Phillip Wylie Show

Phillip Wylie

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this! read less
TechnologyTechnology

Episodes

Rob Allen: Defending Against Modern Threats with ThreatLocker
1w ago
Rob Allen: Defending Against Modern Threats with ThreatLocker
About the Guest: Rob Allen is a seasoned cybersecurity expert currently working as the Chief Product Officer at ThreatLocker. With over 25 years of experience in the IT industry, Rob has a rich background in managing IT environments, having spent nearly two decades at an MSP (Managed Service Provider) in Ireland. He transitioned from cleaning up ransomware attacks to helping organizations actively prevent them through Threat Locker's innovative cybersecurity solutions. Rob is known for his in-depth understanding of evolving cyber threats and promoting effective preventive measures against them. Episode Summary: In this engaging episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity veteran Rob Allen from Threat Locker. Together, they delve into the intricacies of modern cybersecurity threats, focusing on Threat Locker's innovative approaches to tackling ransomware and other malicious attacks. Listeners get a unique insight into the Threat Locker software, known for its preventive rather than reactive approach to cybersecurity, which includes features like default deny policies, ring fencing, and network control. Rob Allen unveils how the default deny approach helps mitigate cyber threats, including ransomware and living-off-the-land binaries, by blocking unauthorized actions before they happen. He emphasizes the need for robust security measures to limit what applications and scripts like PowerShell can do, thus preventing these tools from being weaponized by cybercriminals. Besides discussing practical security steps, Rob highlights how Threat Locker addresses the ever-evolving threat landscape using its innovative network control and threat detection capabilities. This conversation is packed with insights into how organizations can safeguard their IT environments in an era of increasingly complex cyber threats. Key Takeaways: * Default Deny Approach: Rob highlights the efficiency of Threat Locker's default deny policy, preventing unauthorized programs from running by approving only necessary applications. * Living Off the Land Prevention: The discussion covers methods to control and restrict the use of common Windows utilities like PowerShell, preventing them from serving malicious purposes. * Network Control: Insights into handling remote encryption threats through a unique approach to network traffic control, ensuring only trusted devices can connect. * The Role of AI: A glimpse into how AI can be both a tool for cybersecurity advancements and a potential threat when used by bad actors for phishing and malware development. * Zero Trust World Conference: Rob invites listeners to the Zero Trust World event focusing on hands-on cybersecurity training and knowledge exchange. Notable Quotes: * "100% of successful cyber attacks are not detected in time or at all." * "Prevent ransomware, lock it by default." * "AI is just as likely to be used against you as it is to protect you." * "The fact of the matter is, if nobody ever paid, there would be no such thing as ransomware." * "You cannot trust a ransomware gang." Resources: * Threat Locker Website: https://www.threatlocker.com * ThreatLocker LinkedIn: https://www.linkedin.com/company/threatlockerinc/ * Zero Trust World Event: Explore more at ZTW.com * Zero Trust World $200 off discount code: ZTWPW25 * ThreatLocker YouTube: https://www.youtube.com/@ThreatLocker * Rob's LinkedIn: https://www.linkedin.com/in/threatlockerrob/ Chapters 00:00 Introduction to ThreatLocker and Rob Allen 03:30 Rob Allen's Hacker Origin Story 06:23 Understanding ThreatLocker’s Approach to Cybersecurity 12:29 Living Off the Land: A Cybersecurity Challenge 16:39 Macro Vulnerabilities in Office Applications 19:20 Ransomware Prevention Strategies 23:40 The Importance of Network Control 31:55 AI in Cybersecurity: A Double-Edged Sword 37:37 Zero Trust World Conference Overview 39:56 Closing Thoughts and Resources 42:02 Zero Trust World discount code
Sean Metcalf: Active Directory Security
Nov 19 2024
Sean Metcalf: Active Directory Security
Summary   In this episode of the Phillip Wylie Show, Sean Metcalf, an expert in Active Directory security, discusses his journey into cybersecurity, the evolution of Active Directory and Azure AD, and the common mistakes organizations make in cloud security. He emphasizes the importance of security assessments over penetration testing and shares insights into Trimarc's unique approach to security assessments. Sean also highlights the significance of scripting in security roles and discusses the future of Active Directory in hybrid environments. The episode concludes with information about Trimarc's new product, Trimarc Vision, aimed at enhancing Active Directory security.   Takeaways   Sean Metcalf has assessed environments with up to 960,000 users.Active Directory security is often overlooked in organizations.Many organizations are making the same security mistakes in the cloud as they did on-premises.Security assessments are crucial for identifying potential vulnerabilities.Trimarc uses proprietary tools for in-depth security assessments.Scripting knowledge, especially in PowerShell, is beneficial for security professionals.Active Directory is not going away anytime soon due to legacy applications.Organizations should conduct security assessments every couple of years.Trimarc's assessments provide actionable insights for improving security.The new Trimarc Vision product aims to enhance Active Directory security monitoring.   Sound Bites   "It's been quite a year.""I saw something change in the URL.""We're the identity experts."   Chapters   00:00 Introduction to Active Directory Security 03:33 Sean Metcalf's Hacker Origin Story 06:20 The Evolution of Active Directory and Azure AD 09:31 The Importance of Specialization in Cybersecurity 12:30 Active Directory Security Challenges 15:39 The Role of Security Assessments 18:26 Comparing Trimarc and Bloodhound 20:56 Understanding Active Directory Security Assessments 22:35 Getting Started in Active Directory Security 25:30 The Importance of Scripting in Security 34:43 The Hybrid Environment: On-Prem vs Cloud 37:23 Trimarc's Unique Services and Assessments 40:17 Frequency of Active Directory Assessments 42:21 Introducing Trimarc Vision   Resources https://www.linkedin.com/in/seanmmetcalf/ https://x.com/PyroTek3 https://www.linkedin.com/company/trimarcsecurity/ https://x.com/TrimarcSecurity https://www.trimarcsecurity.com/ https://adsecurity.org/
Mishaal Khan: The Evolution of OSINT in Cybersecurity
Nov 12 2024
Mishaal Khan: The Evolution of OSINT in Cybersecurity
Summary    In this episode of the Phillip Wylie Show, Mishaal Khan shares his journey from a curious child assembling computers to becoming an expert in OSINT and pen testing. He discusses the importance of OSINT in various fields, the transition to consulting and virtual CISO roles, and offers valuable advice for aspiring CISOs. Mishaal also highlights the impact of AI on cybersecurity and emphasizes the importance of passion over monetary gain in one's career.    Takeaways    Mishaal's journey began with a curiosity about computers and programming.  OSINT can be applied in various fields beyond cybersecurity.  Practical experience is crucial for learning OSINT techniques.  Social engineering is a key component of successful pen testing.  Free tools can be just as effective as paid ones in OSINT.  Transitioning to a consulting role requires a blend of technical and managerial skills.  Understanding risk is essential for aspiring CISOs.  Training should focus on practical applications and real-world scenarios.  AI can enhance productivity but is not a replacement for human skills.  Pursuing passion in your career leads to greater satisfaction and success.    Sound Bites    "Do OSINT on yourself first."  "I can do it in an hour if you allow me."  "AI is not going to take over the world."      Chapters    00:00 Introduction to Mishaal Khan  04:43 Mishaal's Hacker Origin Story  06:34 Getting Started in OSINT  11:33 The Role of OSINT in Pen Testing  18:49 Transitioning to Consulting and Virtual CISO  26:43 Advice for Aspiring CISOs  33:00 Training and Educational Initiatives  36:02 The Impact of AI on Cybersecurity  40:32 Final Thoughts and Advice    Resources  https://www.mishaalkhan.com  https://www.linkedin.com/in/mish-aal/  https://x.com/mish3alkhan
Wirefall: An OG Hacker's Journey
Nov 5 2024
Wirefall: An OG Hacker's Journey
Summary  In this episode, Phillip Wylie interviews Wirefall, a veteran in the pen testing industry, discussing his journey from a curious child to a seasoned professional. They explore the evolution of pen testing tools, the impact of compliance on testing practices, and the importance of community engagement in cybersecurity. Wirefall shares insights on starting a career in pen testing, the significance of the Dallas Hackers Association, and how improv has transformed his approach to public speaking and adaptability in the field. The conversation emphasizes the need for trust, communication, and a supportive community in the cybersecurity landscape.   Takeaways  We are all born hackers, driven by curiosity.The evolution of tools has made pen testing both easier and more complex.Compliance often leads to unrealistic pen testing scopes.Trust is essential when engaging penetration testers.  Networking is crucial for career advancement in cybersecurity.The Dallas Hackers Association fosters community and learning.Improv can enhance adaptability and public speaking skills.Community engagement is vital for personal and professional growth.Ransomware has shifted the focus back to full-scope testing. Be excellent to each other to maintain a positive community.   Sound Bites  "We are all born hackers." "DHA is a cyber circus.""It's a journey."   Chapters 00:00 Introduction to Wirefall and Pen Testing Journey 02:10 The Hacker Origin Story 08:34 First Paid Pen Testing Job 11:05 Evolution of Pen Testing Tools 15:31 Compliance and Its Impact on Pen Testing 20:44 Advice for Engaging Pen Testers 25:02 Starting a Career in Pen Testing 27:43 The Dallas Hackers Association 41:30 The Power of Improv in Hacking 52:37 Community and Conduct in Cybersecurity Resources
Alyse Zavala: Rockstar Hacker
Oct 29 2024
Alyse Zavala: Rockstar Hacker
Summary   In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Alyse Zavala, a cybersecurity professional and rock band vocalist. They discuss the importance of having hobbies outside of work, Alyse's journey from IT to offensive security, and her experiences in the music industry. Alyse shares valuable advice for aspiring penetration testers, insights into exploit development, and the challenges of balancing her dual careers. The conversation also touches on work-life balance, burnout prevention, and upcoming projects in both cybersecurity and music.   Takeaways   It's important to have interests outside of cybersecurity. Alyse's journey began in IT and evolved into offensive security.    Hands-on experience is crucial for aspiring penetration testers.Certifications like OSCP are more valuable than a degree.Alyse emphasizes the importance of scenario-based interview questions.She started a rock band to explore her passion for music.The band recorded with notable producers and gained significant views on their music video.Meditation has helped Alyse manage stress and improve focus.Balancing work and music is challenging but rewarding.Alyse is excited about upcoming projects in both cybersecurity and music.   Sound Bites    "It's important to disconnect for a bit." "I started specializing in malware extraction." "I convinced them to let us start pen testing."   Chapters   00:00 Introduction and Connection 06:03 Alyse's Hacker Origin Story 12:54 Career Development and Opportunities 21:00 Advice for Aspiring Pen Testers 30:00 Balancing Music and Cybersecurity Career 40:24 Work-Life Balance and Burnout Management 48:14 Closing Thoughts and Future Plans   Resources https://x.com/Bellebytes https://lylvc.com/ https://linktr.ee/lylvc
Marcus Carey: The Legacy of Tribe of Hackers
Oct 22 2024
Marcus Carey: The Legacy of Tribe of Hackers
Summary In this episode, Phillip Wylie interviews Marcus Carey, a prominent figure in the cybersecurity community. They discuss the importance of living in the moment, the power of positivity, and Marcus's journey from a young nerd to a successful hacker and entrepreneur. Marcus shares his experiences in the military and how they shaped his career in cybersecurity, emphasizing the significance of foundational skills and the role of automation and AI in the field. The conversation also touches on the Tribe of Hackers book series and the importance of mentorship and community in personal and professional growth. Takeaways Live in the moment and cherish experiences. Positivity can uplift others, even on bad days. Every experience has a purpose and can help others. Foundational skills are crucial for success in cybersecurity. Automation and scripting can enhance productivity. AI is a powerful tool for cybersecurity professionals. Mentorship and sharing knowledge are vital in the community. Pursue your passions to find your superpower. Everyone has a role in the cybersecurity community. Start where you are and pursue your goals relentlessly. Notable Quotes "You need to enjoy those times better." "Everything you learn is to help somebody else out." "Life is on purpose in everything that you experience." Chapters 00:00 Living in the Moment and Embracing Positivity 06:34 Hacker Origin Stories and the Value of Learning 11:09 The Power of Automation in Cybersecurity 19:22 Exploring the Potential of AI and Blockchain 23:19 Starting with the Basics and Finding Passion in Coding 27:39 The Importance of Troubleshooting in IT and Cybersecurity 34:21 The Future of AI in Cybersecurity 36:05 The Role of Humans in AI-Driven Cybersecurity 45:51 Empowering the Cybersecurity Community through Tribe of Hackers 54:04 Being a Blessing and Sharing Knowledge in Cybersecurity 01:00:35 Pursuing Your Passions and Finding Fulfillment in Cybersecurity Resources https://www.linkedin.com/in/marcuscarey/ https://x.com/marcusjcarey lWHcfYxqt8HRcXC1NwV6
Trey Bilbrey: From Marine to Offensive Security
Oct 15 2024
Trey Bilbrey: From Marine to Offensive Security
About The Guest: Trey Bilbrey is the Lead of SCYTHE Labs, specializing in Purple Team Exercises, Threat Emulation, Critical Infrastructure, and holistic cyber operations. Trey's 15+ years of industry experience has allowed him to become an excellent educator, defender of networks, and a cultivator of cybersecurity professionals. Prior to joining SCYTHE, Trey held positions at notable organizations such as Hack The Box (HTB Academy content Developer), The Army Corps of Engineers (ICS/SCADA Penetration Testing), and a veteran of the United States Marine Corps (Defensive and Offensive Cyber Operations). Summary: In this episode of the Phillip Wylie Show, Trey Bilbrey shares his unique journey into cybersecurity, highlighting the importance of foundational knowledge and diverse experiences. He discusses the transition from red teaming to purple teaming, emphasizing the benefits of collaboration and community in the field. Trey also offers valuable advice for newcomers, stressing the need to understand the ecosystem before diving into offensive security. The conversation concludes with a call to build connections within the cybersecurity community to enhance collective defense against threats. Key Takeaways: * **Start with a Strong IT Foundation**: Trey emphasizes the importance of gaining experience in IT roles, such as help desk or systems administration, to build a solid understanding before focusing on offensive security. * **Embrace Purple Teaming**: The integration of red and blue team methodologies can significantly enhance an organization's security posture through real-time collaboration and feedback. * **Community and Collaboration**: Building trust and sharing insights within and between organizations can raise security standards and prevent breach incidents through collective defense strategies. * **Navigating Career Waves**: Opportunities often arise unexpectedly; being open to change and ready to evolve is key to a successful career in cybersecurity. * **Value of Threat Informed Defense**: Understanding your infrastructure and potential threats is crucial for implementing effective security measures and focusing your resources where they matter most. Notable Quotes: 1. "It's okay to not know your path right now. Dive in, do something new\...it's going to make you better for it." 2. "If we could bring all of that stuff together, that's really what makes an awesome purple team engagement." 3. "Community—we're all in this together. These threats are working as teams, they're crews, they're all talking, they're all communicating. Why aren't we doing the same?" 4. "If you understand how the ecosystem works...it's going to make you so much better." 5. "We need to engage our local communities...we've got to talk. We got to work together." Resources: https://www.linkedin.com/in/georgebilbrey/ Chapters 00:00 Introduction and Hacker Origin Story 08:38 Exploring Different Areas of Cybersecurity 12:48 The Importance of Hands-On Experience 18:28 Transitioning to Purple Teaming 25:06 Planning and Executing Purple Team Operations 31:04 The Role of Cyber Threat Intelligence 37:41 Building Community and Collaboration
White Knight Labs: Part 2
Oct 10 2024
White Knight Labs: Part 2
About the Guests: Greg Hatcher and John Stigerwalt are co-founders of White Knight Labs, a boutique cybersecurity company specializing in offensive security services and advanced training programs. Greg's background includes a remarkable career as a Green Beret in the U.S. Army, transitioning into cybersecurity with a focus on penetration testing and red teaming. John's journey began with a passion for hacking at 17, which led to a diverse career across IT roles, eventually specializing in penetration testing and red teaming for global companies. Together, they offer unique services aimed at elevating cybersecurity standards through White Knight Labs. Episode Summary: Dive into an engaging conversation on The Phillip Wylie Show featuring Greg Hatcher and John Stigerwalt from White Knight Labs. In this episode, the duo returns to discuss their explosive growth in the cybersecurity space, emphasizing their dedication to providing top-tier penetration testing services and innovative training programs. Greg and John highlight their focus on delivering comprehensive security testing, not just ticking compliance boxes but aiming to identify potential threats that could cripple a business financially. As they delve into their services, Greg and John emphasize their approach to cybersecurity assessments, distinguishing themselves by employing senior engineers for direct, high-impact testing rather than a flat-rate service model. They discuss their various training programs, including offensive development and red teaming operations courses, all tailored to stay hyper-current and relevant in the fast-evolving cybersecurity landscape. The conversation also navigates through intriguing war stories from their physical penetration testing engagements, offering listeners a peek into the challenges and excitement of real-world security assessments. Key Takeaways: Comprehensive Cybersecurity Services: White Knight Labs focuses on delivering more than just compliance-driven testing, aiming for substantial security insights to protect businesses.Advanced Training Programs: The company offers courses on advanced red teaming, Azure penetration testing, and entry-level certifications, ensuring students gain hands-on, up-to-date skills in cybersecurity.Skillbridge Program: Engaging with transitioning military personnel, White Knight Labs offers internships and training, providing valuable career opportunities in cybersecurity.Utilizing AI in Cybersecurity: Greg and John discuss leveraging AI tools to streamline coding and development processes, increasing efficiency in their operations.Real-world Penetration Testing Stories: Sharing intriguing insights, the duo discusses the complexity and adventure involved in physical penetration testing operations. Key Takeaways: "Our engineers at WKL will get the domain admin typically in the first hour or two… We're going after the crown jewels." - Greg Hatcher"We’re not just giving TLS Cert issues. We’re top of the line, going for the RC, the big level bugs." - John Stigerwalt"We're participating in the Skillbridge program… It's our way of getting back to the community as well." - Greg Hatcher"If I could cut off the database… that business is gonna shut doors." - John Stigerwalt"The OSCP made my career, but it wasn't that relevant for what I was doing as a full-time penetration tester." - John Stigerwalt Chapters 00:00 Introduction to White Knight Labs 02:03 The Growth of White Knight Labs 05:20 SkillBridge Program and Community Support 06:37 Differentiating Factors in Pen Testing Services 11:26 Compliance vs. Security in Pen Testing 15:19 The Impact of Breaches on Security Budgets 16:28 Training Programs and Course Offerings 30:36 Leveraging AI in Offensive Security 34:37 War Stories from the Field 56:18 Upcoming Events and Closing Remarks 57:52 Phillip Wylie Show Outro Video.mp4 Resources: White Knight Labs Website: White Knight LabsGreg Hatcher's LinkedIn: Greg HatcherJohn Stigerwalt's LinkedIn: John StigerwaltWhite Knight Labs: **Navigating Advanced Red Team Operations (previous episode) **https://phillipwylieshow.com/episode/white-knight-security-navigating-advanced-red-team-operations
Ryan Feder: The Resilience Factor
Oct 8 2024
Ryan Feder: The Resilience Factor
Summary In this conversation, Ryan Feder and Phillip Wylie explore the themes of resilience, innovation, and personal growth. They discuss how challenges can be transformed into opportunities and the importance of maintaining a positive mindset in the face of adversity. The dialogue emphasizes the power of innovative thinking and the necessity of embracing change as a pathway to success. Takeaways Turning challenges into opportunities is key to success.Resilience allows us to navigate through tough times.Innovative thinking can lead to transformative solutions.Growth often comes from overcoming significant challenges.Embracing change is essential for personal development.A positive mindset can alter our perception of adversity.Learning from failures can pave the way for future success.Collaboration can enhance innovative ideas and solutions.Personal growth is a continuous journey, not a destination.Adapting to change can unlock new possibilities. Sound Bites "You took a bad situation and made it good.""The power of resilience is incredible.""Innovative thinking can change everything." Chapters 00:00 Meeting at Defcon 06:30 Finding Passion in the Cybersecurity Industry 12:50 Transitioning to Offensive Security 15:56 The Importance of Networking 18:46 The Supportive Cybersecurity Community 19:30 The Importance of Physical Security 24:34 Admitting Ignorance and Seeking Help 34:54 Networking and Continuous Learning 40:00 Understanding Technology for Effective Pen Testing Resources https://www.linkedin.com/in/ryan-feder-sscp/ https://x.com/Ano1X8
Snehal Antani: A New Cybersecurity Paradigm
Oct 1 2024
Snehal Antani: A New Cybersecurity Paradigm
Takeaways   ·      Snehal Antani emphasizes the importance of product obsession in leadership. ·      The transition from a bull market to a bear market requires quick strategic shifts. ·      A strong technical foundation is crucial for success in offensive security roles. ·      Certifications signal a commitment to self-improvement but are not the sole indicator of skill. ·      Bootcamps can provide a pathway into cybersecurity but require ongoing learning to retain skills. ·      Autonomous pen testing offers a consistent and comprehensive approach to security assessments. ·      The integration of offensive and defensive security communities is essential for overall effectiveness. ·      Understanding the threat actor perspective is vital for effective cybersecurity strategies. ·      Horizon 3 aims to leverage data advantage to enhance its product offerings. ·      The future of cybersecurity will involve algorithms fighting algorithms with human oversight. Sound Bites   ·      "Pen testing can be automated that much." ·      "I am obsessed with the product." ·      "I took a 99% pay cut to serve."   Chapters   00:00 Introduction to Horizon 3 and Snehal Antani 03:26 Leadership and Company Culture at Horizon 3 06:30 Snehal's Hacker Origin Story 10:37 Transition from Corporate America to JSOC 13:45 Building Horizon 3's Culture and Team 16:28 The Unique Approach of Horizon 3 20:24 The Evolution of Pen Testing 24:34 The Role of Humans in Pen Testing 28:41 The Shift in Cybersecurity Mindset 32:31 Certifications and Bootcamps in Cybersecurity 36:26 The Future of Cybersecurity and Co-Pilots 40:21 The Importance of Data in Cybersecurity 44:22 The Impact of Autonomous Pen Testing 48:22 Conclusion and Future Outlook 58:33 Phillip Wylie Show Outro Video.mp4   Resources https://www.linkedin.com/in/snehalantani/ https://x.com/snehalantani https://www.horizon3.ai/ https://www.linkedin.com/company/horizon3ai/
Christophe Foulon: Certifications, Are They Still Necessary?
Sep 24 2024
Christophe Foulon: Certifications, Are They Still Necessary?
Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Christophe Foulon, a cybersecurity expert and podcaster, about his journey into the cybersecurity field, the importance of self-discovery for aspiring professionals, and the evolving landscape of hiring practices in the industry. They discuss the significance of certifications, the need for internal talent development, and the value of community involvement in cybersecurity education. Christophe shares practical advice for job seekers, emphasizing the importance of networking and curiosity in building a successful career in cybersecurity. Takeaways Christophe's journey into cybersecurity began at a young age. Self-discovery is crucial for those entering the cybersecurity field. Certifications are often necessary, especially for government roles. Hiring practices are evolving, with less emphasis on traditional degrees. Internal training and development can help fill cybersecurity roles. Apprenticeships can provide valuable hands-on experience. Community involvement is essential for building a skilled workforce. Networking is key to finding job opportunities in cybersecurity. Curiosity and continuous learning are vital for success in cybersecurity. Understanding the job market and roles can prevent burnout. Sound Bites "I was just hooked." "It all starts on the foundation of self-discovery." "You need to be eternally curious." Chapters 00:00 Introduction and Background 06:46 Recommendations for Breaking Into Cybersecurity 10:54 The Role of Certifications in Cybersecurity 16:08 Creating Career Paths and Apprenticeships in Cybersecurity 25:02 The Value of Networking and Building Relationships in Job Hunting 29:40 Staying Informed: Researching Industry Trends in Cybersecurity 32:14 Closing Remarks 32:39 Phillip Wylie Show Outro Video.mp4 Resources https://www.linkedin.com/in/christophefoulon/ https://x.com/chris_foulon
Len Noe: World's First Augmented Hacker
Sep 17 2024
Len Noe: World's First Augmented Hacker
Summary  In this episode, Len Noe, the world's first augmented ethical hacker, shares his journey into cybersecurity and his experience with body modification. He discusses his hacker origin story, his professional career, and his current work as an evangelist for CyberArk. Len also talks about his book, 'Hacked Human: My Life and Lessons,' which explores the world of augmented humans and the ethical implications of integrating technology into the human body.   Takeaways  Len Noe shares his hacker origin story and how he got into cybersecurity.He discusses his professional career and how he transitioned from being a black hat to an ethical hacker.Len talks about his current work as an evangelist for CyberArk and his role in educating people about cybersecurity.He explores the world of augmented humans and the ethical implications of integrating technology into the human body.   Sound Bites  "I came to the ways of cybersecurity via the Black Hat route.""I have 10 different microchips that are planted inside my body.""I can attack physical access control systems directly through physical contact."   Chapters  00:00 Introduction and Guest Introduction 03:36 Unconventional Paths into Cybersecurity 10:28 Implantable Technology and the Future of Augmented Humans 18:41 Redefining Medical Ethics: Risks and Benefits of Body Modification 25:44 Hacked Human: Insights from the World's First Augmented Ethical Hacker 37:26 Phillip Wylie Show Outro Video.mp4   Resources https://x.com/hacker_213 https://www.linkedin.com/in/len-noe/ Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker https://www.wiley.com/en-mx/Human+Hacked%3A+My+Life+and+Lessons+as+the+World's+First+Augmented+Ethical+Hacker-p-9781394269167
HOU.SEC.CON.
Sep 10 2024
HOU.SEC.CON.
Summary   HOU.SEC.CON is a cybersecurity conference in Texas that aims to provide opportunities for students and professionals in the industry. The conference was started in 2010 by Michael Farnum and Sam Van Ryder, who wanted to create a community for cybersecurity professionals in Houston. They initially ran the conference under the auspices of the National Information Security Group, but eventually split off and ran it independently. The conference has grown over the years, attracting attendees and speakers from all over the United States and even internationally. They have had to move to larger venues to accommodate the increasing number of participants. HOU.SEC.CON has steadily grown from 120 attendees in its first year to almost 1400 attendees last year. The organizers initially planned to cap the conference at 300 or 500 attendees, but the demand kept increasing. The conference aims to grow the cybersecurity community in Houston and provide a more affordable and accessible option compared to larger conferences like RSA and Black Hat. HOU.SEC.CON has added two additional conferences, OT.SEC.CON and EXEC.SEC.CON, to cater to specific cybersecurity subfields. The organizers also host monthly user group meetings and provide networking opportunities for the community.   Takeaways   HOU.SEC.CON is a cybersecurity conference in Texas that provides opportunities for students and professionals in the industry. The conference was started in 2010 by Michael Farnum and Sam Van Ryder to create a community for cybersecurity professionals in Houston. They initially ran the conference under the auspices of the National Information Security Group before splitting off and running it independently. HOU.SEC.CON has grown over the years, attracting attendees and speakers from all over the United States and internationally. HOU.SEC.CON has experienced significant growth, from 120 attendees in its first year to almost 1400 attendees last year. The conference aims to provide an affordable and accessible option for the cybersecurity community in Houston. HOU.SEC.CON has added two additional conferences, OT.SEC.CON and EXEC.SEC.CON, to cater to specific cybersecurity subfields. The organizers also host monthly user group meetings and provide networking opportunities for the community.   Sound Bites   "HOU.SEC.CON is a cybersecurity conference in Texas" "The conference was started in 2010 by Michael Farnum and Sam Van Ryder" "They initially ran the conference under the auspices of the National Information Security Group" "We were close to 1400 last year." "Let's top out at 300. Let's top out at 500. Let's do whatever." "We would have to take up multiple floors if we were going to stay at the hotel."   Chapters   00:00 Introduction to HOU.SEC.CON and its mission 06:15 The origins of HOU.SEC.CON and its role in the Houston cybersecurity community 18:33 Differentiating HOU.SEC.CON from other conferences: Valuable content and community focus 24:15 The growth and recognition of HOU.SEC.CON 26:35 Expanding HOU.SEC.CON 30:51 A More Accessible Alternative 35:46 Building a Strong Cybersecurity Community     Resources http://houstonseccon.org/ https://www.linkedin.com/company/houseccon/ https://x.com/HouSecCon   https://www.linkedin.com/in/mfarnum/ https://x.com/m1a1vet   https://www.linkedin.com/in/svanryder/ https://x.com/SamVR
Be Fearless Online: In-Browser Email Security
Sep 6 2024
Be Fearless Online: In-Browser Email Security
About the Guest: Jeswin Mathai is the Chief Architect at SquareX. He leads the team responsible for designing and implementing the Infrastructure. Prior to joining SquareX, He was working as the chief architect at INE. He has published his work at DEFCON China, RootCon, Blackhat Arsenal, and Demo Labs (DEFCON). He has also been a co-trainer in-classroom training conducted at Black Hat Asia, HITB, RootCon, and OWASP NZ Day. He has a Bachelor's degree from IIIT Bhubaneswar. He was the team lead at InfoSec Society IIIT Bhubaneswar in association with CDAC and ISEA, which performed security auditing of government portals and conducted awareness workshops for government institutions. His area of interest includes Cloud Security, Container Security, and Web Application Security. Episode Summary: In this captivating episode of 'The Philip Wylie Show', host Philip Wylie is joined once again by offensive security aficionado Jeswin Mathai. This talk orbits around the expansive realm of professional hacking, highlighting the persistent curiosity and zealous passion these experts have for overcoming challenges in their line of work. With Jeswin on board, listeners can anticipate an in-depth exploration of Squarex's new and riveting features aimed at staving off online vulnerabilities. The episode delves into the intricate world of in-browser malicious file detection, a pressing issue in today's digital-heavy climate. Jeswin Mathai meticulously walks listeners through the challenges surrounding the detection of malicious files, expanding upon why conventional antivirus solutions struggle and how attackers exploit naïveté during delivery. Furthermore, he presents a live demonstration of Squarex's monumental browser integration, showcasing its real-time detection capabilities and remediation options, elevating Gmail's native security measures to impressive new heights. Key Takeaways: Squarex is revolutionizing online security: The discussion reveals how the product can enhance Gmail security by detecting and alerting users to potential threats before they materialize. In-browser file analysis: Squarex performs comprehensive checks directly within your browser, maintaining user privacy while offering robust protection against malicious files. Malicious macros are a key threat vector: Jeswin explains how attackers utilize document macros, often undetected by traditional antivirus software, to compromise user systems. Real-time alerts and remediation: Squarex provides instantaneous analysis of file attachments, distinguishing malicious intent and providing safer alternatives for download. Enhanced user-friendly protection: The product is designed for ease of use, offering an intuitive safety net for both tech-savvy individuals and those less accustomed to cybersecurity measures. Notable Quotes: "The moment you open it, it's almost instantaneous. And not only is it telling you contains macros, tells you the details." "This is a macro free version created right there in your browser, in case if you're concerned that something can go wrong." "Email is like the primary source right now of delivery of malicious payload." "So we have received the mail. So now as you can notice, this is a macro enabled file, but Gmail didn't say anything." "It's a full blown file system packaged in just one single file, and how crazy it can be to detect malicious macros." Resources: Get your free Chrome plugin: ⁠⁠http://sqrx.io/pw_x⁠⁠ ⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠ ⁠⁠https://twitter.com/getsquarex⁠⁠ ⁠⁠https://www.instagram.com/getsquarex/
Joe Brinkley aka The Blind Hacker
Sep 3 2024
Joe Brinkley aka The Blind Hacker
Summary In this episode, Joe Brinkley, also known as the blind hacker, joins Phillip Wylie to discuss his hacker origin story and offer advice for breaking into offensive security and pen testing. They also explore the commoditization of pen testing, the evolution of the industry, and the challenges of testing complex environments. Joe shares his insights on the different generations of hackers and the role of automation and AI in pen testing. He also talks about his work with the Mentor Village and offers resources for those interested in starting their own cybersecurity brand or company. Takeaways Joe Brinkley, also known as the blind hacker, shares his hacker origin story and offers advice for breaking into offensive security and pen testing.The commoditization of pen testing has led to a shift in the industry, with companies seeking budget-friendly alternatives and rotating vendors frequently.Automation and AI play a significant role in pen testing, allowing for faster and more efficient testing, but human expertise is still crucial for in-depth analysis and finding vulnerabilities that automated tools may miss.The industry is currently in the sixth or seventh generation of hackers, with increased access to education and tools, but also more complex environments to test.Joe Brinkley is actively involved in the Mentor Village, offering mentoring, education, and resources to those interested in cybersecurity.He encourages individuals to build their own cybersecurity brand and consider starting their own cybersecurity company, emphasizing the importance of branding and networking in the industry. Sound Bites "I don't care who you go to, learn something.""Long-term security is the value we provide""People are looking for a budget-friendly alternative because compliance and insurance now require yearly security activities." Resources https://www.linkedin.com/in/brinkleyjoseph/ https://x.com/TheBlindHacker https://x.com/deadpixelsec https://deadpixelsec.com/ Chapters 00:00 Introduction and Background 06:24 Advice for Breaking into Offensive Security 10:39 The Commoditization of Pentesting 15:53 The Impact of Compliance and Cyber Insurance 22:03 Challenges Faced by Practitioners in Limited Time Windows 25:33 The Evolution of Hackers and Accessibility of Education and Tools 30:36 The Role of Automation, Orchestration, and AI in Modern Pentesting 36:23 Building Cybersecurity Brands and the Mentor Village 41:14 Conclusion 41:52 Phillip Wylie Show Outro Video.mp4
Live from BSides Twin Cities 2024
Aug 29 2024
Live from BSides Twin Cities 2024
Summary In this live episode of The Phillip Wylie Show, cybersecurity experts Ira Winkler and Ryan Cloutier discuss their hacker origin stories and the evolution of hacking over the years. They emphasize the importance of basic cyber hygiene and the need to systematize the fundamentals of cybersecurity. They also discuss the risks and benefits of AI, highlighting the potential for manipulation and the need for safe adoption. The conversation touches on the role of policies and procedures, the alignment of cybersecurity with business objectives, and the impact of technology on human experiences. Takeaways Basic cyber hygiene is essential in preventing hacking and improving cybersecurity.AI is ready for prime time, but organizations need to ensure safe adoption and consider the potential risks and impacts.Systematizing the fundamentals of cybersecurity and aligning it with business objectives is crucial for effective cybersecurity programs.Technology should be designed with people in mind, considering their experiences and needs.Understanding the risks and benefits of new technologies, such as AI, is important for making informed decisions and designing resilient systems. Quotes "All I did my whole career is primarily take advantage of bad awareness, bad administration, bad configurations.""We're gonna have an overabundance of tooling and an underabundance of looking at the business processes themselves.""Your users are a company resource that are gonna be fallible, just like any other resource you have." Resources https://www.linkedin.com/in/irawinkler/ https://www.linkedin.com/in/ryan-cloutier/ https://cruisecon.com/ Chapters 00:00 Introduction and Hacker Origin Stories 05:39 The Evolution of Hacking and Basic Cyber Hygiene 08:03 Threat Landscape and Shifting Attack Profiles 10:18 The Impact of Social Media and Bring Your Own Device 18:05 Systematizing the Basics and Enforcing Policies 23:35 Aligning Cybersecurity with the Business and Employee Experience 26:01 AI: Readiness and Safe Adoption 32:13 Understanding AI as Math and the Potential Risks 34:48 Personal Intimate Information and the Weaponization of AI
Dahvid Schloss: From JSOC to Offensive Security
Aug 27 2024
Dahvid Schloss: From JSOC to Offensive Security
Summary David Schloss shares his hacker origin story, starting with his military background and how he ended up in the field of cybersecurity. He talks about his time in the Joint Special Operations Command (JSOC) and the unique missions he was involved in. He also discusses his transition to the private sector and his current role as a Hive Leader at Covert Swarm. The skills he acquired in JSOC have been highly transferable and valuable in his offensive security career. In this conversation, Dahvid Schloss discusses his experience at Seer, a practice prison camp that taught him transferable skills like lock picking and prison escape. He also talks about the challenges of transitioning from using malware and exploits to using his brain in the civilian world. Dahvid emphasizes the importance of finding your passion within offensive security and recommends exploring different areas to figure out what you enjoy. He also highlights the significance of building a personal brand in the cybersecurity field and encourages professionals to be more public about their skills and expertise. Takeaways David Schloss has a military background and served in the Joint Special Operations Command (JSOC), where he was involved in unique and high-value missions. He transitioned to the private sector and currently works as a Hive Leader at Covert Swarm, focusing on continuous APT emulation. The skills he acquired in JSOC, such as threat emulation, malware development, and exploit development, have been highly transferable and valuable in his offensive security career. David emphasizes the importance of privacy and cybersecurity as basic human rights and aims to grow the field by helping individuals with no experience enter the industry and supporting specialization for those already in the field. Seer, a practice prison camp, taught Dahvid Schloss transferable skills like lock picking and prison escape, which he found helpful in the cybersecurity field. Transitioning from using malware and exploits to using his brain in the civilian world was challenging for Dahvid. Dahvid recommends exploring different areas within offensive security to find your passion and avoid pigeonholing yourself into a specific role. Building a personal brand is crucial in the cybersecurity field to showcase your skills and expertise. Dahvid encourages professionals to be more public about their personal brand and expertise to increase job opportunities and career growth. Quotes "I got through this course, I graduated, and I got to do the fun job of being a special operations communicator." "Seer was amazing. So Seer is like practice prison camp, right? Which sounds why would that be amazing to cyber? And the reason is, is because they teach you some transferable skills, like how to pick locks and how to escape from prisons." "Having access to really good malware, really good exploits was not at all. It sounds like it would be really helpful, but it was a hard transfer for me, especially because I'm so used to being able to go dot slash execute. And now I'm on a box and now I have to go, Oh, I have to use my brain." "Offensive security is massive. It's like, there is no way you can be a master of all. Like there is only one and that's John Hammond so far. That's all I've seen. He's, know, he's got, he's got the chops, but we can't all be him. Right. So, um, really like my biggest recommendation." Resources https://www.linkedin.com/in/dahvidschloss/ https://x.com/DahvidSchloss Chapters 00:00 Introduction and Background 02:36 Military to Cybersecurity Transition 08:41 Learning Cybersecurity Skills 17:34 JSOC and Fighting High-Value Targets 26:34 Transferable Skills and Challenges in Offensive Security 29:55 Exploring Different Areas in Offensive Security 39:04 The Importance of Building a Personal Brand 46:41 Opportunities for Growth in Smaller Cybersecurity Startups 49:49 Taking the Time to Find Your Path in Cybersecurity
Eric Teichmiller: Exploring Cybersecurity Careers
Aug 20 2024
Eric Teichmiller: Exploring Cybersecurity Careers
Summary In this episode of the Phillip Wylie Show, Phillip is joined by Eric Teichmiller, a technical account manager at Horizon 3. Eric shares his background in cybersecurity and his journey from IT to risk and compliance to offensive security. He explains his role as a technical account manager and how his defensive background helps him understand and support customers. Eric also discusses the benefits of certifications, offers advice for getting into cybersecurity, and shares his study tips and strategies for avoiding burnout. Takeaways Eric Teichmiller shares his background in cybersecurity and his journey from IT to risk and compliance to offensive security. As a technical account manager, Eric supports customers and acts as a subject matter expert for autonomous pen testing. Certifications can be beneficial in the cybersecurity field, but work experience and the ability to connect with interviewers are also important. Eric advises aspiring cybersecurity professionals to never stop learning, focus on building experience, and apply intentionally for positions. To avoid burnout while studying, eliminate distractions, find a learning method that works for you, and have hobbies outside of your day job. Eric's goal at Horizon3 is to explore positions that allow him to take a big picture approach and continue problem-solving. Sound Bites "I'm really enjoying cybersecurity as a whole." "I kind of have that customer perspective." "Everything that they were geeking out on not only works, but it works well." Chapters 00:00 Introduction and Background 03:29 The Role of a Technical Account Manager 06:36 Transitioning from Defensive to Offensive Security 08:41 The Fascination with Autonomous Pen Testing 12:14 The Value of Certifications and Continuous Learning 14:13 Advice for Job Seekers in Cybersecurity 15:55 Navigating Job Descriptions and Requirements 20:12 Avoiding Burnout in Cybersecurity 24:07 Goals and Future Plans at Horizon 3 25:59 Final Thoughts and Conclusion Resources https://www.linkedin.com/in/eric-teichmiller-82296295/ https://x.com/ericteichmiller
Jeff Man: From NSA to Pentesting
Aug 13 2024
Jeff Man: From NSA to Pentesting
About the Guest: Jeff Man is a seasoned professional in the cybersecurity industry, with a rich history in penetration testing and security. He began his career at the National Security Agency (NSA) and has since become renowned for his expertise and contributions to the field. Jeff is also a co-host on Paul Security Weekly and frequently shares his insights at notable security conferences. His vast experience and deep understanding of the industry's evolution make him a respected figure in cybersecurity. Episode Summary: In this captivating episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity veteran Jeff Man. Known for his storied career starting at the NSA, Jeff dives into his unique hacker origin story and the evolution of penetration testing. This episode is packed with insights, anecdotes, and practical advice for anyone interested in the cybersecurity landscape. Jeff Man shares his early experiences working at NSA, highlighting key moments such as his involvement in creating the first software-based cryptosystem. He delves into the early days of penetration testing, describing how methodologies and technologies have transformed over the years. Jeff also discusses the importance of understanding penetration testing's true objectives and offers guidance on how organizations can maximize the value of these tests. His reflections on the cybersecurity community, vendor relationships, and the need for precise terminology provide valuable perspectives for practitioners and enthusiasts alike. Key Takeaways: • Jeff's Striking Background: Learn about Jeff Man's remarkable career trajectory, from his start at the NSA to his present role as a cybersecurity expert and podcaster. • Evolution of Pen Testing: Understand the shifts in penetration testing methods, technologies, and industry perceptions over the past three decades. • Maximizing Pen Test Effectiveness: Discover practical advice on how organizations can make the most out of their penetration testing efforts by setting clear objectives and collaborating with trusted advisors. • Cybersecurity Insights: Jeff emphasizes the importance of understanding and correctly using industry terminology and the value of a comprehensive security program. • Community and Learning: Hear Jeff's thoughts on the cybersecurity community, including his participation in conferences and his ongoing mission to educate and mentor upcoming professionals. Notable Quotes: • "I've always tried to ascribe to that. You might lose something in the near term by saying, well, what we have really isn't the best thing for you right now." • "Pen testers are the unsung heroes of the industry, often with relatively boring stories, but they are crucial to the security landscape." • "Very rarely do I see a pen test report that's actually, we tried to break in, or we tried to gain access, or we tried to gain unannounced access." • "I've always been a consultant. I've always been sort of in this trusted advisor role." • "And I have clients that I've been working with now for 15, 20, 25 years. Not all the time, but when they need something, they're like, hey, let me give Jeff a call and see what he has to say." Resources: Jeff Man LinkedIn: https://www.linkedin.com/in/jeffreyeman/ Jeff Man X(formerly Twitter): https://x.com/MrJeffMan Jeff Man on Paul Security Weekly: https://www.scmagazine.com/security-weekly
Andrew Lemon: Engineering Your Own Opportunities
Aug 5 2024
Andrew Lemon: Engineering Your Own Opportunities
About the Guest:  Andrew Lemon is a seasoned offensive security professional and founder of Red Threat, a cybersecurity consulting firm focused on pentesting, red teaming, and ransomware readiness assessments. With a wealth of experience from working at Boeing, Dell, and other tech corporations, Andrew has become a respected figure in the cybersecurity community, known for his contributions to physical security, social engineering, and AI pentesting. Andrew is also an advocate for transparency and community support within the cybersecurity industry.  Episode Summary:  Welcome to another episode of the Phillip Wylie Show, where host Phillip Wylie dives into the fascinating journey of his friend and cybersecurity expert, Andrew Lemon. Andrew shares his unique hacker origin story, from tech-savvy childhood and learning from his Novell admin dad to becoming the founder of Red Threat. With an emphasis on practical, hands-on experience, Andrew discusses how he has approached building a successful career in offensive security and what it takes to start a thriving consulting business.  In this comprehensive conversation, Andrew explains the strategies and technologies he employs in his assessments, the importance of tailoring services to client maturity levels, and insights into some of his latest research, including traffic control system vulnerabilities and AI pentesting. Phillip and Andrew also explore the critical nature of crafting a personal brand and the value of community-driven networking in cybersecurity. These engaging insights make this a must-listen episode for anyone interested in the inner workings of professional hacking and security consulting.  Key Takeaways:  Starting a cybersecurity consulting business: Andrew highlights the importance of financial planning, brand recognition, and maintaining integrity in service offerings.  Ransomware readiness assessments: A key focus for Andrew’s company, Red Threat, is preparing organizations for ransomware attacks by simulating real-world scenarios and actor techniques.  Physical security and social engineering: Despite the transition to remote work, physical security assessments remain a crucial part of Andrew's toolkit, demonstrating easy-to-understand vulnerabilities.  AI pentesting: Andrew talks about the emerging field of AI pentesting, shedding light on the unique challenges and methodologies, including leveraging the OWASP Top Ten for AI.  Career advice: Emphasizing the importance of networking and creating opportunities, Andrew shares actionable tips on how to navigate and succeed in the cybersecurity industry.  Notable Quotes:  "Growth begins at the edge of your comfort zone." "If you want to see an area mature, look at it through the lens of an attacker." "My main goal has been transparency." "For me, it's all about delivering the highest integrity I can." "There's no rulebook in the job market—you can always re-engineer your career path."  Resources:  Andrew Lemon on LinkedIn  Red Threat  Defcon  OWASP Top Ten for AI  For more in-depth insights and to hear the full conversation, be sure to listen to the complete episode. Stay tuned for more engaging discussions on the Phillip Wylie Show, where you get a behind-the-curtain look at the world of professional hacking.