Exploring Information Security – Exploring Information Security
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
In this episode of Exploring Information Security, host Timothy De Block welcomes Kevin Johnson, founder of Secure Ideas, to discuss web application penetration testing, API security, and hands-on security training. Kevin shares insights on why pentesters need to understand business risk, how API security is often misunderstood, and what participants can expect from his Breaking Bad Code workshop at ShowMeCon. He also reflects on the state of security talks at conferences, the importance of interactive learning, and Secure Ideas’ 15-year journey in the industry.
Topics Discussed:
Web Application Security Challenges – Why automated tools alone aren’t enough, and how attackers think differently.
API Security & Misconceptions – How APIs change attack surfaces and why developers often overlook key security flaws.
Breaking Bad Code Training at ShowMeCon – What attendees will learn and why hands-on hacking beats passive lectures.
Security Talks vs. Vendor Pitches – The problem with sales-driven conference talks and why real education matters.
The Evolution of Secure Ideas – Celebrating 15 years in business, plus challenge coins and community growth.
Fun Side Tangents – Muppets, hacking culture, and why Wacka Hack is the talk you don’t want to miss at ShowMeCon.
Key Takeaways:
Effective pentesting goes beyond tools—it’s about understanding the purpose and risk of an application.
API security isn’t a separate discipline—it requires a shift in attacker mindset.
Hands-on training is the best way to learn—expect to actively hack at the Breaking Bad Code workshop.
Security conference talks should educate, not sell—vendor-heavy presentations fail to engage the audience.
ShowMeCon is an invaluable event for anyone interested in offensive security and application security.
Guest Info:
Kevin Johnson – Founder & CEO of Secure Ideas, security consultant, trainer, and conference speaker.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon and Security Perspectives with Amanda Berlin
Mar 04, 2025
Summary:
Use the promo code “ExploringSec” to get $50 off your registration
In this episode of Exploring Information Security, host Timothy De Block welcomes Amanda Berlin, CEO of Mental Health Hackers & Senior Product Manager at Blumira, to discuss her experiences in security product development, incident detection, and the challenges of balancing security with usability. They explore the limitations of pentest reports, the practicality of security automation, and the psychology behind effective security awareness training. Amanda also shares insights on how small businesses can implement security without breaking the bank and what to expect from ShowMeCon.
Topics Discussed:
Amanda’s Keynote at ShowMeCon – How she ended up speaking and why Dave’s method of picking speakers is unconventional.
Security Automation vs. Usability – Why some industries can implement auto-lockouts, while others (like hospitals) cannot.
The Problem with Pentest Reports – Why they often contain unrealistic security expectations that don’t translate to real-world environments.
Getting Buy-In for Security Solutions – How to understand what organizations actually need instead of pushing the latest security trend.
The Role of Nudge Theory in Awareness Training – Why small, repeated reinforcements can be more effective than long training videos.
Security for Small Businesses – Strategies for implementing security on a limited budget and making defenses practical.
Side Tangents & Fun Conversations – Crossword puzzles, Wordle streaks, and the absurdity of marketing budgets in cybersecurity.
Key Takeaways:
Security needs to be tailored to the environment—automation can improve security, but in some cases, it can create more risks.
Pentest reports often miss the mark by listing detected issues without considering operational feasibility.
Security awareness is most effective when it’s continuous and engaging, rather than a one-time annual training.
Listening to users is critical—security teams must balance technical controls with usability needs.
ShowMeCon continues to be a top-tier conference for hands-on security learning and industry networking.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Participate in a CTF
Feb 25, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with James Pope, Vince Stoffer, and BlakeCahen from Corelight to discuss Capture The Flag (CTF) competitions and how they can be an invaluable learning tool for security professionals. Whether you're new to CTFs or a seasoned competitor, this episode covers everything from getting started to advanced strategies. The conversation dives into network-based CTFs, the skills required, and how Corelight’s own CTF events offer hands-on experience in network forensics.
Topics Discussed:
What is a CTF? Understanding how security CTF competitions work and what skills they test.
Getting Started with CTFs: Tips for beginners, from choosing the right event to practicing with the right tools.
Network Forensics and Security Analysis: How network-based CTFs differ from other styles and what data sources are most valuable.
Common Pitfalls and Mistakes: Strategies to avoid overthinking problems and making costly errors during competitions.
AI and the Evolution of CTFs: How AI is impacting CTF challenges and whether it’s changing how competitions are designed.
Guest Info:
James Pope – Director of Technical Marketing & Enablement at Corelight and experienced CTF organizer.
Vince Stoffer – Field CTO at Corelight, with a background in network security and incident response.
BlakeCahen – Security expert with experience in offensive cyber operations and threat hunting.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Real World Windows Forensics and Incident Response with JC at ShowMeCon 2025
Feb 18, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with JC, President at Snowfensive, to discuss Windows forensics, incident response, and the upcoming training session at ShowMeCon. JC shares insights on real-world forensic investigations, common challenges organizations face in responding to incidents, and how forensic methodology plays a critical role in cybersecurity operations. This episode is packed with valuable information for security professionals, IT admins, and anyone interested in digital forensics.
Connect with the Founder of ShowMeCon Dave Chronister: LinkedIn Profile
Connect with the Head Organizer for ShowMeCon Brooke Deneen: LinkedIn Profile
Topics Discussed:
ShowMeCon Training Session: What attendees can expect from JC’s Windows forensics course.
The Reality of Incident Response: The distinction between forensic analysis and incident response and how they complement each other.
Ransomware Trends: The evolution from encryption-based ransomware to data extortion and the impact on organizations.
Real-World Forensic Cases: Examples of forensic investigations, including rapid containment strategies and detecting data exfiltration.
Critical Thinking in Forensics: How forensic methodology is akin to detective work, and why troubleshooting skills are essential.
Challenges in Reporting: Why documenting forensic findings properly is just as important as the investigation itself.
Key Takeaways:
Organizations are improving at responding to ransomware but still struggle with preventing data exfiltration.
Understanding Windows forensic artifacts is crucial for both security teams and IT administrators.
Effective forensic investigations require both technical expertise and strong reporting practices.
Training and tabletop exercises are essential for preparing organizations to handle real-world incidents.
Guest Info:
JC is a cybersecurity expert specializing in Windows forensics, incident response, and offensive security services. He is the President of Snowfensive and Co-Founder of the Social Engineering Community.
Support the Podcast:
Enjoyed this episode? Leave us a review and share it with your network! Subscribe for more insightful discussions on information security and privacy.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: A Must-Attend Conference for Cybersecurity Pros
Feb 12, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with Dave Chronister and Brooke Deneen to discuss ShowMeCon, the Midwest’s premier security conferences. Dave shares the vision behind ShowMeCon, how it stands apart from other security events, and what attendees can expect from the 2025 edition. Brooke provides insights into the logistics of running the conference and the community-driven experience that makes it special. Whether you're a seasoned security professional or new to the space, this episode highlights why ShowMeCon is a must-attend event.
Listen to the episode for the promo code and get $50 off.
The Origin of ShowMeCon: How the conference came to be and its unique place in the cybersecurity event landscape.
Balancing Corporate and Hacker Culture: Creating a professional yet welcoming environment that bridges the gap between security research and IT professionals.
Venue and Experience: Why the Ameristar Casino in St. Louis is an ideal location and what makes the event an immersive experience.
Speaker and Attendee Engagement: The focus on quality content, hands-on learning, and ensuring speakers are passionate and approachable.
Expanding to New Cities: Plans to bring the ShowMeCon model to new locations like Nashville and beyond.
ShowMeCon 2025 Highlights: The return of pre-conference training, CTFs, lockpicking villages, and an exciting Fallout-themed experience.
Building a Security Community: Encouraging new speakers, creating a welcoming space, and fostering professional development.
Key Takeaways:
ShowMeCon is designed for practical security education, offering content relevant to both IT and security professionals.
The conference prides itself on being a well-run, high-quality event where speakers and attendees engage meaningfully.
Training opportunities and community events, such as CTFs and lockpicking villages, enhance the overall experience.
ShowMeCon’s future includes expansion to other cities and continued efforts to foster an inclusive and passionate security community.
Guest Info:
Dave Chronister is the founder of ShowMeCon and a cybersecurity professional with over 18 years of experience in the industry.
Brooke Deneen plays a key role in organizing ShowMeCon and ensuring the event runs smoothly.
Support the Podcast:
Enjoyed this episode? Leave us a review and share it with your network! Subscribe for more insightful discussions on information security and cybersecurity events.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Enhancing Online Privacy with Anonyome Labs
Feb 04, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with Dr. Paul Ashley, privacy expert and leader at Anonyome Labs, to discuss how individuals and organizations can take control of their digital privacy. They explore the growing need for online anonymity, the benefits of using pseudonymous identities, and the challenges posed by modern surveillance and data collection practices. Dr. Ashley provides insights into privacy-enhancing technologies and practical strategies for safeguarding personal information online.
Topics Discussed:
The Origin of Anonyomy Labs: How a team of enterprise security professionals created solutions to bring corporate-grade privacy to everyday users.
The Concept of Pseudonymous Identities: How services like MySudo allow users to compartmentalize their digital presence and limit personal data exposure.
Privacy for Everyday Users vs. High-Risk Individuals: Use cases ranging from avoiding spam to secure communications for journalists and whistleblowers.
Virtual Credit Cards and Secure Transactions: Reducing financial risk when shopping online and protecting personal banking details.
Privacy Challenges in Social Media and Online Accounts: How users can limit tracking, reduce unwanted exposure, and navigate social media restrictions.
Decentralized Identity and the Future of Online Authentication: The emerging shift from centralized logins to self-sovereign identity management.
Practical Steps to Improve Privacy: Simple actions users can take to start protecting their online presence today.
Key Takeaways:
Personal privacy requires active management—tools like MySudo help compartmentalize information to reduce exposure.
Using pseudonyms, temporary email addresses, and virtual credit cards can help protect against identity theft and financial fraud.
Social media platforms attempt to correlate identities, making it essential to separate accounts and use different networks.
Enterprises can also benefit from privacy-focused solutions to ensure secure communication and limit data leaks.
The move toward decentralized identity will reshape online authentication, offering greater control to individuals.
Guest Info:
Dr. Paul Ashley is a privacy advocate and security expert at Anonyomy Labs, working to develop privacy-focused technologies that empower individuals and organizations. You can learn more about Anonyomy Labs and their privacy solutions at Anonyome Labs.
Enjoyed this episode? Leave us a review and share it with your network! Subscribe for more insightful discussions on information security and cybersecurity events.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Navigating the Cybersecurity Job Market in 2025
Jan 28, 2025
Summary:
In this episode of Exploring Information Security, Timothy De Block welcomes Erin Barry, a recruiter with nearly a decade of experience specializing in software development and security roles. Erin shares her insights into the current job market landscape, recruitment trends, and the evolving expectations for candidates in tech and security sectors. Whether you're a job seeker or an employer, this episode is packed with valuable takeaways on hiring practices, remote work dynamics, and the impact of AI on recruitment.
Topics Discussed:
The Current Job Market: Erin discusses the heightened competition for roles, the evolving expectations from employers, and why remote work is no longer the standard but a perk.
Recruitment in Tech and Security: Insights into hiring for startups, the rise of AI-focused roles, and how companies are adapting to the rapid evolution of technology.
AI in Recruitment: Erin and Timothy talk about the misuse of AI in interviews, the challenges of identifying true expertise in AI, and tools being developed to combat deep fakes in recruitment.
Job Seeker Tips: Erin offers actionable advice for candidates, including the importance of researching companies, maintaining an online presence (e.g., GitHub, blogs), and avoiding AI during interviews.
Hiring Trends: Erin highlights the demand for roles in product and application security, blockchain, and AI, and shares her observations on the types of candidates employers are seeking in these fields.
Key Takeaways:
Startups are increasingly adopting hybrid work models with occasional in-person collaboration.
Companies are becoming pickier in hiring and extending interview processes to ensure the right fit.
Candidates claiming expertise in AI and blockchain are often scrutinized for authenticity.
Remote roles are becoming more competitive and limited, with a preference for local or hybrid arrangements.
Job seekers should invest in building an online portfolio, such as maintaining a GitHub page or personal blog, to stand out.
Guest Info:
Erin Barry is a seasoned recruiter at Code Red Partners with extensive experience placing candidates in cutting-edge tech roles. She specializes in the software development lifecycle and security positions, working primarily with startups in San Francisco, Seattle, and beyond. You can follow Erin on LinkedIn for the latest job opportunities and industry insights: Erin Barry's LinkedIn.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Brian Dye on Network Detection and Response (NDR) with Corelight
Jan 21, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with Brian Dye from Corelight to discuss the evolution of cybersecurity, the importance of Network Detection and Response (NDR), and the challenges modern organizations face with securing their networks. Brian shares valuable insights into how Corelight leverages open-source technologies and data to provide advanced threat detection and forensics.
Key Topics Covered:
The Evolution of Corelight Brian discusses the history of Corelight, the transition from the open-source project Zeek (formerly Bro) to the Corelight company, and the importance of supporting the open-source community. He also touches on how the company has grown as cybersecurity needs have evolved.
Network Detection and Response (NDR) Corelight's NDR solutions help organizations detect advanced threats that bypass traditional security controls like firewalls and EDR. Brian explains the differences between EDR and NDR, and why both are essential for a comprehensive cybersecurity strategy.
AI and Machine Learning in Security Brian dives into how Corelight has embraced AI and machine learning, particularly with generative AI (GenAI), to improve threat detection and response capabilities. He shares examples of how organizations are using GenAI to automate security workflows and accelerate alert investigations.
The Changing Threat Landscape Brian talks about how attackers are evolving their tactics, moving away from malware-based attacks to techniques like "living off the land" (LoL) to avoid detection. He discusses the importance of understanding these advanced attack methods and how NDR tools help provide the data needed to investigate and respond.
Real-World Success Stories Brian shares examples of how Corelight has helped organizations respond to cyber threats, including a ransomware attack scenario where Corelight's tools provided the necessary data to help the victim organization make informed decisions about whether to pay a ransom.
The Future of Network Security Looking ahead, Brian outlines the future of Corelight and its focus on expanding its data capabilities to enable more advanced detections. He highlights the importance of data as a foundational element for security and how Corelight plans to continue innovating in the NDR space.
Guest Bio:
Brian Dye is the Chief Product Officer at Corelight, a leading provider of Network Detection and Response (NDR) solutions. With years of experience in cybersecurity, Brian is dedicated to helping organizations defend against advanced threats using open-source tools and innovative technology.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Solving Compliance Complexity with risk3sixty
Jan 14, 2025
Summary:
In this episode of Exploring Information Security, host Timothy De Block is joined by Christian Hyatt, CEO of risk3sixty, a company that specializes in helping businesses with security and compliance. Christian shares his thoughts on how organizations are dealing with the increasing complexity of compliance programs, third-party risks, and the role of offensive security in bridging the gap between compliance and risk management.
Key Topics Covered
What is risk3sixty and the Problem it Solves? Christian discusses how risk3sixty helps organizations streamline and harmonize complex security and compliance programs, providing significant cost savings and efficiency.
The Importance of GRC Transformation Christian explains the role of Governance, Risk, and Compliance (GRC) transformations in helping businesses manage multiple frameworks, such as ISO, SOC 2, and NIST.
Offensive Security and Compliance How risk3sixty integrates offensive security services like red team engagements and continuous pen testing with a focus on both compliance and true risk management.
The Evolution of Security and Compliance The challenges and opportunities in integrating security directly into the development lifecycle, and how risk3sixty is positioning itself to lead the way in managing third-party risks.
AI and the Future of Compliance Christian’s perspective on how AI is impacting compliance roles and what it means for the future of security and risk management.
Highlights
risk3sixty’s Full Circle GRC platform streamlines compliance management, helping businesses save time and reduce costs.
The increasing need for businesses to manage third-party risks as part of their cybersecurity strategy.
How risk3sixty is adapting to the changing cybersecurity landscape, especially in highly regulated industries.
Guest Bio
Christian Hyatt is the CEO of risk3sixty, a leading provider of security and compliance services. With years of experience in helping businesses navigate complex GRC challenges, Christian is passionate about making security more efficient and accessible to organizations of all sizes.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Hacking Space Systems: Inside Tempest with Tim Fowler
Jan 07, 2025
Summary:
In this episode, host Timothy De Block sits down with Tim Fowler, the creator of Tempest, a hands-on educational project focused on space cybersecurity. Tim shares the story behind the development of Tempest, a 1U CubeSat designed for teaching and exploring cybersecurity in space systems. With insights from his background in space cyber, Tim explains how Tempest offers a unique, vulnerable, and modular platform for learning, hacking, and improving space security.
Key Topics Covered:
What is Tempest? Tim introduces Tempest, a one-unit CubeSat built for educational purposes, focusing on the cybersecurity aspects of space systems. He explains how CubeSats are small satellites with low cost and accessibility but often lack a focus on security.
Design and Development of Tempest Tim talks about his 18-month journey developing Tempest, a project that started as an educational tool for his class on space cybersecurity. The CubeSat is intentionally vulnerable, offering students a chance to explore hacking and security concepts in space systems.
Tempest as a Teaching Aid Tempest is designed to be hands-on, giving students real-world exposure to the challenges and opportunities in securing space systems. The first version of Tempest debuted at Wild West HackingFest, and Tim discusses how he plans to scale and release the hardware for public use.
Challenges and Learning Through Failure Tim shares some humorous and insightful moments from teaching with Tempest, including a broadcast storm in the classroom caused by satellites "talking" to each other. He reflects on the importance of troubleshooting and learning through failure, both as a developer and instructor.
Upcoming Plans for Tempest Tim outlines his goals for 2025, including releasing Tempest hardware for public consumption and expanding the educational content around space cybersecurity. He also hints at adding AI capabilities to the CubeSat for future applications like missile detection or weather observation.
Guest Bio:
Tim Fowler is a space cybersecurity expert and creator of Tempest, a unique educational tool designed to teach security in space systems. With years of experience in both the defense and cybersecurity sectors, Tim is passionate about making space systems more secure and accessible for hands-on learning.
Links and Resources:
Ethos Labs - Tempest and other space cybersecurity resources
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
2024 in Review and What's Next in 2025
Jan 01, 2025
Summary:
In this solo episode, Timothy De Block takes a step back to reflect on the journey of Exploring Information Security in 2024 and look ahead to what's coming in 2025. Timothy shares insights into the podcast's growth, highlights from the past year, and the direction for the future, including new initiatives and exciting changes.
Key Topics Covered:
Podcast Growth and Feedback Timothy discusses the steady growth of the podcast, with the introduction of new platforms like Spotify and Amazon Podcasts, and a significant expansion into YouTube. He emphasizes the importance of feedback and encourages listeners to connect and rate the podcast.
The Podcast’s Focus and Vision Reflecting on the podcast's evolution, Timothy talks about how the content has expanded beyond traditional technical topics to cover security awareness, human behavior, and broader cybersecurity challenges. He also mentions the plan to increase blog posts and share security awareness content for listeners to use within their own companies.
Live Podcasting and Future Engagement Timothy highlights the success of the live podcast with the ILF crew and shares plans for more live sessions, with opportunities for audience interaction and sponsor exposure. He expresses his excitement to continue experimenting with live recordings and expanding the podcast’s reach.
Vendor Insights and Sponsored Content Discussing the rise in vendor interest, Timothy talks about how the podcast will feature discussions with vendors about the problems they solve in the cybersecurity space. He shares his commitment to providing meaningful content and avoiding any “sales pitch” style conversations, ensuring that vendor content is both educational and valuable to listeners.
ShowMe Con and Networking Opportunities Timothy promotes ShowMe Con, a conference where he will be speaking and attending. He shares how it offers a unique mix of hacker and business vibes, and he encourages listeners to participate in the conference or attend as speakers for valuable exposure and networking.
Plans for 2025 Looking to the future, Timothy discusses his goals for 2025, including more live podcasting, increased blog content, and deeper engagement with the audience. He also shares his excitement for upcoming content, including vendor conversations and security awareness-focused material.
Personal Reflections and Motivations Timothy closes with a personal note, reflecting on his 23 years in IT and his growth in the security field. He talks about his passion for teaching and mentoring, particularly in the realm of security awareness. He also humorously discusses his New Year’s resolution to take January off from drinking, highlighting his commitment to personal growth.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
[RERELEASE] How to get into information security
Dec 24, 2024
Originally posted June 25, 2014
I've been wanting to do a podcast, for a while now, on information security. I wasn't sure what I wanted the objective of the podcast to be. Most of the information security podcasts out there, or at least the ones I listen to, usually do a guest interview and cover some of the latest news and happenings within the information security. I didn't want to spin up, yet, another one of those.
Instead I've decided to spin up a podcast that explores the world of information security. One of the things I've been hearing the infosec community needs are people to teach security to those inside and outside the community. I am still very much in the early stages of my career as an information security professional and trying to learn as much as I can. I thought a podcast that allowed me to share what I've learned and explored would make for a great podcast. So here we are and my first podcast is about how to get into information security.
To explore that topic I decided to do an interview with VioPoint consultant and roundhouse master Jimmy Vo (@JimmyVo). We covered how he got into information security and also talked about some of things people on the outside looking in can do to get into information security.
Feedback is very much appreciated and wanted. Leave them in the comment section or contact me via email.
David Mytton on Developer-Centric Security with ArcJet
Dec 17, 2024
Summary:
In this episode of Exploring Information Security, host Timothy De Block talks with David Mytton, founder of ArcJet, about enabling developers to build secure applications seamlessly. David shares his journey from running a cloud monitoring business to developing ArcJet, a security-as-code platform that integrates security measures directly into an application's codebase.
They discuss ArcJet's approach to empowering developers with tools for bot detection, rate limiting, and more, all without compromising the developer experience. David and Timothy explore the challenges of bridging the gap between development and security, the philosophy behind "DevSecOps," and how ArcJet addresses real-world issues like bot abuse and API misuse. Whether you're a developer, security professional, or tech enthusiast, this episode offers unique insights into making application security more accessible.
Key Topics Covered
What is ArcJet and the problem it’s solving?: A security-as-code platform designed for developers to integrate protections directly into their applications.
Developer-Centric Security: How ArcJet enhances security workflows by providing developers with intuitive SDKs and tools.
Real-World Use Cases: Stories of companies reducing infrastructure costs and mitigating bot-driven abuse with ArcJet.
The Evolution of DevSecOps: Challenges and opportunities in integrating security into the development lifecycle.
David's Philosophy: The importance of documentation, user experience, and building tools developers love.
Highlights
Developers can start using ArcJet with just a few lines of code.
ArcJet helps teams address spam, API abuse, and fraud while focusing on feature development.
David's perspective on the state of security tooling and how ArcJet stands out.
Guest Bio
David Mytton is the founder of ArcJet, a security-as-code platform. He previously founded a cloud monitoring business and has extensive experience with developer tools and application security. David is passionate about creating seamless developer experiences and advancing security tooling to meet modern demands.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
[RERELEASE] What is MS08-067?
Dec 10, 2024
In this artistic episode of the Exploring Information Security podcast, Mubix joins me to discuss MS08-067.
Mubix (@mubix), available at room362 and Hak5, joins me to discuss one of his favorite exploits: MS08-067. I invited Mubix on to talk about MS08-067 because of a tweet he retweeted. The tweet included a confession that a consultant used the MS08-067 vulnerability to break into a clients network. This vulnerability is really old and while not widespread it does pop-up from time-to-time. I was happy to discover that Mubix has a great appreciation for the exploit.
Exploring the Defensive Security Handbook with Amanda Berlin
Dec 03, 2024
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with Amanda Berlin, co-author of the Defensive Security Handbook, to discuss the evolution of the book, the challenges of writing for the blue team, and how it’s helping cybersecurity practitioners today. Amanda shares insights on creating accessible resources for security professionals and the importance of designing security that works for everyone, from SMBs to enterprise teams.
Key Takeaways:
Origins of the Handbook: Amanda reveals how the Defensive Security Handbook was born from her own challenges as a security professional and the lack of accessible, practical blue team resources.
Writing Process and Updates: The journey of creating the first edition and the significant updates in the second edition, including expanded cloud coverage and reorganized database content.
Designing Security for SMBs: Amanda highlights the unique challenges small and medium businesses face, from budget constraints to vendor complexities, and how the book aims to provide practical, scalable advice.
Balancing Technical and Practical: The handbook’s goal is to simplify complex concepts, making them digestible for newcomers while still useful for seasoned professionals seeking quick references.
The Importance of Empathy in Security: Amanda emphasizes the need for empathy in designing security tools and processes, especially for SMBs that lack dedicated resources or expertise.
Feedback and Impact: How the book has resonated with unexpected audiences, including developers and detection engineers, as a guide to understanding security concepts.
Resources Mentioned:
Books:
Defensive Security Handbook (2nd Edition) by Amanda Berlin and Lee Brotherston
Blue Team Handbook by Don Murdoch
Security Engineering by Ross Anderson
Episode Links
Mental Health Hackers, founded by Amanda to address mental health challenges in the security industry.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Create User-Centric Security with Javvad Malik
Nov 26, 2024
Summary:
In this episode of Exploring Information Security, host Timothy De Block and guest Javvad Malik, security awareness advocate and writer for KnowBe4, delve into the concept of user-centric design in security. Javvad shares insights on building security controls that enhance user experience rather than hinder it, and explores how organizations can foster a security culture by making processes more intuitive and less obstructive.
Key Takeaways:
Empathy in Security Controls: Javvad discusses the importance of understanding users’ needs and challenges. He emphasizes that security should focus on helping users rather than enforcing rigid policies. Using familiar examples, like Tetris vs. Minecraft, he illustrates the shift from a rigid, top-down approach to a more adaptable, user-driven model.
Learning from Shadow IT: Rather than forbidding unauthorized tools, Javvad suggests engaging with employees to understand why they choose certain applications. By integrating tools that users find convenient, security teams can balance security with user needs.
Behavioral Science Meets Security: Javvad highlights the value of metrics in understanding user behavior and assessing risks. He proposes using a combination of security metrics—like phishing susceptibility and device usage—to gauge an individual’s or department’s security behavior, thereby creating a more effective, user-centric security program.
The Power of Nudge Theory: Drawing from behavioral science, Javvad explores how gentle prompts, like password managers and risk reminders, can steer users toward safer behaviors. He likens this to everyday nudges we see, such as speed-limit reminders on roads, which encourage compliance without confrontation.
Resources Mentioned:
KnowBe4 Blog: Javvad’s blog on KnowBe4 about user-centric design.
Invisible Gorilla Test: A classic experiment demonstrating how easily we miss the obvious, relevant to security’s focus on user awareness.
About Our Guest:
Javvad Malik is a security awareness advocate and writer at KnowBe4. He uses storytelling and humor to make security concepts relatable and user-friendly. Follow his latest articles on the KnowBe4 blog, where he offers practical insights into security awareness and user-focused security design.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Pick a Whiskey Barrel With The Innocent Lives Foundation Charity
Nov 14, 2024
Summary:
Timothy De Block is joined by Shane McCombs and John McCombs of the Innocent Lives Foundation (ILF), Josh Huff and Rev3Dood who volunteer their time with ILF, as they delve into an adventurous and charitable whiskey barrel pick trip from April 2024. This live episode gives an insider’s look into the process of selecting exclusive bourbon barrels and the exciting world of whiskey enthusiasts. From Four Roses to Starlight Distillery, Tim and the team explore unique blends, share laughs, and reflect on how each sip supports a meaningful cause.
The Origins of ILF's Barrel Pick Club: Learn about how the passion for whiskey and charity combined to form this unique fundraising avenue for the ILF.
The Complexity of Barrel Picking: Discover why selecting a barrel involves more than just a good taste – it requires considering the community’s preferences, uniqueness, and the impact on the ILF mission.
Inside Four Roses & Starlight Distilleries: Hear about the in-depth tours, the science of barrel aging, and the behind-the-scenes processes that make these distilleries so iconic.
Unique Barrels and Bottles: Highlights include details on Four Roses’ single-tier rickhouses, rare yeast strains, and the exceptional Starlight Mizunara cask, a rarity in the whiskey world.
The Auction and Community Impact: John McCombs from ILF explains how the auction supports ILF and offers tips for placing bids on exclusive bottles.
Memorable Moments:
Whiskey Tasting: A breakdown of tasting notes for Four Roses and Starlight bottles, featuring everything from minty finishes to complex layers of caramel, chocolate, and spices.
Funny Stories: From almost puking in a 15-passenger van to accidental whiskey spills, Tim and the team share some hilarious moments from their trip.
Chris Hadnagy’s Unique Taste: Chris’s love for scotch sets him apart as he humorously describes notes like “pine sol” that others struggle to find.
Auction Information: The auction, hosted by Unicorn Auctions, is open for two weeks, and all proceeds go to supporting ILF’s mission. Bids can be placed on unique bottles hand-picked by the ILF team, with Unicorn waiving all fees to maximize impact. Check out the auction site for updates and be ready to place your bids!
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Exploring Legal Landmines in Incident Response with Thomas Ritter
Nov 12, 2024
Summary:
In this episode of Exploring Information Security, host Timothy De Block sits down with Thomas Ritter, a seasoned attorney specializing in cybersecurity and privacy law, to discuss the often-overlooked legal complexities surrounding incident response (IR). From breach terminology to ransomware negotiations, Ritter shares insights from his years of experience navigating legal pitfalls that can arise when responding to security incidents.
Key Takeaways:
Understanding "Incident" vs. "Breach": Ritter emphasizes the importance of careful communication within an organization during a security incident. Misusing legally significant terms, like "breach," can lead to premature obligations, such as breach notifications, which may have serious consequences for an organization.
Attorney-Client Privilege in IR: External counsel's role can extend attorney-client privilege over critical aspects of IR, including the involvement of forensic specialists. This protection can prove essential if an incident escalates into litigation.
Ransomware Negotiation Nuances: With ransomware incidents on the rise, Ritter provides a detailed look at the negotiation process, advising organizations to work with professional negotiators. He recounts instances where attackers leveraged knowledge of clients' cyber insurance coverage to increase ransom demands.
Tabletop Exercises for IR Preparedness: Ritter highlights the value of tabletop exercises, especially involving executive leadership. He notes that regular, comprehensive drills help organizations refine incident response policies and minimize legal exposure during actual incidents.
Navigating Class Action Exposure: As data breaches often trigger class action lawsuits, organizations must take steps to prepare, including consulting legal professionals to reduce risk through privilege-protected documentation.
Ritter Gallagher Blog: Thomas Ritter’s firm provides regular insights on emerging legal topics in cybersecurity.
About Our Guest:
Thomas Ritter is a cybersecurity and privacy attorney at Ritter Gallagher, where he focuses on helping organizations navigate the legal landscape of security incidents and data breaches. For more information, or to get in touch, visit RitterGallagher.com or email Thomas directly at thomas@rittergallagher.com.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
[RERELEASE] What is the SANS Holiday Hack Challenge
Nov 05, 2024
In this holiday edition of the Exploring Information Security podcast, Ed Skoudis joins me to discuss the SANS Holiday Hack Challenge.
Around this time each year the SANS Holiday Hack Challenge releases under the direction of Ed (@edskoudis) and instructor with the SANS institute. This year Santa has been kidnapped and it’s up to use to figure out who did it and save Christmas. The challenge is for new people in infosec, and for those who have been in the industry for many years. As Ed notes in the episode it is even for children. The challenge itself has been around for years and several past years are still available for people to go through.
In this episode we discuss:
What is the SANS Holiday Hack Challenge
How it got started
What preparation goes into making the challenge each year
[RERELEASE] ShowMeCon: What does Jayson E. Street, Dave Chronister, Johnny Xmas, April Wright, and Ben Brown think about security?
Oct 29, 2024
In this epic episode of the Exploring Information Security podcast Jayson E. Street (@jaysonstreet), Dave Chronister (@bagomojo), Johnny Xmas (@J0hnnyXm4s), April Wright (@aprilwright), Ben Brown (@ajnachakra), and surprise guests Adrian Crenshaw (@irongeek_adc) and Kevin Johnson (@secureideas)all join me to discuss various security related topics.
ShowMeCon is one of my favorite security conferences. The organizers are awesome and take care of their speakers like no other conference. The venue is fantastic. The content is mind blowing. I can't say enough good things about the even that Dave and Renee Chronister put on every year in St. Louis, Missouri. They know how to put on a conference.
Regular listeners of the podcast will note that I recorded an episode with Dave on ShowMeCon several weeks ago. After that recording he asked if I was interested in doing a recording at the conference. I said yes and thus the birth of this epic episode. This format is experimental. First, it is marked as explicit, because there is swearing. Second, It's over 90 minutes long. I didn't think breaking it up into four or five pieces would serve the recording well. Send me your feedback good or bad on this episode, because I'd like to do more of these. I would really like to hear it for this episode.
[RERELEASE] What is security awareness?
Oct 22, 2024
In the refreshed edition of the Exploring Information Security (EIS) podcast, I talk to Amanda Berlin AKA @Infosystir about security awareness.
Amanda was charged with setting up a security awareness program for her company from scratch. Setting up a security awareness program is hard work, making it effective is even harder, but Amanda rose to the challenge and came up with some creative ways to help fellow employees get a better handle on security.
In this interview we cover:
What is security awareness?
How a security awareness program should be implemented.
What does an effective security program look like?
How do you measure the effectiveness of a security awareness program
How to get a penetration test (pentest)
Oct 15, 2024
Summary:
In this episode, Dave Chronister, founder of Parameter Security and ShowMeCon, shares valuable insights into the world of penetration testing (pentesting). Listeners will learn about the differences between vulnerability assessments and penetration tests, what red teaming is, and why organizations should lean towards white-box pentests. Dave and Tim discuss how to avoid common pitfalls when engaging with pentest companies, the importance of rules of engagement, and how to ensure you're getting a high-quality test. Dave also shares stories from his 17+ years in the field, illustrating the critical lessons organizations need to understand.
Key Topics Covered:
Difference between vulnerability assessments and penetration tests.
Red teaming vs. penetration testing: When and why to use each.
How to choose the right pentest company.
The importance of setting clear rules of engagement.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Avoid Election Scams
Oct 08, 2024
Summary:
In this timely episode of Exploring Information Security, host Timothy De Block is joined by Pieter Arntz from Malwarebytes to discuss the growing threat of election-related scams. With election season upon us, scammers are becoming more active, and this episode dives deep into how these scams work, what tactics scammers use, and how to protect yourself from falling victim.
Seasonal Scams: Scams are often timed with key events, including elections, holidays, and tax season. Pieter discusses how scammers shift focus from elections to events like Black Friday or Christmas.
Common Election Scams: Scammers often target voters through text messages, social media, and robocalls, attempting to steal personal information or solicit fake donations.
Mobile Devices as a Target: With more focus on mobile devices, Android and Apple users are increasingly targeted through phishing texts and malicious links.
Social Engineering: Scammers manipulate users by pretending to represent political parties, asking for donations, or engaging in online discussions to steal information.
Detecting Scams: Pieter and Timothy offer practical advice on identifying scam messages, such as unsolicited communications, urgency in messaging, and phishing links with suspicious domains (e.g., .xyz, .top).
Who’s Behind These Scams?: The episode touches on the actors behind the scams, ranging from cybercriminal gangs to state actors, and how they profit from fraudulent activities.
Scams Beyond Elections: While elections are a prime target, natural disasters and other events are also exploited by scammers to steal donations and personal information.
Privacy Concerns: A survey revealed that 3% of people are hesitant to vote due to privacy concerns, highlighting the critical need for secure election processes.
Key Takeaways:
Be Wary of Unsolicited Messages: If you receive unsolicited texts or emails, always double-check the source before acting. Election scams often use urgency to push people into making hasty decisions.
Verify Political Donations: Only donate through verified websites. Scammers frequently clone official websites to trick people into giving money to fraudulent causes.
Protect Your Personal Information: Avoid sharing personal details through unofficial or unfamiliar channels. Scammers can use this information for identity theft or phishing attacks.
Report Scams: If you suspect a scam, report it to organizations like the FTC or the FBI to help others stay safe.
Resources Mentioned:
Report Fraud – Federal Trade Commission’s fraud reporting site.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is sober in cyber?
Oct 01, 2024
Summary:
In this episode, Jennifer VanAntwerp shares her journey of sobriety and how it inspired her to create the Sober in Cyber community. They discuss the challenges of navigating industry events saturated with alcohol, tips for staying sober, and how the younger generation's attitude towards alcohol is changing. Jennifer also emphasizes the importance of offering alternative options at events and how the sober community is growing in cybersecurity.
Key Topics Covered:
Jennifer's personal journey of 23 years of sobriety.
The impact of alcohol at cybersecurity conferences.
Tips for avoiding pressure to drink at social events.
The role of Sober in Cyber in creating inclusive, alcohol-free spaces.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How Disinformation Will Impact The 2024 Election with Renee DiResta
Sep 24, 2024
Summary:
In this episode, Timothy De Block chats with Renee DiResta about the role of disinformation in elections, particularly as we approach the 2024 cycle. Renee discusses her work in tracking narratives across social media, how state actors like Russia and Iran manipulate public opinion, and the growing importance of platform integrity in identifying inauthentic behavior.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Hack an Enterprise
Sep 17, 2024
Summary:
In this episode, Timothy De Block and Jonathan Singer dive into the challenges of modern enterprise security. The conversation covers how organizations—using McDonald's as an example—face threats from both digital and physical vectors. They explore how hackers might exploit everything from public Wi-Fi to social engineering tactics and touch on the evolving role of security leaders in dealing with both controllable and uncontrollable risks.
Key Topics:
Digital & Physical Attack Vectors: Discussion on hacking tactics such as public Wi-Fi, kiosk vulnerabilities, API exploitation, and social engineering.
Security Beyond the Firewall: Why enterprise security involves more than just digital defense—physical security, insider threats, and brand manipulation also pose risks.
The Growing Complexity of Security: How new technologies, like IoT devices and AI, are adding layers of complexity to enterprise security.
Insider Threats & Social Engineering: The impact of internal threats, from disgruntled employees to social engineering attacks, on large organizations.
Rapid-Fire Hacking Vectors:
Public Wi-Fi
Self-service kiosks
Badge cloning
Typo-squatting for domains
Supply chain dependencies
Insider threats
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Ben Burkert of Anchor.Dev on the challenges of Internal Certificate Management
Sep 10, 2024
Summary:
In this episode, Timothy De Block chats with Ben Burkert about the challenges of managing internal certificate authorities (CAs) and certificates. Ben shares his experiences working with internal CAs at major companies and how those challenges inspired the creation of Anchor.dev.
Key Topics:
The Importance of Certificates: Ben explains how certificate mismanagement can lead to outages and business interruptions, and why automation is crucial.
TLS and ACME: Understanding how TLS secures communications and how ACME clients automate certificate management.
Anchor.dev: A cloud service that simplifies internal CA management and helps companies secure their internal networks with automated renewals and distribution.
LCL Host: A tool from Anchor.dev that enables HTTPS in local development environments, improving deployment workflows.
In this educational edition of the Exploring Information Security podcast, Tim Tomes joins me to discuss Practical Web Application Pentration Testing (PWAPT) training.
Tim (@LaNMaSteR53) is one of the leading names within the application security field. A former instructor for many organizations, he wanted to do more with training. He wanted to provide attendees to training with more hands on work. Get into an application, exploit it, and then provide remediation steps. He came up with the PWAPT training.
[RERELEASE] How to find vulnerabilites
Aug 27, 2024
In this susceptible edition of the Exploring Information Security podcast, Samy Kamkar joins me to discuss how to find vulnerabilities. This is a RERELEASE EPISODE.
Samy (@samykamkar) shouldn't need too much of an introduction to most people. He's been in the news for hacking garage doors, credit cards, cars, and much much more. Samy likes to hack things and has a knack for finding vulnerabilities in everything from locked machines to wireless doorbells. His site has the full list of vulnerabilities as well as videos and press appearances. Which made him the perfect guess for talking about how to find vulnerabilities.
In this episode we discuss:
What got him started in looking for vulnerabilities
What is a vulnerability
What skills are necessary for finding vulnerabilities
The Origins of Risky Business with Patrick Gray
Aug 20, 2024
Summary:
Patrick Gray, the host of the Risky Business podcast, shares how he transitioned from a tech journalist to a leading voice in cybersecurity podcasting. Patrick discusses the origins of his podcast, the evolution of his content, and how he maintains integrity with sponsors. He also offers advice for aspiring podcasters on focusing on the audience and using the right tools.
Key Topics:
The unexpected inspiration behind Risky Business.
Moving from general tech journalism to focused security content.
The importance of understanding technical details in reporting.
The growth of the Risky Business team and their venture into video content.
Navigating sponsorships while maintaining editorial independence.
Advice for new podcasters: prioritize your audience and use the right tools.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Navigate a Career in Cybersecurity
Aug 13, 2024
Summary:
In this episode, Timothy De Block sits down with Ralph Collum, a cybersecurity educator with over a decade of experience in the field. They delve into Ralph's career journey, discussing his transition from a chemist to a cybersecurity professional and the various roles he's taken on, including server administration, auditing, and penetration testing. Ralph shares insights on the importance of soft skills, continuous learning, and the evolving landscape of cybersecurity.
Key Topics Discussed:
Ralph’s Career Journey
The Impact of the Pandemic on Cybersecurity Groups
Getting Into Cybersecurity
The Role of Soft Skills in Cybersecurity
The Impact of AI on Cybersecurity Careers
Resources and Recommendations
Resources Mentioned:
Books:
The Code to the Dead Cow Joseph Menn
Spam Nation by Brian Krebs
The Art of Invisibility by Kevin Mitnick
Social Engineering: The Science of Human Hacking by Christopher Hadnagy
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
SIM Swapping: How Worrying is it in 2024?
Aug 06, 2024
Summary:
Episode Summary: In this exchanged episode, Timothy De Block chats with Mubix about the intricacies of SIM swapping, an attack vector that has seen significant attention. They discuss the current state of SIM swapping, how attackers exploit this technique, and the measures carriers have implemented to mitigate these risks. Mubix highlights the importance of understanding your risk profile and the practical steps organizations and individuals can take to protect themselves.
Key Topics:
The evolution and difficulty of executing SIM swapping attacks.
Real-world examples and the misclassification of SIM swapping incidents.
The impact of enhanced carrier protections and the role of user awareness.
The distinction between SIM swapping and other forms of social engineering.
Practical advice for businesses and high-risk individuals to safeguard against SIM swapping.
Discussion Points:
SIM swapping detection and reporting procedures.
The role of eSIMs and potential security concerns.
The importance of proactive security measures and user empowerment.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How Artificial Intelligence is impacting Cybersecurity with Steve Orrin
Jul 30, 2024
Summary:
In this engaging episode, Timothy De Block speaks with Steve Orrin Federal CTO at Intel about the intersection of artificial intelligence and cybersecurity. The conversation delves into the challenges and opportunities that AI presents in the cybersecurity landscape, exploring topics such as deep fakes, disinformation, and the implementation of AI in security practices.
Key Discussion Points:
AI in Cybersecurity:
The rise of AI in both defensive and offensive cybersecurity strategies.
How AI is being used to enhance security measures and identify threats.
Deep Fakes and Disinformation:
The challenges posed by deep fakes in the current digital landscape.
Techniques to detect and counteract deep fakes.
The implications of deep fake technology on public opinion and security.
Practical AI Applications:
Real-world examples of AI in action within cybersecurity frameworks.
The role of AI in threat detection and response.
Implementing AI to automate routine security tasks, freeing up human resources for more complex issues.
Policy and Ethical Considerations:
The importance of developing policies for the responsible use of AI.
Ethical considerations in deploying AI for cybersecurity purposes.
Balancing innovation with security in AI development.
Future of AI and Cybersecurity:
Upcoming trends in AI and their potential impact on cybersecurity.
The evolving nature of cyber threats and how AI can adapt to these changes.
The need for continuous learning and adaptation in the face of rapidly advancing technology.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Automate Information Security with Python
Jul 23, 2024
Summary:
In this automatic episode of Exploring Information Security, Timothy De Block talks with Mark Baggett about automating information security tasks using Python. They delve into the SANS SEC573 and SEC673 courses, which cover Python basics, advanced automation techniques, and real-world applications. Mark shares insights on using AI for coding, highlights his YouTube series "Infosec Tool Shed," and discusses upcoming workshops and conferences. The conversation also touches on the importance of Python in information security and practical experiences in automating security tasks.
Key Discussion Points:
Mark's journey in automating security tasks with Python.
Overview of SANS SEC573 and SEC673 courses.
Practical applications of Python in information security.
Using AI for coding and debugging.
Mark’s YouTube series "Infosec Tool Shed."
Upcoming workshops and conferences.
Links and Resources:
SANS SEC573 Course: https://www.sans.org/cyber-security-courses/automating-information-security-with-python/
SANS SEC673 Course: https://www.sans.org/cyber-security-courses/advanced-information-security-automation-with-python/
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
HallwayCon from the floor of ShowMeCon 2024
Jul 16, 2024
Summary:
In this off-the-cuff episode, Timothy De Block brings a mic to the floor of ShowMeCon for the first-ever HallwayCon podcast episode. He walks around with a mic and recorder, engaging in spontaneous conversations with random attendees. Timothy highlights the immense value of attending security conferences, emphasizing that these real, impromptu conversations with professionals are crucial for expanding knowledge and building relationships within the industry. This unique approach captures some just some of the many conversations going on at security conferences.
Key Topics Discussed:
Importance of Networking:
Knowing your target employers and daily tasks.
Overcoming the fear of talking to strangers.
Effective Techniques:
Asking engaging questions.
Volunteering and getting involved.
Conference Culture:
Evolution of conference attire.
Balancing business and casual environments.
Career Challenges:
Job market difficulties for younger and older professionals.
Role of networking in career advancement.
Humorous Stories:
Conference experiences and unique attire.
Creative uses of business cards.
Management Insights:
Effective management and hiring practices.
Importance of structured onboarding.
Impact of AI:
AI’s role in security and deepfake technology.
Future relevance in cybersecurity.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Rapid Threat Model Prototyping?
Jul 09, 2024
Summary:
In this episode, we sit down with Geoff Hill from Tutamantic_Sec to explore the innovative approach of Rapid Threat Model Prototyping (RTMP). Geoff shares his journey from being a C++ developer to becoming a threat modeling expert, highlighting the challenges and successes he encountered along the way. This episode dives deep into how RTMP can help streamline threat modeling processes, making them more efficient and scalable.
Key Discussion Points:
Introduction to RTMP:
Geoff explains the origins and the need for a new threat modeling approach.
Discussion on traditional threat modeling challenges and how RTMP addresses them.
Implementation and Benefits:
Detailed walkthrough of RTMP’s implementation in various organizations.
How RTMP integrates with existing development workflows like Agile and DevOps.
Benefits of using RTMP, including reduced workload on security teams and improved security posture.
RTMP Methodology:
Explanation of the stages and numerical ranking system in RTMP.
How RTMP utilizes open-source frameworks and tools.
The role of security champions within development teams.
Practical Applications and Case Studies:
Real-world examples of RTMP in action.
Success stories and lessons learned from implementing RTMP in different industries.
Future of Threat Modeling:
Geoff’s insights on the evolution of threat modeling.
Upcoming trends and the importance of being proactive in security.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is the Ransomware Defense Initiative (RDI)?
Jul 02, 2024
Summary:
In this episode, Timothy De Block sits down with Ed Rojas to discuss the origins and development of the Ransomware Defense Initiative (RDI). They explore Ed’s motivation behind creating RDI, its evolution, and how it aids organizations in proactively combating ransomware threats.
Key Topics Discussed:
Origins of RDI: Ed explains his drive to identify effective controls against ransomware, focusing on proactive measures rather than reactive strategies.
Research Findings: Insights from extensive research on ransomware techniques and the identification of key controls.
Implementation: How RDI assists organizations in assessing their maturity and readiness against ransomware attacks.
Use Cases: Examples of how companies and new CISOs can utilize RDI for rapid assessment and strategic planning.
Future Developments: Upcoming features and improvements in RDI to enhance its utility and accessibility.
Quotes:
“I wanted to identify a set of controls that everyone should have implemented to be okay against ransomware.”
“Most recommendations focus on recovery. I wanted to focus on how we detect and mitigate ransomware attacks as early as possible.”
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What's Happening at ShowMeCon 2024?
Jun 25, 2024
Summary:
In this dynamic episode, host Timothy De Block engages in a lively conversation with Joey Smith, Tim McLaren, and Ben Miller live from the floor of Show Me Con 2024. They discuss various topics including the importance of trust in vendor relationships, the evolution of security roles, and the innovative approaches being adopted in the food industry.
Episode Highlights:
Conversations with Industry Experts:
Spontaneous discussions about the importance of genuine interactions at conferences.
Joey's perspective on the value of treating vendors with respect and professionalism.
Insights from Tim McLaren:
Tim shares his experience transitioning from a vendor-specific role to a broader consultancy position.
Discussion on the importance of having diverse solutions and the role of trust in customer relationships.
Ben Miller's Take:
Ben emphasizes the need for critical thinking and continuous learning in security roles.
Reflections on how past experiences shape current practices in cybersecurity.
Vendor Relationships and Trust:
The group discusses the significance of building long-term, trust-based relationships with vendors.
Examples of how trust influences decision-making and security practices.
Innovations in Security:
Conversations on how emerging technologies and innovative solutions are reshaping the cybersecurity landscape.
Joey's insights on the latest advancements and their implications for the industry.
Key Quotes:
"Trust is between two people. I don't trust the business or a line of questioning; I trust the individuals behind it." - Joey Smith
"Critical thinking and adaptability are essential in the ever-evolving field of cybersecurity." - Ben Miller
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is FAIR (Factor Analysis of Information Risk)?
Jun 18, 2024
Summary:
In this insightful episode, Timothy De Block sits down with Jack Jones, the creator of the Factor Analysis of Information Risk (FAIR) model. Jack shares his journey and the challenges he faced that led to the creation of FAIR, a groundbreaking framework for understanding and quantifying information risk.
Episode Highlights:
Introduction to FAIR:
FAIR stands for Factor Analysis of Information Risk.
It is a logical decomposition of the factors that drive how much loss exposure a scenario represents.
Jack's Catalyst for Creating FAIR:
The need for a quantifiable measurement of risk during his tenure as a CISO at Nationwide Insurance.
The pivotal moment when an executive asked him to quantify the organization's risk exposure.
Understanding Quantitative vs. Qualitative Risk:
Quantitative risk involves using units of measurement like percentages and dollar amounts.
Qualitative risk is ordinal and involves categories like high, medium, and low without precise measurement units.
Applying FAIR in Organizations:
The process of using FAIR starts with understanding the decision you need to support, scoping the scenario, identifying assets, threats, and controls, and using ranges to estimate frequency and impact.
FAIR helps in prioritizing risks and determining the ROI on security investments.
Challenges and Solutions in Using FAIR:
Common challenges include the perception that perfect data is needed, the skills gap, and the complexity of scaling quantitative analysis.
Leveraging community resources, training, and new automated solutions from vendors can help overcome these challenges.
Resources and Training:
The FAIR Institute offers free membership and extensive resources.
The Open Group provides professional certification and training materials.
The book "Measuring and Managing Information Risk: A FAIR Approach" is a recommended read.
Key Quotes:
"FAIR is about critically thinking about risk. The quantitative measurement is a bonus, but it's really a framework for thinking more clearly about the scenarios we need to manage against." - Jack Jones
"Protecting applications from session hijacking involves understanding the application's handling of temporary credentials and implementing robust security measures." - Jack Jones
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is the Innocent Lives Foundation?
Jun 11, 2024
Summary:
In this episode of Exploring Information Security, Chris Hadnagy and Shane McCombs join the podcast to discuss the Innocent Lives Foundation (ILF). They delve into the challenges of running a nonprofit focused on identifying and reporting online predators, the importance of volunteer mental health, and their personal experiences and motivations behind ILF.
Episode Highlights:
Challenges of Running ILF: Chris and Shane discuss the operational complexities and the importance of back-end work, including finances and CPA dealings.
Volunteer Involvement and Mental Health: Emphasis on mandatory wellness sessions for volunteers to ensure their mental well-being while dealing with disturbing content.
Personal Journeys and ILF’s Growth: Chris shares his unexpected journey from founding ILF to growing it with 40 volunteers and collaborating with the FBI.
Board Member Contributions: Stories about diverse board members, including actors and professionals from various fields contributing to ILF’s mission.
Prevention and Education Efforts: Shane highlights ILF's focus on preventing exploitation through education and engaging with parents and schools.
Quotes:
"Your children need to see you as their advocate, not their adversary." - On the importance of parental support in preventing exploitation.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Session Hijacking?
Jun 04, 2024
Summary:
In this informative episode, Timothy De Block discusses session hijacking with Web Application Security Engineer and PractiSec Founder Tim Tomes. The discussion delves into the intricacies of session hijacking, exploring its mechanics, vulnerabilities, and prevention strategies.
You can reach out to Tim for Training, Consulting, Coaching, Remediation Support, and DevSecOps.
Episode Highlights:
Understanding Session Hijacking:
Tim Tomes clarifies the common misconceptions about session hijacking, emphasizing its relation to temporary credentials rather than sessions alone.
The conversation covers the technical aspects, including how sessions and tokens are hijacked, and the role of cookies in managing temporary credentials.
Technical Mechanisms and Vulnerabilities:
Detailed explanation of how session hijacking occurs, focusing on temporary credential management and the vulnerabilities that allow hijackers to exploit these credentials.
Prevention and Security Best Practices:
Strategies to prevent session hijacking, such as secure management of tokens and sessions, are discussed.
Importance of using flags like HTTPOnly and Secure to protect data transmitted in cookies.
Common Tools and Exploitation Techniques:
Tim Tomes discusses common tools like Burp Suite and its Collaborator tool for detecting and exploiting session hijacking vulnerabilities.
Real-world Application and Examples:
Practical insights into how session hijacking is executed in the real world, including Tim’s personal experiences and how these vulnerabilities are identified during security assessments.
Key Quotes:
"Session hijacking is not just about stealing sessions; it's about exploiting the temporary credentials that represent a user." - Tim Tomes
"Protecting applications from session hijacking involves understanding the application's handling of temporary credentials and implementing robust security measures." - Tim Tomes
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Get Into Control Systems Security
May 28, 2024
Summary:
In this episode, Mike Holcomb discusses the intricacies of Industrial Control Systems (ICS) and Operational Technology (OT) security. Michael provides a comprehensive overview of the challenges and strategies associated with securing ICS and OT environments.
Episode Highlights:
Michael discusses the evolution of the Bsides Greenville event, emphasizing the incorporation of OT topics and the balance they aim to maintain between IT and OT content.
Michael shares insights into the unique cybersecurity challenges faced by different sectors, including manufacturing and power plants.
A deep dive into network architecture in ICS environments reveals the importance of segmentation and controlled access between IT and OT networks.
Michael emphasizes the critical nature of asset management and network monitoring in maintaining security in ICS environments.
The conversation also covers the increasing convergence of IT and OT systems and the implications for security.
Michael touches on the impact of ransomware on ICS environments and the need for robust incident response plans.
Guest Biography:Mike Holcomb is a seasoned expert in ICS and OT security, with extensive experience in developing and implementing security strategies in some of the world's largest industrial environments. He has contributed significantly to the field through education and practical solutions to enhance infrastructure resilience.
Resources Mentioned:
Mike Holcomb’s website
Free eBooks - Mike mentions that he has written free eBooks on getting started in ICS and OT cybersecurity, tailored for those coming from IT backgrounds and those from engineering or automation backgrounds.
YouTube Course - A free 25-hour course available on YouTube, designed to help beginners in ICS and OT cybersecurity.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Catching up with Mental Health Hackers Founder Amanda Berlin at ShowMeCon
May 21, 2024
Summary:
In this relaxed and engaging episode recorded from air loungers at Show Me Con, Timothy De Block catches up with Amanda Berlin from Mental Health Hackers during Mental Health Awareness Month. They discuss the importance of mental health in the IT security industry, which is often fraught with stress and high demands.
Episode Highlights:
Personal Stories of Mental Health: Timothy and Amanda share their personal experiences with mental health challenges, emphasizing the common struggles many face in the IT security field.
Impact of Alcohol: The discussion explores the impact of alcohol on mental health, particularly how it affects sleep and stress levels. They touch upon efforts to create event spaces that offer alternatives to alcohol-centric activities.
Mental Health Hackers: Amanda talks about the work of Mental Health Hackers, a group that attends various conferences to provide spaces for people to relax and decompress.
"It’s really about awareness... paying attention to how habits like drinking can impact our mental state and sleep." - Timothy De Block
"We need to create environments at events where drinking isn’t the main focus, allowing people to enjoy without the pressure of alcohol." - Amanda Berlin
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Have I Been Pwned?
May 14, 2024
Summary:
In this insightful episode of Exploring Information Security, Troy Hunt, the creator of the widely recognized website, Have I Been Pwned (HIBP) talks about the origins and evolution of the service. Troy discusses his transition from writing about application security to developing HIBP and delves into the impacts of data breaches on both individuals and companies.
Episode Highlights:
Impact of HIBP: Troy shares insights on how HIBP has evolved into a crucial tool for internet users to check if their data has been compromised in various data breaches.
Community Interaction: Discussion on how the community aids in identifying new breaches and the collective effort to maintain data integrity and security awareness.
Legal and Ethical Considerations: Troy talks about navigating legal challenges and ethical dilemmas in disclosing breaches and interacting with affected companies.
Technical Insights: An exploration of the technical aspects of running HIBP, including dealing with massive datasets and implementing security measures to protect stored data.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to Harness the Power of pfSense for Network Security
May 07, 2024
Summary:
In this episode of Exploring Information Security, Security Engineer Kyle Goode takes a deep dive into the versatile world of pfSense, a robust open-source firewall and router that has been a mainstay in the network security arena for over two decades. Kyle shares insights from his own experiences with pfSense, exploring both the practical and technical aspects of setting up and managing a pfSense system.
Episode Highlights:
Setting Up pfSense: Practical tips on how to set up pfSense on different types of hardware, and troubleshooting common setup issues.
Security Customizations: Detailed discussion on customizing pfSense for enhanced security, including the use of threat feeds and SSL inspection.
Maintenance and Updates: Tips on maintaining a pfSense installation, including regular updates and leveraging community resources for troubleshooting.
Benefits of Using pfSense: A look at the benefits of using pfSense over commercial routers, especially for those interested in a deeper understanding of network security.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What are Deepfakes with Dr. Donnie Wendt
Apr 30, 2024
Summary:
In this enlightening episode of the Exploring Information Security podcast, we dive deep into the world of deepfakes with Dr. Donnie Wendt. With a background in cybersecurity at MasterCard, Dr. Wendt shares his journey into the exploration of deepfake technology, from setting up a home lab using open-source tools to presenting the potential business impacts of deepfakes to leadership teams.
Key Discussions:
What are Deepfakes? Dr. Wendt explains the basics of deepfakes, a technology that uses machine learning to superimpose someone's likeness onto another person, creating realistic fake videos or audio recordings. Initially used for nefarious purposes, the technology has found applications in politics, social engineering, and entertainment.
Creating Deepfakes: Discover how Dr. Wendt utilized open-source tools and a good Nvidia video card to experiment with deepfake creation, including making Nicholas Cage a regular "guest" in security briefings at MasterCard.
The Threat Landscape: Dr. Wendt discusses the use of deepfakes in political manipulation and fraud, highlighting recent instances where deepfakes have influenced elections and scammed individuals and businesses out of large sums of money.
Detection and Prevention: The conversation touches on the challenges of distinguishing deepfakes from real footage, emphasizing the importance of skepticism, critical thinking, and verification processes to combat misinformation.
Positive Applications: Despite their potential for misuse, deepfakes also have beneficial uses, such as giving voice back to ALS patients, recreating historical speeches, and aiding medical diagnosis. Dr. Wendt stresses the importance of recognizing the technology's positive impact alongside its threats.
Episode Highlights:
Dr. Wendt's firsthand experience with creating deepfakes and the technical requirements for doing so.
Insight into the evolving capabilities of deepfake technology and the cat-and-mouse game between creators and detectors.
The significance of robust verification processes within organizations to safeguard against deepfake-related fraud.
Resources Mentioned:
Faceswap.dev: An open-source tool for experimenting with different deepfake creation algorithms.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
The Crucial Gap in Control Systems Security: A Deep Dive with Joe Weiss
Apr 23, 2024
Summary:
In this compelling episode of the Exploring Information Security podcast, we sit down with Joe Weiss, a seasoned expert in control systems security, to unravel the complexities and challenges facing the security of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems today.
Key Topics Discussed:
Understanding SCADA/ICS: Joe Weiss provides an in-depth explanation of what SCADA and ICS are, emphasizing their critical role in monitoring and controlling physical processes across various industries, from utilities to manufacturing.
The Security Gap: Weiss outlines the fundamental security gap existing between traditional IT cybersecurity measures and the unique needs of control systems. He highlights the dire consequences of neglecting the security of these systems, including potential physical damage and disruptions to critical infrastructure.
Bridging the Divide: The conversation delves into the challenges of bridging the knowledge and communication gap between IT professionals and engineers. Weiss stresses the importance of integrating engineering insights with cybersecurity practices to protect control systems effectively.
Historical Oversights and Current Challenges: Reflecting on over two decades of experience, Weiss discusses how historical oversights and the prioritization of IT security have led to vulnerabilities in control systems. He calls for a paradigm shift in how organizations and governments approach the cybersecurity of physical infrastructure.
Future Outlook and Solutions: Looking ahead, Weiss offers insights into the future of control systems security, advocating for education, awareness among senior management, and the need for a holistic approach that encompasses both the digital and physical aspects of security.
Episode Highlights:
A Call to Action for Senior Management: Weiss underscores the critical need for senior management in both the private and public sectors to recognize the existential threat posed by inadequate control systems security.
The Importance of Engineering Knowledge: The discussion emphasizes the need for cybersecurity professionals to possess a foundational understanding of engineering principles to secure control systems effectively.
Practical Steps Forward: Weiss suggests practical steps for improving the security posture of control systems, including enhancing cross-disciplinary education, fostering collaboration between IT and engineering teams, and adopting security measures tailored to the unique characteristics of control systems.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Talking PCI 4.0 change with Jeff Man
Apr 16, 2024
Summary:
Hacker Jeff Man
Welcome to a special edition of the Exploring Information Security podcast, where we dive into the intricacies of cybersecurity with industry veteran Jeff Man! A distinguished figure in cybersecurity Jeff has a wealth of experience that spans over four decades, including his early years at the National Security Agency and extensive work in the private sector.
Jeff's Journey: From his initial steps in the cybersecurity realm at the NSA to becoming a pivotal player in the payment card industry, Jeff shares his rich journey and the lessons learned along the way.
The Essence of PCI DSS 4.0: With the imminent rollout of PCI DSS version 4.0, Jeff breaks down the major changes and what organizations need to focus on to remain compliant. He emphasizes the shift towards continuous security practices over checkbox compliance.
Tales from the Crypt(analyst): Jeff gives us a sneak peek into his upcoming keynote at ShowMeCon, titled "Tales from the Crypt(analyst)," where he'll explore his cybersecurity adventures and the evolution of cyber threats and defenses over the years.
The Cloud Misconception: A discussion on common misconceptions about cloud security and the continuous responsibility of organizations to secure their cloud environments.
PCI as a Framework for Critical Infrastructure: Jeff argues that the PCI DSS, often seen merely as a compliance standard, holds the potential to serve as a robust security framework for various industries, including critical infrastructure.
Episode Highlights:
Advice from a Veteran: Jeff shares invaluable insights on the importance of understanding cybersecurity history to better navigate current and future challenges.
The Reality of Compliance and Security: Through anecdotes and personal experiences, Jeff illustrates the often-overlooked aspects of implementing and maintaining security measures effectively.
A Look Ahead: With PCI DSS 4.0 set to redefine compliance standards, Jeff offers practical advice for organizations to adapt and evolve their security posture.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: How AI will impact Cybersecurity Enhancements and Threats with Jayson E. Street
Apr 09, 2024
Summary:
Jayson E. Street
In this engaging episode Jayson E. Street, a renowned cybersecurity expert, joins me to discuss the return of ShowMeCon, the impact of AI in cybersecurity, and innovative strategies for enhancing security and combating threats. Jayson shares his excitement for ShowMeCon, insights on utilizing AI for security enhancements rather than traditional attacks, and offers practical advice for users, executives, and information security professionals.
Jayson E. Street referred to in the past as: A "notorious hacker" by FOX25 Boston, "World Class Hacker" by National Geographic Breakthrough Series and described as a "paunchy hacker" by Rolling Stone Magazine.
He however prefers if people refer to him simply as a Hacker, Helper & Human.
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Azure Vulnerabilities with Scott Miller
Apr 04, 2024
Scott Miller
Summary:
Scott Miller, a fresh voice in the cybersecurity arena, joins me to discuss the intricacies of hacking Azure services. Scott shares his journey from a recent college graduate to becoming a speaker at cybersecurity conferences, along with valuable insights into Azure AD (Active Directory), vulnerabilities within cloud services, and the art of escalation.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin
Apr 02, 2024
Paul Coggin
Summary:
In this captivating episode of the "Exploring Information Security" podcast, cybersecurity expert Paul Coggin discusses the intricate world of threat hunting in SCADA networks and the emerging frontier of space cybersecurity. From the inspiration drawn from Transformers movies to the sophisticated attacks like Stuxnet, Coggin delves deep into how monitoring physical indicators could revolutionize our approach to cybersecurity in both terrestrial and extraterrestrial domains.
Arnar is not a speaker this year at ShowMeCon but he will be in attendance. He doesn’t work in the security field but he’s doing some really advanced stuff with cooling in cloud environments. We get into a little bit of everything around what he’s doing as well as talk about AI. Surprise!
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Talking Sysmon with Amanda Berlin
Mar 19, 2024
Amanda Berlin
Summary:
Amanda Berlin is Lead Incident Detection Engineer at Blumira, where she leads the development of new detections for the Blumira platform, based on threat intelligence and research. In this episode I catch up with her to talk about Sysmon and ShowMeCon. Sysmon is such a great tool for getting more information out of your systems. The best part is it’s free.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Couch to Compromise with Johnny Xmas
Mar 12, 2024
Summary:
Veteran conference speaker Johnny Xmas joins me to discuss ShowMeCon and his talk Couch to Compromise the 2024 edition. His talk is an update from previous years which goes over the latest attacks impacting organizations.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Bypassing MFA with Shameer Amir
Mar 07, 2024
Summary:
Shameer Amir AKA Titan joins me to discuss his upcoming talk on his research into bypassing multifactor authentication (MFA) at the upcoming ShowMeCon conference. In this episode we talk about a variety of different ways of bypassing MFA from human interaction to more technical interactions with the platforms. A lot of what it comes down to is making sure MFA is setup properly.
Episode Highlights:
Why this talk
Response manipulation
SIM jacking
Misconfigurations
Guest Information:
Shameer Amir AKA Titan is a globally recognized bug hunter
Contact Information:
Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.
Check out our services page and reach out if you see any services that fit your needs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Navigating the Currents of Open Source Intelligence: Insights from the Field
Mar 05, 2024
Summary:
Micah Hoffman and Griffin Glynn from My OSINT Training join me to talk about the current state of OSINT. Both bring a wealth of knowledge and first meet while working together at the National Child Protection Task Force. They bring a wealth of knowledge and we get into a lot of the ins and outs of OSINT.
Episode Highlights:
What is OSINT?
What tools are used for OSINT
Social media changes?
How do APIs play into OSINT?
How is AI impacting OSINT?
Guest Information:
Micah Hoffman and Griffin Glynn co-owners of My OSINT Training environment and co-workers at National Child Protection Task Force (NCPTF)
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What cybersecurity tools every organization should have
Feb 27, 2024
Summary:
Rob Fuller AKA Mubix joins me to talk about security tooling every organization should have. This was a result of a discussion Rob and I were having about Thinkst Canary and RunZero. Two fantastic tools that are low cost, easy implementation, and provide a ton of value to a security team.
Episode Highlights:
Lots of tooling to talk about
You might hear Rob mention that he’s used one of the tools I suggest in a pentest engagement
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Bypassing MFA with Brandon Potter
Feb 22, 2024
This is a sponsored podcast by ShowMeCon which is May 13th & 14th. Tickets are still available! They’re also still looking for sponsors. Don't miss out on this opportunity to be part of the cybersecurity event of the year! Whether you're looking to learn, network, or elevate your brand, ShowMeCon is the place to be.
Summary:
Brandon Potter Chief Technology Officer of ProCircular, Inc.
Brandon Potter joins me to discuss the different ways he’s seeing MFA bypassed as part of his companies work. Attackers are using old and new techniques to discover creative ways to bypass MFA. This is a result of more companies getting onboard with MFA. Unfortunately, that means attackers are going to start to find more ways to bypass MFA. A lot of what Brandon is seeing is coming down to misconfiguration with how MFA is implemented and attackers are starting to use browser in the middle to hijack sessions. Finally, we go over how AI is going to impact MFA.
Episode Highlights:
ShowMeCon one of the few conferences in the Midwest to attend
Bypassing MFA
Misconfigurations in MFA
Browser-in-the-middle
Where is MFA being bypassed?
How is AI going to impact bypassing MFA
Guest Information:
Brandon Potter (CISSP, GSEC, GCIH, CCFP, GWAPT) is the Chief Technology Officer of ProCircular, Inc.,
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is a Canary?
Feb 20, 2024
Summary:
Tyron Kemp Presales Engineer at Thinkst Canary joined me to discuss what is a canary. More specifically Thinkst Canaries which is one of the most useful and simple to use tools in the security space. I’m surprised I haven’t heard of more companies using the tool. You drop it in an environment and if you get people scanning or touching it alerts the people that can respond. It’s as simple as that.
Episode Highlights:
What is a canary?
How are canaries used?
How Thinkst contributed to the community through free tools like Log4j discovery
How do canaries get implemented?
What’s ahead for Thinkst?
How AI will impact canaries
Guest Information:
Tyron Kemp Presales Engineer at Thinkst Canary - LinkedIn
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
ShowMeCon: Kevin Johnson and whatever he wants to talk about
Feb 15, 2024
This is a sponsored podcast by ShowMeCon which is May 13th & 14th. Tickets are still available! They’re also still looking for sponsors. Don't miss out on this opportunity to be part of the cybersecurity event of the year! Whether you're looking to learn, network, or elevate your brand, ShowMeCon is the place to be.
Summary:
Kevin Johnson CEO of Secure Ideas
Kevin Johnson the Chief Executive Officer of Secure Ideas joined me to discuss ShowMeCon and his keynote presentation on the infosec community rising from the ashes like a phoenix. It’s been a while since I’ve had the opportunity to catch up with Kevin but we got right into it and had a lot of great laughs. It’s a little all over the place with talk about ShowMeCon, reincarnation, and John Wick as a romantic comedy. Also, there is an EXPLICIT tag on this podcast.
Check the episode highlights below for a jingle on the topic.
Episode Highlights:
(Verse 1) 🎶 In the world of cyber, there's a place to be, ShowMeCon's the event, in the tech sea. Kevin Johnson's leading, with a tech-savvy crew, Bringing folks together, showing what they can do. 🎶
(Chorus) 🎵 ShowMeCon, ShowMeCon, where the tech minds meet, Diving deep in cyber streets, where challenges and passions greet. From the ashes, we will rise, like a phoenix, bold and wise, ShowMeCon, the stage is set, for a tech adventure you won't forget. 🎵
(Verse 2) 🎶 Imagine John Wick, with a softer side, In a rom-com twist, where love and action collide. He's hacking through the heart, with a smile so wide, At ShowMeCon, where worlds of tech and romance abide. 🎶
(Bridge) 🎵 Rising from the ashes, with the phoenix's flight, We'll conquer cyber battles, in the neon light. Kevin Johnson guides us, through the digital night, At ShowMeCon, we'll learn, we'll grow, and take our dreams to height. 🎵
(Chorus) 🎵 ShowMeCon, ShowMeCon, where the future's bright, Join us in the journey, in the quest for cyber might. From the ashes, we will rise, with our hearts and minds entwined, ShowMeCon, where dreams take flight, and every moment's a delight. 🎵
Guest Information:
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to implement a DAST
Feb 13, 2024
Summary:
Frank Catucci CTO & Head of Security Research at Invicti is someone who I go back with many years. We both meet while working for the state of South Carolina. I was happy to see him end up at Invicti because I think they have a great podcast focused primarily on Dynamic Application Security Testing (DAST). We get into a variety of topics in this episode around MoveIT, implementing DAST, APIs, and AI.
Episode Highlights:
How DAST could have helped with MoveIT
How to implement DAST into the SDLC
Automation that can be setup with DAST
How tickets from DAST should be handled
How AI is going to change DAST
How DAST handles APIs
Guest Information:
Frank Catucci CTO & Head of Security Research at Invicti - LinkedIn
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Mimikatz?
Feb 06, 2024
Summary:
Rob Fuller aka Mubix joins me to discuss what is Mimikatz? This came from some research I was doing online about hacker tools. I went to the Mimikatz GitHub repo and was immediately hit with a warning that it was a malicious site. Then I looked at the GitHub page and noticed it hadn’t been updated in years.
This lead me to reach out to Hacker Historian Mubix to get the skinny on Mimikatz. He provided some interesting not well known insights that you’ll have to listen to the episode to hear.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How responding to phishing has changed in the last five years
Jan 30, 2024
Summary:
Kyle Andrus is a seasoned incident responder for a top 500 company. He’s a regular on the podcast when I need to talk incident response and specifically phishing. I last had him on over five years ago to talk about building a malicious link clicker which I used quite a bit in my day-to-day job. Fast forward several years and things have changed significantly.
A lot of the things we used to do no longer make sense because tooling has become much better in the enterprise. A lot of security professionals operate there to respond to phishing emails. While our lives are a littler easier that has led to a new set of threats that the security community hasn’t quite gotten their hands wrapped around the newer problems. Finally, we go over how AI is going to impact phishing. I’m sure that will be a question for more many more podcasts.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to hack a satellite
Jan 23, 2024
Summary:
Tim Fowler is an offensive security person at Black Hills Information Security who also happens to be a space nerd thanks to Paul Coggin. I was sitting at the table with Tim at BSides Nashville when Paul planted the seed of satellite hack. Fast forward several hundred hours later and Tim has put together a lot of content on the topic including training for 2024.
He makes a compelling case for why we should care about security in space. Mainly, that it’s the next frontier. After spending over an hour talking to him I completely agree. It’s a path that we’re destined to head and a lot of the big companies are already moving that way. This is also a heavily unexplored space for people looking to get into an emerging field this is it.
Episode Highlights:
The history of space and the objects up there
Why we should care about security in space
The issues with satellite security
How to hack a satellite
How to secure objects in space
Guest Information:
Tim Fowler, Offensive Security Analyst and Space Nerd at Black Hills Information Security
What are the hiring trends in cybersecurity for 2024?
Jan 16, 2024
Summary:
Erin Barry, Head of Permanent Talent at Code Red Partners, joined me to discuss the hiring trends she’s seeing as we start 2024. I watched Erin’s talk on Security Hiring Trends from BSides San Francisco last year and thought she provided some really great insights. The end of 2023 has been a weird one especially for hiring. Erin provides some insight into the trends she’s seeing as well as what goes on behind the scenes of a recruiter. There’s also lots of good tips for putting together a resume and then navigating the process.
Episode Highlights:
How to stand out as a candidate
Networking is still the most important things you can do
How has the job search changed?
What to put on a resume
Guest Information:
Erin Barry, Head of Permanent Talent at Code Red Partners
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is ShowMeCon 2024?
Jan 09, 2024
Summary:
Dave Chronister the organizer of ShowMeCon joined me to discuss the revival of the conference. ShowMeCon is one of my favorite conferences. I had the pleasure of going to it from 2016-2018. I had plans to return in 2020 but the world event that we shall not speak of happened. I’m happy to see it return in 2024 and I will be there!
We get into a variety of topics around the conference including sponsorship, who attends, the venue, and the theme for 2024. The conference is still looking for sponsors and they’re about to do a second round of call for papers for speakers. If you’re looking to attendee the early bird price ends January 14th, 2024. Looking forward to seeing you there!
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
The Exploring Information Security Relaunch
Jan 02, 2024
ColaSec News November 2023
Dec 12, 2023
Reboot….initiated
This is an experiment and the first step to a potential return of the Exploring Information Security podcast. The past several months I’ve been working on adding content to the website. Now I’m looking to start podcasting again in 2023. As part of that I was looking at making the news section of the ColaSec user group apart of the podcasting rotation.
ColaSec is a local user meeting based out of Columbia, SC. When the pandemic hit the group moved to online which meant I got to be apart of the group again. Post pandemic we’re still meeting in person but we’ve now expanded to having an online presence along with the in-person meetup. One of the things we do as part of the intro to the meetup is talk about the news. If you’re a fan of Top Gear it’s a bit like that. We even do a Cool Wall sometimes.
In this segment we talk about the below security news topics:
Send feedback to timothy[.]deblock[@]gmail[.]com or fill out the contact form below. You can also connect with me on LinkedIn, just make sure to include that you’re a listener of the podcast.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Emotet?
Jan 14, 2019
In this inagural stream of the Exploring Information Security podcast, Daniel Ebbutt and Kyle Andrus join me to talk about Emotet.
Daniel (@notdanielebbutt) and Kyle (@chaoticflaws) are the two guys I go to for clicking on suspicious links. Recently, I’ve been seeing more Emotet. So, I wanted to have the guys on to talk about the malware that is making a comeback.
The CFP is open for Converge Conference. The conference is May 16 and 17. They’ll have one day for blue team topics and one day for red team topics. Make sure to submit your malware related talk topics. Also make sure to check out MiSec if you’re in Michigan.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
State of the podcast for 2018
Jan 04, 2019
In this end of the year podcast, I discuss the state of the podcast for 2018 and what’s ahead for 2019.
2018 was a good year. I made some format changes that I’m really happy with. I picked up some new audio equipment. I resolved my recording process (I think). I’m not a big statistics guy. I don’t really care if two people or 200 people listen. I’m just happy to have some really great conversations with people and contribute back to the community.
2018 Statistics
Here’s a really interesting graph of my RSS Subscribers.
No, I don’t have 40,000 listeners. Some of that is inflated by other podcast directories ripping my feed. What I look for is a steady increase in subscribers, which did happen by the end of the year. Albeit with a weird dip in November (broken feed, maybe).
This is from iTunes Connect (Beta).
I can’t do a yearly review of podcast stats. Instead here’s the peek month of October for my iTunes listening habits. Looking through all the months, I can make some inferences about my audience. The hacking/red team content is the most popular. With a 25-28% consumption rate, the conference podcasts are turned off by most people before the end.
What’s ahead for 2019
I’ve got a new recording setup that will hopefully make producing a podcast much easier. I’ve setup a Twitch channel for gaming and potentially recording EIS episodes on. Follow for notifications on when I go live. I’ll be trying my first EIS episode Monday, January 7, 2019, at 8:30 p.m. CT. I’ve also turned what was my attempt at a GamerSec Discord channel into the Exploring Information Security channel. Here you can interact with us while record (or on Twitch). Join other people interesting in the podcast. Game with other infosec professionals.
Thank you for being a listener of the podcast. I am refreshed from my month off and energized for what’s ahead in 2019.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What's happening at DerbyCon 2018 - Part 2
Nov 26, 2018
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine.
Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazing Lauren).
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What's happening at DerbyCon 2018 - Part 1
Nov 19, 2018
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine join me at DerbyCon 2018.
Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazing Lauren).
In this episode we discuss:
What OSINT classes and projects everyone is working on
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is advanced OSINT?
Nov 08, 2018
In this whiskey fueled edition of the Exploring Information Security podcast, Ryan MacDougall and Colin Hadnagy of Social Engineer join me to discuss advanced OSINT.
This past DerbyCon, I had the opportunity to take the Advanced OSINT with Ryan (@joemontmania) and Colin (@UnmaskedSE). The course was great! It was different from some of the other OSINT courses I’ve taken. They covered very specific techniques and tools. After presenting on those techniques and tools we were given the opportunity to dive in from a free-form standpoint.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
When will passwords go away?
Oct 31, 2018
In this authenticated edition of the Exploring Information Security podcast, I talk about when passwords will finally die!
This is a solo episode. I had the idea after sitting in a vendor pitch today (and because I’m slacking on my editing) where one of the sales guy mentioned that passwords WILL die. I disagree. I think passwords have been around for a long time and will continue to be around. They’re easily replaceable and is stored in the most secure location. Unless there are mind readers, then we’re all just screwed anyway.
I would love some thoughts and feedback on this one.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What we can learn from unusual journeys into infosec - Part 2
Oct 22, 2018
Stu (@cybersecstu) is a Co-Founder of The Many Hats Club, which is a massive Discord community and podcast. Earlier this year, Stu started sharing Unusual Journeys. I love this series because it highlights that there is no true path into infosec. He’s had 18 series so far and each story is fascinating.
In this episode we discuss:
Why failure is good
What sticks out from theses stories
What are some of the backgrounds people come from
What we can learn from unusual journeys into infosec - Part 1
Oct 15, 2018
Stu (@cybersecstu) is a Co-Founder of The Many Hats Club, which is a massive Discord community and podcast. Earlier this year, Stu started sharing Unusual Journeys. I love this series because it highlights that there is no true path into infosec. He’s had 18 series so far and each story is fascinating.
In this episode we discuss:
What started Unusual Journeys
How Stu got into infosec
What we can learn from these stories
Why communication in infosec is important - Part 2
Oct 08, 2018
Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works and what doesn’t work in communicating security to the different areas. Check her blog out.
In this episode we discuss:
How important is it for the company to take security seriously
How would someone get started improving communication?
Why communication in infosec is important - Part 1
Oct 01, 2018
Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team at Tenable. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works and what doesn’t work in communicating security to the different areas. Check her blog out.
In this episode we discuss:
What Claire’s experience is with communication and infosec
In this brand new edition of the Exploring Information Security podcast, I have a conversation with Justin Seitz (@jms_dot_py).
When I have guests hop on the podcast, I usually try to break the ice a little and get them warmed up for the episode. Often times these can turn into some really good conversation about the infosec field. I'd like to start capturing those conversation and release them (with the person's permission), because there are some really great insights.
I've released this episode early to the people on my newsletter (check below to get in on the fun). I wanted to get feedback and also give people who sign-up some bonus content, which is something I hope to do more.
In this episode we discuss:
My unique role working with other departments
Report writing and dealing with awful reports
Similarities between the developer boom and the security boom
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Why container security is important - Part 2
Sep 17, 2018
In this shipped edition of the Exploring Information Security podcast, Wes Widner joins me to discuss container security.
Wes (@kai5263499) is not a security person. He is a developer. A developer that understands security and why it's important. He deals a lot with automation and working with container technology.
In this episode we discuss:
What are some of the other security considerations?7
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Why container security is important - Part 1
Sep 10, 2018
In this shipped edition of the Exploring Information Security podcast, Wes Widner joins me to discuss container security.
Wes (@kai5263499) is not a security person. He is a developer. A developer that understands security and why it's important. He deals a lot with automation and working with container technology.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is Hunchly?
Sep 05, 2018
In this screenshot edition of the Exploring Information Security podcast, Justin Seitz joins me to discuss Hunchly.
Justin (@jms_dot_py) is the creator of Hunchly. I got to know Hunchly at SANS SEC487 OSINT training earlier this year. It's a fantastic tool that takes screenshot as the web is browsed. This is very useful for investigations involving OSINT. I'm also finding it useful for incident response, particularly for clicking on phishing pages. I sometimes forget to take screenshots as I'm investigating a phishing page. Having Hunchly means, I don't have to worry about taking screenshots. I then use the screenshots for reports and training.It's a really useful tool.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to make a Burp extension
Aug 27, 2018
In this crafting episode of the Exploring Information Security podcast, Paul Johnston Customer Champion at Portswigger joins me to discuss how to make a Burp extension.
Paul (@paulpaj) wrote a blog post on how to make a successful burp extension and get it published in the Burp Store. A lot of the recommendations in the article are from Paul's experience handling extension submissions for the Burp Store.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to handle CFP rejection(s)
Aug 20, 2018
In this refused episode of the Exploring Information Security podcast, Michael Kavka joins me to discuss how to handle call for presentation rejections.
Michael (@SiliconShecky) wrote a blog post on his site at the beginning of the year titled, It is CFP season... So what. In the article he hit on rejections and I thought it'd make for a great podcast topic. More recently, he wrote a blog post on the,Anatomy of a Rejected CFP. The article walks through his rejected CFP for DerbyCon.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to create a phishing email - Part 2
Aug 13, 2018
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email.
Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, I decided I'd go to someone who does this on a regular basis. Check out Chris' ODIN tool for automating intelligence gathering, asset discovery, and reporting.
In this episode we discuss:
What are the technical steps to creating a phish
What needs to be consider from a technical standpoint
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to create a phishing email - Part 1
Aug 06, 2018
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email.
Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, I decided I'd go to someone who does this on a regular basis. Check out Chris' ODIN tool for automating intelligence gathering, asset discovery, and reporting.
In this episode we discuss:
What you need to consider before creating a phish.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is OSINT ORCS YOGA?
Jul 31, 2018
In this battlefield edition of the Exploring Information Security podcast, Micah Hoffman joins me to discuss OSINT ORCSYOGA.
Micah (@WebBreacher), is a SANS Instructor and author of the SEC487 OSINT course. He recently had his second class in Denver, Colorado (more dates here). During that class he found people asking about how to navigate the waters of OSINT resources. His solution was to start the OSINT Resource Classification System (ORCS). It's a call for the OSINT community to standardize on how resources are categorized. YOGA or Your OSINT Graphical Analyzer is meant to be a visual aid for people looking to navigate the streets of OSINT resources.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to implement GDPR - Part 2
Jul 16, 2018
In this 2k-like edition of the Exploring Information Security podcast, Stuart Scott AWS Content Lead at Cloud Academy and George Gerchow Chief Security Officer at Sumologic join me to discuss how to implement GDPR.
Stuart (@Stuart_A_Scott) and George (@georgegerchow) both have contributed content to CloudAcademy on GDPR. Stuart has a nine hour course on using AWS Compliance Enabling Services. George has a done a webinar and written an article on the topic. Both are well spoken and highly informed on the topic. They provide a lot of good direction for anyone looking to account for GDPR in their organization (pro tip: everyone should be looking into this).
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to implement GDPR - Part 1
Jul 09, 2018
In this 2k-like edition of the Exploring Information Security podcast, Stuart Scott AWS Content Lead at Cloud Academy and George Gerchow Chief Security Officer at Sumologic join me to discuss how to implement GDPR.
Stuart (@Stuart_A_Scott) and George (@georgegerchow) both have contributed content to CloudAcademy on GDPR. Stuart has a nine hour course on using AWS Compliance Enabling Services. George has a done a webinar and written an article on the topic. Both are well spoken and highly informed on the topic. They provide a lot of good direction for anyone looking to account for GDPR in their organization (pro tip: everyone should be looking into this).
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to crack passwords
Jul 02, 2018
In this crackerjack edition of the Exploring Information Security podcast, Sean Peterson of Parameter Security joins me to discuss password cracking.
Sean (@SeanThePeterson), is one of the most passionate infosec people you don't know. He recently did a talk at ShowMeCon on how to crack passwords. It was his first ever talk and pretty damn good. Sean joined me to give me his insights into password cracking.
In this episode we discuss:
What type of hardware is needed for password cracking
What type of attacks are used for password cracking
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What is the General Data Protection Regulation (GDPR)
Jun 25, 2018
In this European edition of the Exploring Information Security podcast, Cliff Smith of Parameter Security joins me to discuss General Data Protection Regulation (GDPR).
Cliff (@BismthSalamandr), recently gave a talk at ShowMeConon GDPR and why everyone should care. It's a really good talk and a great primer if you haven't dug into GDPR, yet (you should). Cliff is a recovering lawyer, so he's providing a different angle than your normal security professional.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to talk to developers
Jun 18, 2018
Tanya (@shehackspurple), is a former developer turned security person. She speaks regularly at conferences around the globe. The topics often focus on working with developers to improve security, which is something I believe in. She's a project lead for OWASP DevSlop.
In this episode we discuss:
Why working with the developers is important
How to talk to developers
What are the benefits of working with developers?
What are the top recommendations for talking to developers
ShowMeCon 2018 Live
Jun 14, 2018
In this panelist episode of the Exploring Information Security podcast, the first ever podcast panel at ShowMeCon 2018!
Amanda Berlin (@InfoSystir), Wik (@jaimefilson), David Cybuck (@dpcybuck), April Wright (@aprilwright), and Dave Chronister (@bagomojo) join me on the live EIS panel at ShowMeCon, June 7, 2018. This is the first panel I've ever done for the podcast. It went so well, I hope to do more in the future. We cover a variety of topics and have a few laughs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to achieve security awareness through social engineering - Part 2
Jun 04, 2018
In this ranty edition of the Exploring Information Security podcast, Jayson E. Street joins me to discuss how to achieve security awareness through social engineering.
Jayson (@jaysonstreet), is the VP of Information Security at Sphereny. He and April Wright (@aprilwright) are doing training at both Black Hat and DerbyCon on how to achieve security awareness through social engineering. The training focuses on helping blue team members setup effective security awareness programs.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
How to achieve security awareness through social engineering - Part 1
May 28, 2018
In this ranty edition of the Exploring Information Security podcast, Jayson E. Street joins me to discuss how to achieve security awareness through social engineering.
Jayson (@jaysonstreet), is the VP of Information Security at Sphereny. He and April Wright (@aprilwright) are doing training at both Black Hat and DerbyCon on how to achieve security awareness through social engineering. The training focuses on helping blue team members setup effective security awareness programs.
What's happening at Converge and Detroit BSides?
May 21, 2018
In this pile of an episode for the Exploring Information Security podcast, Johnny Xmas (@J0hnnyXm4s), Kate Vajda (@vajkat), Rachel Andrus, Kyle Andrus (@chaoticflaws), Daniel (not going to try spelling last name), Amanda Ebbutt, Daniel Ebbutt (@notdanielebbutt), Chris Maddalena (@cmaddalena), and myself get together to record a podcast during Converge and BSides Detroit.
It's another podcast special! This one was at Converge and BSides Detroit. This one took a little bit to get going. When we did we got into a little bit of everything. Topics both in infosec and topics outside of infosec.
In this episode we discuss:
Everyone tries Malort
The "breach" at Twitter
One size doesn't fit all for the populace
Real world issues (net neutrality, income, and public service)
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
Why mental health is important
May 14, 2018
In this mindful episode of the Exploring Information Security podcast, Amanda Berlin joins me from Converge and BSides Detroit this past week to talk about mental health.
Amanda (@InfoSystir) gave a keynote at Converge last week. The topic: mental health. It's a great talk and something I recommend people watch. Mental health is very important in our field. A lot of us were bullied coming up through school. Others grew up in awful environments. We've gotten past those challenges to become successful information security professionals. There are still scars, however, and if we don't identify and address them it will lead to unhealthy actions. Especially, since we are in a high-stress field that is overwhelmed.
We need to have an open dialogue about mental health. The downside to have a poor mental health. We need to share ideas on how to better address our state of minds. Often we feel alone. We are not. If you feel like you are in a bad place mentally, there are resources that can help. Call a hotline (1-800-273-8255). Do a Google search. There are people who can help. Family, friends, or mentors. You matter.
Sign up with your email address to receive news and updates.
Email Address
Sign Up
We respect your privacy.
Thank you!
What are bug bounty programs?
May 07, 2018
In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.
Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.
Micah (@WebBreacher) has spent the last year plus putting together the SANS SEC487 course. The course focuses on Open-Source Intelligence Gather and Analysis (OSINT). I had the pleasure of attending the very first iteration of the course. I had an absolute blast and would recommend the course to anyways (even those outside of infosec). I wrote about the course on my blog.
Micah (@WebBreacher) has spent the last year plus putting together the SANS SEC487 course. The course focuses on Open-Source Intelligence Gather and Analysis (OSINT). I had the pleasure of attending the very first iteration of the course. I had an absolute blast and would recommend the course to anyways (even those outside of infosec). I wrote about the course on my blog.