SEC504: Hacker Tools, Techniques, and Incident Handling

Arm yourself with the most valuable and actionable content for advancing cyber defense skills. Hear from some truly interesting people changing the game in the blue teaming field, and ultimately learn actionable ways to take your cyber defense skills to the next level.
What is AppSec, DevOps and DevSecOps? In this episode we discuss why defenders should know more about these terms and what the consequences are of ignoring these new and critical fields.
teasseeeerrrrrrr
Many of us with the typical IT and security backgrounds might not have the slightest idea what to expect when we hear the terms “this product uses advanced machine learning…”, but that claim certainly conjures up a lot of skepticism due to the opaque nature of the algorithms in many of these products. In this episode we discuss what AI and ML are best used for, and what they can, can’t, and shouldn’t be used for with guest Dave Hoelzer.
In this mega-discussion with Seth Misenar on GenAI and LLM usage for security operations we cover some very interesting topics, such as the unique capabilities GenAI affords to those working in security operations, the importance of natural language processing, and much more.
In this mega-discussion with Seth Misenar on GenAI and LLM usage for security operations we cover some very interesting topics, such as the unique capabilities GenAI affords to those working in security operations, the importance of natural language processing, and much more.
Dave and Ryan speak with John about resources for training yourself, and the challenges of setting up a large-scale cyber lab to simulate an advanced attack for their Splunk Boss of the SOC competition.
In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they explore the intricate details of uncovering and combating a clever case of cyber fraud. In this episode Mark discusses how the incident was identified, investigated, contained, and what lessons were learned along the way.
Mary Chaney shares what types of cyber laws we should be concerned about. She discusses her thoughts on privacy laws and how that will drive cyber security, and what she's doing to get more diverse representation in the industry at all levels.
Mary Chaney shares what types of cyber laws we should be concerned about. She discusses her thoughts on privacy laws and how that will drive cyber security, and what she's doing to get more diverse representation in the industry at all levels.
Mark and Libby share the new technologies in use at Microsoft to dramatically decrease the need for the use of passwords in the enterprise.
Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discusses with Kathryn, Ingrid, and Carson the challenges and rewards of self-publishing, and the kind of effort that goes into producing a book like "11 Strategies of a World-Class Cybersecurity Operations Center".
There are many technical factors that contribute to the success of a security operations team, but you need more than just tech skills for mounting a solid defense. In this episode of Blueprint we bring back previous guest Mark Orlando to talk about his BlackHat 2022 presentation with Dr. Daniel Shore (PhD in workplace psychology). We discuss team dynamics, how the mapping of multi-team systems can improve the flow of your incident response activities, and much more.