Hacker Valley Blue Episode 1

Hacker Valley Blue Episode 1

Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners.

The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade.

Ron has always had an interest in cybersecurity, and at 16 he found a mentor who took him under his wing in the trade. After a couple of years working in offensive attacks, he transitioned to a job building intelligence tools that dealt with threat data. While Chris focused more on the operational side of threat intelligence, Ron’s was more technical, and their experience converged well.

Throughout the rest of the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris’ EASY framework.

1:07 - The new season of Hacker Valley Blue is introduced.

3:43 - Chris shares his background in intelligence.

6:15 - Ron shares his background in intelligence

11:43 - What can threat intelligence do for an organization?

17:50 - The EASY Framework

18:41 - Elicit Requirements

21:40 - Asses Collection Plan

26:03 - Strive for Impact

30:24 - Yield the Feedback

Links:

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Learn more about the episode sponsor, RiskIQ

Jaksot(410)

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day. In this epi...

29 Tammi 32min

When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley

When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley

Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today. Ron sits down with Graham C...

25 Tammi 37min

When Automation Outruns Control with Joshua Bregler

When Automation Outruns Control with Joshua Bregler

AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catas...

18 Tammi 37min

The Day AI Stopped Asking for Permission with Marcus J. Carey

The Day AI Stopped Asking for Permission with Marcus J. Carey

AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequen...

15 Tammi 33min

When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate

When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate

AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, ...

8 Tammi 35min

Think Like a Hacker Before the Hack Happens with John Hammond

Think Like a Hacker Before the Hack Happens with John Hammond

What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they ...

1 Tammi 28min

Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt

Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt

Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators wh...

18 Joulu 202533min

Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes

Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes

When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aqu...

11 Joulu 202534min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
adhd-podi
rss-narsisti
psykologia
rss-liian-kuuma-peruna
rahapuhetta
kesken
rss-valo-minussa-2
rss-vapaudu-voimaasi
rss-niinku-asia-on
rss-duodecim-lehti
rss-luonnollinen-synnytys-podcast
aamukahvilla
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-uskonto-on-tylsaa
rss-honest-talk-with-laurrenna
rss-tietoinen-yhteys-podcast-2
rss-opeklubi