Suz Hinton
👤 PersonAppearances Over Time
Podcast Appearances
I'm of the same opinion as you. I think it would be very tedious as well because it's not like you're sitting there having fun on a Saturday night with a whiskey. You're having to be very methodical as well about how you go about things. You have to be very careful not to take down their systems. It's not a sort of a realistic hacking scenario, right?
I'm of the same opinion as you. I think it would be very tedious as well because it's not like you're sitting there having fun on a Saturday night with a whiskey. You're having to be very methodical as well about how you go about things. You have to be very careful not to take down their systems. It's not a sort of a realistic hacking scenario, right?
There are the rules of engagement, which is literally a document you have to cover with them first and then You have to make sure that they're not going to call the cops on you if you physically get into the building, but then they catch you. It sounds thrilling, but it's actually quite methodical and I think it takes a lot of the fun out of it.
There are the rules of engagement, which is literally a document you have to cover with them first and then You have to make sure that they're not going to call the cops on you if you physically get into the building, but then they catch you. It sounds thrilling, but it's actually quite methodical and I think it takes a lot of the fun out of it.
So I was working on a research and development team for threat hunting technology, essentially. So the human side of cybersecurity where you're constantly looking ahead and trying to find
So I was working on a research and development team for threat hunting technology, essentially. So the human side of cybersecurity where you're constantly looking ahead and trying to find
heuristics and um like you know what's what are the latest sort of nation state hacker groups like what are the tools that they're using what are the technologies like how can we get ahead of them how can we design tools that are sort of always ahead of the curve and not necessarily just trying to be sort of whack-a-mole and and things like that so it was more i worked with data scientists and
heuristics and um like you know what's what are the latest sort of nation state hacker groups like what are the tools that they're using what are the technologies like how can we get ahead of them how can we design tools that are sort of always ahead of the curve and not necessarily just trying to be sort of whack-a-mole and and things like that so it was more i worked with data scientists and
researchers you know really smart people with PhDs and I'm like this code monkey you know helping them prototype their ideas and things like that so that was I was definitely more on the blue team side and not the red hat hacking yeah that sounds better actually that sounds pretty sweet it's still a game right like we were still playing the game we're just yeah on the other side of the game and so it can be really satisfying if you design a tool that helps track down something that hasn't been tracked down before you know um
researchers you know really smart people with PhDs and I'm like this code monkey you know helping them prototype their ideas and things like that so that was I was definitely more on the blue team side and not the red hat hacking yeah that sounds better actually that sounds pretty sweet it's still a game right like we were still playing the game we're just yeah on the other side of the game and so it can be really satisfying if you design a tool that helps track down something that hasn't been tracked down before you know um
or just helps threat hunters do their job much more efficiently so that they can just kind of look like these supernatural hunters. There's just something that was really interesting about that problem that I really enjoyed working on.
or just helps threat hunters do their job much more efficiently so that they can just kind of look like these supernatural hunters. There's just something that was really interesting about that problem that I really enjoyed working on.
I don't know if I can talk about the specific ones at that company because of an idea. Sure, generalize maybe. Yeah, but in general...
I don't know if I can talk about the specific ones at that company because of an idea. Sure, generalize maybe. Yeah, but in general...
Working with Intel groups so that they can, you know, there are a lot of Intel groups that around the world that including, you know, governments who are embedded in these groups and operating under pseudonyms online and are actually interacting with these groups and finding out information. So a lot of it is Intel, but also threat feeds like being able to see new signatures and things like that.
Working with Intel groups so that they can, you know, there are a lot of Intel groups that around the world that including, you know, governments who are embedded in these groups and operating under pseudonyms online and are actually interacting with these groups and finding out information. So a lot of it is Intel, but also threat feeds like being able to see new signatures and things like that.
But the actual tools themselves tend to be tools that allow these threat hunters to look at an intrusion after it's happened, be able to kind of look at the chronological events that took place,
But the actual tools themselves tend to be tools that allow these threat hunters to look at an intrusion after it's happened, be able to kind of look at the chronological events that took place,
you know, and just get a holistic view of it, you know, it gets to the point where threat hunters can look at a couple of lines of command line commands that would run on like an infected computer or a computer with a successful intrusion, a compromised one, and they can immediately say, oh, that's that threat actor in China, you know.
you know, and just get a holistic view of it, you know, it gets to the point where threat hunters can look at a couple of lines of command line commands that would run on like an infected computer or a computer with a successful intrusion, a compromised one, and they can immediately say, oh, that's that threat actor in China, you know.