Unlocking Cyber Education with John Hammond

Unlocking Cyber Education with John Hammond

John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective.

Timecode Guide:

[01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content

[06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success”

[13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches

[16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team

[21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands”

Sponsor Links:

Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!

What is your origin story for wanting to educate other hackers?

Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.

“Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”

What feelings do you get looking back on the YouTube content you’ve created so far?

John prioritizes clarity, transparency, and honesty in what he does, and he’s not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he’s showing in his videos, he prefers to keep things honest, to show where he’s made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.

“I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It’s not all sexy, there’s a lot of failure in hacking.”

Have you ever considered focusing on the blue team or the defensive side of cybersecurity?

The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John’s own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team.

“We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”

What advice do you have for red team content creators that want to share content and spread awareness safely?

With the impact that he’s had and the content he’s put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before.

Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone.

“Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.”

----------

Links:

Check out our guest, John Hammond, on YouTube and LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Ron Eddings on Twitter and LinkedIn.

Catch up with Chris Cochran on Twitter and LinkedIn.

Continue the conversation by joining our Discord.

Jaksot(404)

Episode 12 - Physical Red Teaming: No Lock Left Secured

Episode 12 - Physical Red Teaming: No Lock Left Secured

Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.

13 Elo 201915min

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.

23 Heinä 201937min

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.

16 Heinä 201939min

Episode 9 - The Intelligence Easy Button

Episode 9 - The Intelligence Easy Button

In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.   - Elicit Requirements - Assess Collection - Plan Strive for Impact - Yield to Feedback   All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

7 Heinä 201919min

Episode 8 - Serverless Threat Intel Bot

Episode 8 - Serverless Threat Intel Bot

New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.

7 Heinä 201913min

Episode 7 - Layer 8 - Vulnerability And Diversity

Episode 7 - Layer 8 - Vulnerability And Diversity

How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (https://www.linkedin.com/in/cnwatu/) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.

7 Heinä 201944min

Episode 6 - MITRE ATT&CK™ Matrix Overview

Episode 6 - MITRE ATT&CK™ Matrix Overview

In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.

7 Heinä 201921min

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics

7 Heinä 201917min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-liian-kuuma-peruna
adhd-podi
aamukahvilla
jari-sarasvuo-podcast
psykologia
rss-narsisti
rss-uskonto-on-tylsaa
rss-tule-tule-hyva-ero
rss-finnish-with-eemeli-podcast
rss-luonnollinen-synnytys-podcast
rss-koira-haudattuna
rss-niinku-asia-on
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-vapaudu-voimaasi
rss-keskeneraiset-aidit
salainen-paivakirja
rss-tripsteri