Mike Ritland
๐ค SpeakerAppearances Over Time
Podcast Appearances
maybe a little aggressive in context of cybersecurity, but, you know, how do you solve that? Like in boxing, you train, you get punched in the face, right? And then, well, okay, now it's not going to be new when it happens. So you might have a plan, but are you going to execute on the plan? Are you going to, like, miss some steps? Is motion going to get involved? And also, you know, I can...
maybe a little aggressive in context of cybersecurity, but, you know, how do you solve that? Like in boxing, you train, you get punched in the face, right? And then, well, okay, now it's not going to be new when it happens. So you might have a plan, but are you going to execute on the plan? Are you going to, like, miss some steps? Is motion going to get involved? And also, you know, I can...
find holes at different layers, but red taming is going to be repeating exactly the entire chain. It's often called a kill chain, where you're connecting all of these different vulnerabilities to go from completely outside to completely to the crown jewels, take them out and succeed, and then you show how you did it after the fact. How'd you get into that?
find holes at different layers, but red taming is going to be repeating exactly the entire chain. It's often called a kill chain, where you're connecting all of these different vulnerabilities to go from completely outside to completely to the crown jewels, take them out and succeed, and then you show how you did it after the fact. How'd you get into that?
find holes at different layers, but red taming is going to be repeating exactly the entire chain. It's often called a kill chain, where you're connecting all of these different vulnerabilities to go from completely outside to completely to the crown jewels, take them out and succeed, and then you show how you did it after the fact. How'd you get into that?
good question so kind of almost don't even know but over the course of just life and I started off as just help desk IT sysadmin where you learn a lot of things and at the time I didn't think it was very applicable but like those are all the systems and the nuances and like just the weird compromises you learn like oh I don't have enough budget so I'm going to do it this way or you learn about the end users that you're supporting as help desk and all the
good question so kind of almost don't even know but over the course of just life and I started off as just help desk IT sysadmin where you learn a lot of things and at the time I didn't think it was very applicable but like those are all the systems and the nuances and like just the weird compromises you learn like oh I don't have enough budget so I'm going to do it this way or you learn about the end users that you're supporting as help desk and all the
good question so kind of almost don't even know but over the course of just life and I started off as just help desk IT sysadmin where you learn a lot of things and at the time I didn't think it was very applicable but like those are all the systems and the nuances and like just the weird compromises you learn like oh I don't have enough budget so I'm going to do it this way or you learn about the end users that you're supporting as help desk and all the
problems they run into, and, oh, they're running into, like, policy that stops them from working, so, oh, they're going to do this. That's going to cause a degradation of security, but it's really common. You know that, having been in helpdesk and sysadmin, so you start to connect these things together, and it becomes this really...
problems they run into, and, oh, they're running into, like, policy that stops them from working, so, oh, they're going to do this. That's going to cause a degradation of security, but it's really common. You know that, having been in helpdesk and sysadmin, so you start to connect these things together, and it becomes this really...
problems they run into, and, oh, they're running into, like, policy that stops them from working, so, oh, they're going to do this. That's going to cause a degradation of security, but it's really common. You know that, having been in helpdesk and sysadmin, so you start to connect these things together, and it becomes this really...
valuable just bucket of information for oh how would i get into the company using that and you know got really into security for a while it's just it's it's also a piece of that role like you're gonna run all the systems for it you gotta keep them secure too especially in small companies where you don't have dedicated security it's like no you you are the security so you gotta learn it that way which requires you to think also how does an attacker do it because
valuable just bucket of information for oh how would i get into the company using that and you know got really into security for a while it's just it's it's also a piece of that role like you're gonna run all the systems for it you gotta keep them secure too especially in small companies where you don't have dedicated security it's like no you you are the security so you gotta learn it that way which requires you to think also how does an attacker do it because
valuable just bucket of information for oh how would i get into the company using that and you know got really into security for a while it's just it's it's also a piece of that role like you're gonna run all the systems for it you gotta keep them secure too especially in small companies where you don't have dedicated security it's like no you you are the security so you gotta learn it that way which requires you to think also how does an attacker do it because
You got to defend against that, right? So eventually, I just kind of got bored of doing IT and made the jump into security. Started learning... Actually, Bryce is a good connection on this as well. So... I had known Bryce for a long time, and I think it was like 2013, first time I went to DEF CON, Hacker Security Conference, biggest one in the world, in Vegas, every year.
You got to defend against that, right? So eventually, I just kind of got bored of doing IT and made the jump into security. Started learning... Actually, Bryce is a good connection on this as well. So... I had known Bryce for a long time, and I think it was like 2013, first time I went to DEF CON, Hacker Security Conference, biggest one in the world, in Vegas, every year.
You got to defend against that, right? So eventually, I just kind of got bored of doing IT and made the jump into security. Started learning... Actually, Bryce is a good connection on this as well. So... I had known Bryce for a long time, and I think it was like 2013, first time I went to DEF CON, Hacker Security Conference, biggest one in the world, in Vegas, every year.
And I decided, oh God, what was this? So there's these unrecorded talks they also do in certain areas. He was on stage, I think he was doing something with Bitcoin at the time, and he had this telepresence robot on stage for a guy who was on house arrest. He couldn't come, so he brought a telepresence robot to be Bryce's partner on the stage. It was just wild watching this.
And I decided, oh God, what was this? So there's these unrecorded talks they also do in certain areas. He was on stage, I think he was doing something with Bitcoin at the time, and he had this telepresence robot on stage for a guy who was on house arrest. He couldn't come, so he brought a telepresence robot to be Bryce's partner on the stage. It was just wild watching this.
And I decided, oh God, what was this? So there's these unrecorded talks they also do in certain areas. He was on stage, I think he was doing something with Bitcoin at the time, and he had this telepresence robot on stage for a guy who was on house arrest. He couldn't come, so he brought a telepresence robot to be Bryce's partner on the stage. It was just wild watching this.