Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Wait Just an InfoSec

Technology

Activity Overview

Episode publication activity over the past year

Episodes

2024 Trends & Predictions Series: Ransomware

24 Jan 2024

Contributed by Lukas

With the continuous evolution of ransomware and its pervasive risks to organizations’ very existence, new threats can be difficult to predict. That’...

2024 Cyber Defense Trends and Predictions

10 Jan 2024

Contributed by Lukas

Join SANS Senior Instructor, Blueprint podcast host, and blue team guru, John Hubbard, as he walks us through his cyber defense trends and predictions...

Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad

06 Dec 2023

Contributed by Lukas

In an era characterized by the profound interconnection of technology, business strategy, and people within the realm of cybersecurity, the need for l...

Cyber Warfare Frontlines: Unveiling the Digital Battlefield with Rob Lee and Jake Williams

29 Nov 2023

Contributed by Lukas

Join renowned cybersecurity experts Rob Lee and Jake Williams in a riveting livestream discussion as they delve into the complex world of offensive cy...

Thinking Outside the Firewall: Unconventional Cybersecurity Journeys

15 Nov 2023

Contributed by Lukas

Join us for an exhilarating episode as we dive into the extraordinary journeys of two unconventional cybersecurity success stories. Discover how they ...

Weird Security Voyeurs Unite

09 Nov 2023

Contributed by Lukas

In this episode of Wait Just an Infosec, host Ryan Chapman is joined by Sherrod Degrippo to get a little weird and discuss some of the things they are...

Applying the Science of Human Behavior to Cybersecurity

01 Nov 2023

Contributed by Lukas

Applying psychological principles to educating end users about cybersecurity is nothing new; security awareness teams have long relied on behavioral s...

Let's Settle This in the Cyber Range

25 Oct 2023

Contributed by Lukas

Ed Skoudis, SANS.edu President and creator of many a cyber range, will take the reins as host to welcome a bevy of cyber range aficionados, for an epi...

Building the Security Culture Dream Team

19 Oct 2023

Contributed by Lukas

In a perfect world, what would the ultimate Security Culture team look like? What would be the different roles and skill sets on your team? Who would ...

Defending Your Business Against Ransomware & Cyber Extortion

11 Oct 2023

Contributed by Lukas

SANS Certified Instructor and ransomware expert Ryan Chapman hosts this episode of Wait Just an Infosec, exploring tactics for defending your organiza...

To Click or Not to Click?

04 Oct 2023

Contributed by Lukas

The ground floor for corporate cybersecurity awareness begins with the users. Or does it begin with corporate safeguards? In this episode of Wait Jus...

Threat Actor Tool Analysis at Enterprise Scale

22 Sep 2023

Contributed by Lukas

"The more we learn about the tools that threat actors use — from discovery/enumeration tools all the way through ransomware payloads — the be...

Detection Engineering: The Blue Team Cheat Code

13 Sep 2023

Contributed by Lukas

Detection engineering requires a unique combination of technical skills, threat research, and scientific method. Done properly, it allows us to better...

Inside SANS Holiday Hack Challenge 2023

30 Aug 2023

Contributed by Lukas

Ed Skoudis, President of SANS.edu, joins us as host for another episode of Wait Just an Infosec, this time focusing on the infamous SANS Holiday Hack ...

In Hot Pursuit: Tracking Ransomware Actors

23 Aug 2023

Contributed by Lukas

Join Ryan Chapman, Mari DeGrazia, and their special guest, Will "BushidoToken" Thomas in an informal, freeform, and most of all, fun convers...

Your Cloud Security Journey: Key Trends, Capabilities, & Skills

17 Aug 2023

Contributed by Lukas

"Cloud security continues to evolve at a rapid pace, and you need to stay abreast of the latest trends and services to ensure that you have the m...

The Five Critical Controls for ICS

02 Aug 2023

Contributed by Lukas

Operational Technology (OT) security has never been more important. When beginning the work of securing your Industrial Control System (ICS) environme...

Should Countries Ban Ransom Payments?

26 Jul 2023

Contributed by Lukas

Ransomware actors continue to perpetrate their heinous crimes because, in aggregate, the attacks are lucrative. But what if ransomware became non-lucr...

Strategies of a World-Class SOC

19 Jul 2023

Contributed by Lukas

This week on Wait Just an Infosec, join host John Hubbard, who welcomes his guests from the ongoing special season of the Blueprint Podcast for an in-...

Skill vs. Background: The Great Cyber Hiring Debate

12 Jul 2023

Contributed by Lukas

In this episode of Wait Just an Infosec hosted by SANS editor Thomas Wolfe, SANS contributors Stacy Dunn and Rich Greene discuss their personal journe...

Top 5 Most Common Security Culture Myths and Mistakes with Lance Spitzner and Dr. Jessica Barker

28 Jun 2023

Contributed by Lukas

This week on Wait Just an Infosec, Lance Spitzner, Director of SANS Security Awareness, joins us as host to talk about an area of cybersecurity that o...

Protecting the Cloud from Ransomware with Ryan Chapman and Megan Roddie

21 Jun 2023

Contributed by Lukas

Ransomware continues to pose a serious threat to organizations, and the threat is only growing as ransomware attacks increase in sophistication and nu...

The Dark Knight of OSINT, Matt Edmondson

14 Jun 2023

Contributed by Lukas

The term “Dark Knight” has been used to describe people with a willingness to operate in gray areas and a commitment to combating injustice throug...

Unleashing AI on Red Team Tactics and Malware Development

07 Jun 2023

Contributed by Lukas

What is the future of AI use in cyber? How can red teams and blue teams use it in their own operations? Let’s find out together!This week on Wait Ju...

What the heck is going on in Cybersecurity Higher Ed?

31 May 2023

Contributed by Lukas

This episode of Wait Just an Infosec focuses on going behind the firewall and inside higher education for cybersecurity, examining the trends that are...