Episode18 - Math for Security and Red Teaming with KMAP

Episode18 - Math for Security and Red Teaming with KMAP

From Security Architect to Principal Red Team Engineer, KMAP joins Chris and Ron to discuss his diverse background and how he plans to use Discrete Math and BloodHound to advanced the capabilities of red teams.

Jaksot(389)

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics

7 Heinä 201917min

Episode 4 - Layer 8 Fitness, Diet, Focus

Episode 4 - Layer 8 Fitness, Diet, Focus

In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.

22 Kesä 201942min

Episode 3 - All Things Threat Intelligence

Episode 3 - All Things Threat Intelligence

In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!

22 Kesä 201927min

Episode 2 - Layer 8 Level Up Career, Life, and Self

Episode 2 - Layer 8 Level Up Career, Life, and Self

In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.

22 Kesä 201916min

Episode 1 - Cybersecurity Alchemy

Episode 1 - Cybersecurity Alchemy

Alchemy - "A seemingly magical process of transformation, creation, or combination" In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows. Link to blog: https://secdevops.ai

19 Kesä 201915min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-vegaaneista-tykkaan
aamukahvilla
rss-narsisti
rss-valo-minussa-2
adhd-podi
rss-duodecim-lehti
psykologia
aloita-meditaatio
jari-sarasvuo-podcast
rss-tripsteri
rss-vapaudu-voimaasi
queen-talk
rss-laadukasta-ensihoitoa
ilona-rauhala
puhutaan-koiraa
rss-lasnaolon-hetkia-mindfulness-tutuksi
adhd-tyylilla