Listen to a podcast, please open Podcast Republic app. Available on Google Play Store.
Episode | Date |
---|---|
Anton Chuvakin: The Current State and Future of Security Operations
2827
In today’s episode, John is joined by Anton Chuvakin to discuss current and future security operations technology, which tools are the most important and which are becoming less important over time, the rules of automation in the SOC and how Anton would setup a modern Security Operations Center for a Cloud native organization. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and ""PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance"" (book website) and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and other books. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blog "Security Warrior" was one of the most popular in the industry. In addition, Anton teaches classes and presents at many security conferences across the world; he addressed audiences in United States, UK, Australia, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on advisory boards of several security start-ups.
|
Apr 20, 2021 |
Rob van Os: Maturing your Cyber Defense
2938
Are you a manager looking to build or improve your SOC? Are you trying to understand how to measure your SOCs maturity or use cases or your threat hunting efforts? If so, today’s episode with Rob van Os is for you. In this episode, we discuss the SOC CMM for SOC maturity measurement, the magma use case framework for building and tracking SOC use cases, and the Tahiti threat hunting methodology for showing ROI on threat hunting. |
Apr 13, 2021 |
AppSec, DevOps and DevSecOps
2629
What is AppSec, DevOps and DevSecOps? In this episode we discuss why defenders should know more about these terms and what the consequences are of ignoring these new and critical fields. Advisor: Nord VPN, Cloud Defense, NeuraLegion, ICTC PAC, WoSEC Founder: We Hack Purple, WoSEC International (Women of Security), OWASP DevSlop, #CyberMentoringMonday
|
Apr 06, 2021 |
Playbook for Security Onion
1972
Driving consistency and maintaining a high standard for alert response is a problem all SOCs must face, but how? In this episode, Josh Brower describes his efforts to combine automated detection signature deployment and use case database management into a single, easy to use app for Security Onion. Whether you use Security Onion or not, this episode dives into the design principles and workflow Josh used when designing the new open-source Playbook app and there’s something to learn from it for everyone on the Blue Team. |
Mar 30, 2021 |
The Blue Teamer's Blueprint for Malware Triage
3996
Even if you're not a malware analyst, any blue teamer should be able to do some initial basic malware sample triage. The good news is that this is quite easy to do using freely available tools once you know what is available. Join John in this conversation with Ryan Chapman as they discuss how to reverse engineer malware and why you might want to do so. |
Mar 30, 2021 |
SOC Metrics: Measuring Success and Preventing Burnout
2954
Looking for a new way to approach the difficult problem of measuring and improving your SOC? Check out this episode to hear how to use methods pioneered in the manufacturing and reliability industry to help wrap your head around, and solve this complex issue. You don’t want to miss this episode with Jon Hencinski, Director of Operations at Expel who covers all of this and more. |
Mar 30, 2021 |
A Machine Learning Primer for the Blue Team
2411
Austin Taylor discusses the promise and reality of cyber security-centric data science, and how you can use machine learning for solving practical security problems. |
Aug 11, 2020 |
Empowering Security Researchers Around the World!
2438
Roberto Rodriguez explains the awesome projects and initiatives he is working on to help blue teams perform advanced data collection, analysis, and threat hunting. |
Aug 04, 2020 |
Locking Down and Monitoring Cloud Infrastructure
2478
Cloud expert Kyle Dickinson discusses common cloud infrastructure attacks, and how you can detect and prevent them before they happen to your organization. |
Jul 28, 2020 |
Passwordless - Can it Be Done?
2441
Mark and Libby share the new technologies in use at Microsoft to dramatically decrease the need for the use of passwords in the enterprise. |
Jul 21, 2020 |
Training Yourself in a Quarantined World
2067
Dave and Ryan speak with John about resources for training yourself, and the challenges of setting up a large-scale cyber lab to simulate an advanced attack for their Splunk Boss of the SOC competition. |
Jul 14, 2020 |
Understanding and Applying Threat Intelligence
2377
Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it. |
Jul 07, 2020 |
Privacy Laws: The Future Driver of Cyber Security
2367
Mary Chaney shares what types of laws we should be concerned about. She discusses her thoughts on privacy laws and how that will drive cyber security, and what she’s doing to get more diverse representation in the industry at all levels. |
Jun 30, 2020 |
Creativity and Choices: Talking About Thinking
2558
Chris Sanders and Stef Rand discuss qualitative research they conducted on how to use divergent or convergent thinking for improving the quality of your analysis. |
Jun 23, 2020 |
The Art of Blue Teaming
1505
Hear host John Hubbard share info on his background, his inspiration and goals for this podcast and his insights on ‘The Art of Blue Teaming”. |
Jun 16, 2020 |
Shock to the System: Re-Evaluating Your Security Operations
1975
In our very first guest interview with Mark Orlando, John asks Mark questions to help us re-evaluate our security operations. |
Jun 16, 2020 |
Introducing Blueprint
123
Blueprint brings you the latest in cyber defense and security operations from top blue team leaders. Blueprint is brought to you by the SANS Institute and is hosted by SANS Certified Instructor John Hubbard. |
Jun 09, 2020 |