Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jerod

๐Ÿ‘ค Speaker
2134 total appearances

Appearances Over Time

Podcast Appearances

Yeah, sorry about that. I can attest that Mr. Robot was an amazing series. It doesn't go where you think it should. You may enjoy it, but it's very technically accurate and quite scary in terms of... Maybe how fragile the world is. You probably see that now that you're deeper into it, how fragile the world can be with cybersecurity.

Yeah, sorry about that. I can attest that Mr. Robot was an amazing series. It doesn't go where you think it should. You may enjoy it, but it's very technically accurate and quite scary in terms of... Maybe how fragile the world is. You probably see that now that you're deeper into it, how fragile the world can be with cybersecurity.

We just had a major outage, a BSOD across the world, and it's crazy. It's now sort of front and center to everyday citizens globally because it was a global scenario. Yeah.

We just had a major outage, a BSOD across the world, and it's crazy. It's now sort of front and center to everyday citizens globally because it was a global scenario. Yeah.

What kind of signatures are they leaving? Like, what's the breadcrumbs they're leaving behind? Is it, like, literally a signature? Is it, like, a DAT file that's left behind with, like, you know, a one-liner?

What kind of signatures are they leaving? Like, what's the breadcrumbs they're leaving behind? Is it, like, literally a signature? Is it, like, a DAT file that's left behind with, like, you know, a one-liner?

That sounds like not a very good hacker if they leave their signature behind. Or they leave a file that says, you know, don't delete me, read this message.

That sounds like not a very good hacker if they leave their signature behind. Or they leave a file that says, you know, don't delete me, read this message.

How do they get their tasks? Are they just sitting in JIRA getting threat hunting tasks? I'm just joking, of course, but how do they get their missions? How do they know what systems? Are they active in literal crime scenarios? Are they working for folks like the NSA and the FBI or private companies like you were?

How do they get their tasks? Are they just sitting in JIRA getting threat hunting tasks? I'm just joking, of course, but how do they get their missions? How do they know what systems? Are they active in literal crime scenarios? Are they working for folks like the NSA and the FBI or private companies like you were?

Yeah. What's the best way in to get into this, this layer of cybersecurity, whether it's threat hunting or, you know, looking at signatures or something like, what's the, is it go to school for it? Just get steeped in it, find a community. What's the best way in?

Yeah. What's the best way in to get into this, this layer of cybersecurity, whether it's threat hunting or, you know, looking at signatures or something like, what's the, is it go to school for it? Just get steeped in it, find a community. What's the best way in?

Well, that's the thing. They're on YouTube getting impressed at a young age. And next thing you know, white hat hacker for the NSA. Yep. You said you did eight of 10. Is that right? How did you even get involved in this, capture the flag in the first place with the NSA? Like what made you find it, discover it, want to do it?

Well, that's the thing. They're on YouTube getting impressed at a young age. And next thing you know, white hat hacker for the NSA. Yep. You said you did eight of 10. Is that right? How did you even get involved in this, capture the flag in the first place with the NSA? Like what made you find it, discover it, want to do it?

Yeah. Are you trying to find something like you may have said this and I glossed over, but like the goal is to find a secret or get into a certain place. What exactly, like what is the artifact that you find? Is it a physical or a digital physical thing or is it just access or is it something you take back and you show, Hey, here's proof I've got this thing.

Yeah. Are you trying to find something like you may have said this and I glossed over, but like the goal is to find a secret or get into a certain place. What exactly, like what is the artifact that you find? Is it a physical or a digital physical thing or is it just access or is it something you take back and you show, Hey, here's proof I've got this thing.

What are the things you would look for on top? Like a new process ID that just seems obscure, doesn't belong?

What are the things you would look for on top? Like a new process ID that just seems obscure, doesn't belong?

What we need is top, top. Top of the top. Top of the top.

What we need is top, top. Top of the top. Top of the top.