success’

    10:36 - Sales Engineers’ Evolving Role

    25:58 - POCs and Soft Skills

    28:01 - Your Voice: A Key Soft Skill

    31:28 - Connect with Evgeniy

    Links:

    Connect with our guest, Evgeniy Kharam: https://www.linkedin.com/in/ekharam/

    Check out Evgeniy’s Book, “Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More“ here: https://a.co/d/0xJSyew

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage.

    Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With stories and insights that will change how you think about cybersecurity, he talks about the tactics that can turn any security program into a fortress. From exploiting the overlooked to using AI for unbeatable defense, this conversation will revolutionize your approach to cybersecurity.

    00:00 Introduction

    01:29 Jason Haddix, CEO at Arcanum and Field CISO for Flare

    04:48 Origins of Arcanum

    07:04 Recon in Cybersecurity

    12:22 Recon Discoveries

    27:41 Flare's Role in Credential Management

    33:47 Tooling for Small Businesses

    35:47 Using AI for Cybersecurity

    41:23 Flare Platform Deep Dive

    43:20 Conclusion

    Links:

    Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/

    Check out Flare here: https://try.flare.io/hacker-valley-media/

    Check out Arcanum here: https://www.arcanum-sec.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward.

    Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybersecurity and battling depression after being rejected more than 300 times when applying for security roles. Joe shares advice on breaking into cybersecurity, dealing with rejection, the importance of mentorship, and staying persistent.

    00:00 Introduction

    01:00 Joe South, Principal Security Engineer and Host of the Security Unfiltered podcast

    02:34 Early Career Struggles and Breakthrough

    03:59 The Turning Point: From Help Desk to Cybersecurity

    06:44 Rejection and Finding Success

    11:17 Advice for Aspiring Cybersecurity Professionals

    16:19 The Importance of Continuous Learning in Cybersecurity

    18:10 Join the Hacker Valley Creative Mastermind!

    19:10 Securing AI Models: Challenges and Strategies

    20:10 The Importance of Communication in Security

    21:22 Experience and Career Advancement

    21:52 Rethinking Success: The Value of Being Number Two

    23:57 Pressure and Rewards of Being a CISO

    26:16 The Benefits of Podcasting and Content Creation

    32:28 Balancing Personal and Public Information

    35:27 Overcoming Adversity and Putting Yourself Out There

    38:01 Final Thoughts and Advice for Aspiring Content Creators

    Links:

    Connect with our guest, Joe South: https://www.linkedin.com/in/joseph-south/

    Check out the Security Unfiltered podcast here: https://securityunfiltered.com

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, lack of sleep, and anxiety. IT and Security burnout leads to breaches.

    For the past 4 years, Devo has been hosting SOC Analyst Appreciation Day, a virtual event where they shower SOC analysts with the love, appreciation and recognition that they deserve.

    Impactful Moments:

    00:00 - Introduction

    01:25 - Kayla Williams, Chief Information Security Officer at Devo

    01:38 - How Kayla Became a CISO

    03:06 - Challenges and Rewards

    04:23 - Burnout in Cybersecurity

    04:31 - 83% of IT professionals are Burnt Out

    09:38 - How AI Fits into the SOC

    09:59 - Key Use Cases for AI in Cybersecurity

    15:07 - Insider Threat and Employees Stealing Company Data

    18:14 - Non-Traditional Paths into Cybersecurity

    21:00 - Future of Cybersecurity and AI

    22:31 - Advice for Aspiring CISOs

    Links:

    Connect with our guest, Kayla Williams: https://www.linkedin.com/in/kaylamwilliams1/

    Check out Devo: https://www.devo.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • In this episode, Ron sits down at Black Hat with guest Seemant Sehgal, Founder & CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. Seemant highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist them in making the most of their budget.

    Impactful Moments:

    00:00 - Welcome

    00:50 - Introducing Guest, Seemant Sehgal

    02:47 - Penetration Testing vs Red Teaming

    05:22 - What A Hacker Wants

    06:17 - From our Sponsor, BreachLock

    07:35 - There’s Always A ‘Low Hanging Fruit’

    08:49 - Trusted Partners

    10:49 - Closing Doors On Hackers

    13:08 - Advice to Entrepreneurs: Knowing Your ‘Why’

    Links:

    Connect with our guest, Seemant Sehgal: https://www.linkedin.com/in/s-sehgal/

    Check out BreachLock: https://www.breachlock.com/

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

  • In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally.

    Impactful Moments:

    00:00 - Welcome

    00:56 - Hello From Vegas!

    01:41 - Conference Anxiety

    03:43 - Origins of Black Hat

    06:17 - Which Conference?

    08:18 - Conference Strategy

    11:47+ - You Can Only Pick One…

    Links:

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:

    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/