Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast hosted by John Hubbard and brought to you by the SANS Institute. BLUEPRINT - your one-stop shop for taking your defense skills to the next level!
Episode | Date |
---|---|
Bonus Episode: What does it take to author a cybersecurity book?
|
Aug 03, 2023 |
Strategy 11: Turn up the Volume by Expanding SOC Functionality
|
Jul 18, 2023 |
Strategy 10: Measure Performance to Improve Performance
|
Jul 10, 2023 |
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
|
Jul 05, 2023 |
Strategy 8: Leverage Tools and Support Analyst Workflow
|
Jun 26, 2023 |
Blueprint Live at the SANS Blue Team Summit 2023
|
Jun 22, 2023 |
Strategy 7: Select and Collect the Right Data
|
Jun 19, 2023 |
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
|
Jun 12, 2023 |
Strategy 5: Prioritize Incident Response
|
Jun 05, 2023 |
Strategy 4: Hire AND Grow Quality Staff
|
May 29, 2023 |
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
|
May 22, 2023 |
Strategy 2: Give the SOC the Authority to Do Its Job
|
May 15, 2023 |
Strategy 1: Know What You Are Protecting and Why
|
May 08, 2023 |
11 Strategies of a World-Class Security Operations Center: Fundamentals
|
May 08, 2023 |
Get Ready, A Very Special Season 4 Is On the Way!
|
May 01, 2023 |
Brandon Evans: Cloud Security - Threats and Opportunities
|
Sep 13, 2022 |
Joe Lykowski: Building a Transparent, Data-Driven SOC
|
Sep 06, 2022 |
Rob Lee: Training and Reskilling in Cyber Security
|
Aug 30, 2022 |
Jaron Bradley: Securing Enterprise macOS
|
Aug 23, 2022 |
Alexia Crumpton: MITRE ATT&CK for Defenders
|
Aug 16, 2022 |
Cat Self: macOS and Linux Security
|
Aug 09, 2022 |
Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging
|
Aug 02, 2022 |
Tony Turner: Securing the Cyber Supply Chain
|
Jul 26, 2022 |
Mark Orlando: Building a Stronger Blue Team
|
Jul 19, 2022 |
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
|
Jul 14, 2022 |
David Hoelzer: Threat Detection with Machine Learning and AI
|
Jul 12, 2022 |
James Rowley: Creating and Running an Insider Threat Program
|
Jul 12, 2022 |
Dean Parsons: Cyber Security for OT and ICS
|
Jul 12, 2022 |
John Hubbard: Your Top Cyber Defense Questions Answered from Seasons 1 + 2
|
Jul 01, 2022 |
John Hubbard: Key lessons and takeaways from Blueprint Season 2 + A Special Announcement!
|
Jun 08, 2021 |
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
|
Jun 01, 2021 |
AJ Yawn: Cloud, Compliance and Automating Security
|
May 25, 2021 |
Jamie Williams: Adversary Emulation
|
May 18, 2021 |
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
|
May 11, 2021 |
Chris Baker: Get A Handle On Your Vulnerabilities
|
May 04, 2021 |
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
|
Apr 27, 2021 |
Anton Chuvakin: The Current State and Future of Security Operations
|
Apr 20, 2021 |
Rob van Os: Maturing your Cyber Defense
|
Apr 13, 2021 |
AppSec, DevOps and DevSecOps
|
Apr 06, 2021 |
Playbook for Security Onion
|
Mar 30, 2021 |
The Blue Teamer's Blueprint for Malware Triage
|
Mar 30, 2021 |
SOC Metrics: Measuring Success and Preventing Burnout
|
Mar 30, 2021 |
A Machine Learning Primer for the Blue Team
|
Aug 11, 2020 |
Empowering Security Researchers Around the World!
|
Aug 04, 2020 |
Locking Down and Monitoring Cloud Infrastructure
|
Jul 28, 2020 |
Passwordless - Can it Be Done?
|
Jul 21, 2020 |
Training Yourself in a Quarantined World
|
Jul 14, 2020 |
Understanding and Applying Threat Intelligence
|
Jul 07, 2020 |
Privacy Laws: The Future Driver of Cyber Security
|
Jun 30, 2020 |
Creativity and Choices: Talking About Thinking
|
Jun 23, 2020 |
The Art of Blue Teaming
|
Jun 16, 2020 |
Shock to the System: Re-Evaluating Your Security Operations
|
Jun 16, 2020 |
Introducing Blueprint
|
Jun 09, 2020 |