Daily Cyber Threat Brief
Episodes
How To Reverse Engineer Like A Boss
04 Apr 2022
Contributed by Lukas
Reversing is a valuable skill within the #cybersecurity industry. The ability to take apart a binary to analyze it and see exactly how it works is use...
That Cybersecurity Product Life - Day In The Life
04 Apr 2022
Contributed by Lukas
Much focus is given to operational roles within the information security space, but there are many other opportunities that might align with your pers...
Practical SOC Analyst Core Skills with John Strand
18 Mar 2022
Contributed by Lukas
SOC Analyst skills are in high market demand. There are so many options to get experience between cyber ranges, labs, youtube videos, and books. How d...
When Bug Bounty and Job Hunting Collides
11 Mar 2022
Contributed by Lukas
What are bug bounties and how can you leverage them to develop skills, make money, and network within the #cybersecurity community? Guest Links:https:...
Cybersecurity Conflict Analysis | An Apolitical, Academic Discussion
04 Mar 2022
Contributed by Lukas
The current conflict in eastern Europe has had significant cyber operations elements. Both military and private faction activities. Guest Links:http...
Why Branding Helps Win You the Job
27 Feb 2022
Contributed by Lukas
Its going to be a lively conversation with many take-aways you won't want to miss.Guest Links:https://www.linkedin.com/in/iamnerdy/https://www.itcaree...
All Things Cyber in AI, Conferences, Education, and So Much More
18 Feb 2022
Contributed by Lukas
Are you aware of the upcoming initiatives of the non-profit Cyber Bytes Foundation??Guest Links:https://www.linkedin.com/in/amandasawicz/https://www.l...
Hot Takes on Current Cybersecurity Events
11 Feb 2022
Contributed by Lukas
Curious what industry professionals hot takes are on many of the pressing events in today's cybersecurity news?Guest Links:https://www.youtube.com/c/C...
How to GRC Like A Boss with Erika McDuffie
04 Feb 2022
Contributed by Lukas
The GRC space in cybersecurity is blowing up, but how do you get into this space and once you're there how do you dominate it??Guest Links:https://www...
What Is Cyber Cartography? With Ricky Tan
28 Jan 2022
Contributed by Lukas
Knowing your environment is a priority security control and difficult to do well. The uncommon role of Cyber Cartographer grabbed my attention when I ...
You Can't Patch All The Things - Practical Vuln Prioritization
21 Jan 2022
Contributed by Lukas
Sometimes you can't patch systems for a number of reasons, but how do you determine what is acceptable and what is a 'come in on the weekend' and fix ...
A Tale of Two Cyber-Cities | First Hand Account of Reinventing Yourself
14 Jan 2022
Contributed by Lukas
Are all your decisions, actions, and efforts what defines you, or can you reinvent yourself?If you have always been a stay-at-home parent, an accounta...
Disrupting Cyber Education with John Strand
07 Jan 2022
Contributed by Lukas
What is the price for cybersecurity education and are you gated out of accessing it?What if you could get world class training for the price that YOU ...
Practical Corporate Cybersecurity Risk Management (Seriously)
07 Jan 2022
Contributed by Lukas
Even with the best cybersecurity tools and skills, a third-party cybersecurity incident can seriously disrupt your operations.Payroll service provider...
Modern Pentesting with Phillip Wylie | Fireside Chat
05 Jan 2022
Contributed by Lukas
Guest Links:https://www.linkedin.com/in/phillipwylie/ https://www.twitch.tv/thehackermakerhttps://www.youtube.com/c/PhillipWylie/The Pentester Bluepri...
Everything ICS / OT Cybersecurity with Clint Bodungen
11 Dec 2021
Contributed by Lukas
In this interview we are talking with ICS/OT cybersecurity expert Clint Bodungen (who is also the author of the best selling book "Hacking Exposed: IC...
Insider Threats and Crypto Scamming with Charles Finfrock
04 Dec 2021
Contributed by Lukas
In this livestream we will be talking with Charles Finfrock former career CIA fields ops officer, dark web expert, cryptocurrency savvy, and a million...
Threat-Informed Cybersecurity Insurance Roundtable
19 Nov 2021
Contributed by Lukas
Most Cyber Insurance companies belong to multiple Threat Intel services and Security rating companies for monitoring and analyzing their customers sec...
Explaining DevSecOps Engineer FULLY (Is It Right For You?)
16 Nov 2021
Contributed by Lukas
In this video, Ashish Rajan, cybersecurity executive and cloud security expert about the DevSecOps role, what it is, whats great about it, whats tough...
007 Fireside Chat with Cyber Insecurity Neal Bridges
13 Nov 2021
Contributed by Lukas
Neal Bridges, content creator at Cyber Insecurity, has provided guidance and mentorship at scale through his YouTube and LinkedIn content. Neal join...
006 Operationalizing Purple Teaming
05 Nov 2021
Contributed by Lukas
Purple teaming has allowed an evolution from a combative point-in-time red team exercises and blue team responsive tuning to allow for collaborative, ...
005 How To Become a Cybersecurity Mentor with Nato Riley
29 Oct 2021
Contributed by Lukas
Mentoring is a powerful dynamic that helps you reinforce your own knowledge base, contribute to the community, and expand your professional network, b...
004 Lets Land Your First Cybersecurity Job
26 Oct 2021
Contributed by Lukas
In this talk, I’m going to pull back the curtain on working in the industry and help you understand: * 10000 foot view of what working cybersecurity...
003 VetSecCon Preview with Tom Marsland
15 Oct 2021
Contributed by Lukas
Tom Marsland is the VetSec chairman and is previewing the value of the free cybersecurity conference VetSecCon and how you can get invovled for free.
002 Charles Finfrock and the Dark Arts of Cryptocurrency
13 Oct 2021
Contributed by Lukas
We are interviewing Charles Finfrock, Career CIA Field Operations Officer and expert on crypto currency and its use in operations. This is going to be...
001 Heath Adams 'The Cyber Mentor' Disrupting the Industry with PNPT
12 Oct 2021
Contributed by Lukas
Heath Adams, aka the Cyber Mentor is well known for his education contributions to the cybersecurity industry and for his talent as a penetration test...