Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
|
Jun 27, 2025 |
Redefining Security Operations: Lessons in AI Integration with James Spiteri
|
Jun 12, 2025 |
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
|
Apr 09, 2025 |
SOC Dashboards Done Right with Ryan Thompson
|
Feb 18, 2025 |
Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard
|
Jan 01, 2025 |
How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud
|
Dec 02, 2024 |
From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin
|
Oct 09, 2024 |
How GenAI is Changing Your SOC for the Better with Seth Misenar
|
Oct 09, 2024 |
Bonus Episode: What does it take to author a cybersecurity book?
|
Aug 03, 2023 |
Strategy 11: Turn up the Volume by Expanding SOC Functionality
|
Jul 18, 2023 |
Strategy 10: Measure Performance to Improve Performance
|
Jul 10, 2023 |
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
|
Jul 05, 2023 |
Strategy 8: Leverage Tools and Support Analyst Workflow
|
Jun 26, 2023 |
Blueprint Live at the SANS Blue Team Summit 2023
|
Jun 22, 2023 |
Strategy 7: Select and Collect the Right Data
|
Jun 19, 2023 |
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
|
Jun 12, 2023 |
Strategy 5: Prioritize Incident Response
|
Jun 05, 2023 |
Strategy 4: Hire AND Grow Quality Staff
|
May 29, 2023 |
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
|
May 22, 2023 |
Strategy 2: Give the SOC the Authority to Do Its Job
|
May 15, 2023 |
Strategy 1: Know What You Are Protecting and Why
|
May 08, 2023 |
11 Strategies of a World-Class Security Operations Center: Fundamentals
|
May 08, 2023 |
Get Ready, A Very Special Season 4 Is On the Way!
|
May 01, 2023 |
Brandon Evans: Cloud Security - Threats and Opportunities
|
Sep 13, 2022 |
Joe Lykowski: Building a Transparent, Data-Driven SOC
|
Sep 06, 2022 |
Rob Lee: Training and Reskilling in Cyber Security
|
Aug 30, 2022 |
Jaron Bradley: Securing Enterprise macOS
|
Aug 23, 2022 |
Alexia Crumpton: MITRE ATT&CK for Defenders
|
Aug 16, 2022 |
Cat Self: macOS and Linux Security
|
Aug 09, 2022 |
Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging
|
Aug 02, 2022 |
Tony Turner: Securing the Cyber Supply Chain
|
Jul 26, 2022 |
Mark Orlando: Building a Stronger Blue Team
|
Jul 19, 2022 |
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
|
Jul 14, 2022 |
David Hoelzer: Threat Detection with Machine Learning and AI
|
Jul 12, 2022 |
James Rowley: Creating and Running an Insider Threat Program
|
Jul 12, 2022 |
Dean Parsons: Cyber Security for OT and ICS
|
Jul 12, 2022 |
John Hubbard: Your Top Cyber Defense Questions Answered from Seasons 1 + 2
|
Jul 01, 2022 |
John Hubbard: Key lessons and takeaways from Blueprint Season 2 + A Special Announcement!
|
Jun 08, 2021 |
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
|
Jun 01, 2021 |
AJ Yawn: Cloud, Compliance and Automating Security
|
May 25, 2021 |
Jamie Williams: Adversary Emulation
|
May 18, 2021 |
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
|
May 11, 2021 |
Chris Baker: Get A Handle On Your Vulnerabilities
|
May 04, 2021 |
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
|
Apr 27, 2021 |
Anton Chuvakin: The Current State and Future of Security Operations
|
Apr 20, 2021 |
Rob van Os: Maturing your Cyber Defense
|
Apr 13, 2021 |
AppSec, DevOps and DevSecOps
|
Apr 06, 2021 |
Playbook for Security Onion
|
Mar 30, 2021 |
The Blue Teamer's Blueprint for Malware Triage
|
Mar 30, 2021 |
SOC Metrics: Measuring Success and Preventing Burnout
|
Mar 30, 2021 |
A Machine Learning Primer for the Blue Team
|
Aug 11, 2020 |
Empowering Security Researchers Around the World!
|
Aug 04, 2020 |
Locking Down and Monitoring Cloud Infrastructure
|
Jul 28, 2020 |
Passwordless - Can it Be Done?
|
Jul 21, 2020 |
Training Yourself in a Quarantined World
|
Jul 14, 2020 |
Understanding and Applying Threat Intelligence
|
Jul 07, 2020 |
Privacy Laws: The Future Driver of Cyber Security
|
Jun 30, 2020 |
Creativity and Choices: Talking About Thinking
|
Jun 23, 2020 |
The Art of Blue Teaming
|
Jun 16, 2020 |
Shock to the System: Re-Evaluating Your Security Operations
|
Jun 16, 2020 |
Introducing Blueprint
|
Jun 09, 2020 |