
Hacker Valley Red Episode 2 - Rachel Tobac
On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Rachel Tobac, CEO of SocialProof Security and Chair of the Women in Security and Privacy Board. Their conversation covers everything from neuroscience to spearfishing and human’s place in cyber security. Rachel is a human hacker, also known as a social engineer, and she begins the episode by explaining her background in social engineering and experience in the non profit space. She credits her success in the field to her background in neuroscience and behavioral psychology as well as training in improv. Her husband works in cyber security and encouraged her into the space even though she was nervous at first because she didn’t know how to code. Rachel explains that she still does not know how to code, her most important skills in social engineering are the ability to persuade and improv. When working with companies, Rachel helps client facing employees to help confirm people are who they say they are. She sits down with them to go through processes that help her close the loopholes that allow hackers to mine information. Humans are the first line of defense, so they have to have their guard up. From there, keeping the organization up to date on the latest trends in cyber security and how hackers find their way in is key to getting the correct tools to prevent hacks. As the episode ends, Rachel shares her next steps are working with hospitals to prevent ransomware and phishing attacks. She’s also turning her attention toward the election and educating people on what the 2020 Presidential election will look like and the time it may take to announce the winner. While she does not currently think elections can be done entirely from home, she considers it a goal for the future. 1:59 - Rachel Tobac and today’s episode of Hacker Valley Red is introduced. 8:50 - What are the skills needed to become a social engineer? 10:51 - Rachel leads Ron and Chris through an improv exercise. 13:59 - Rachel shares where she thinks technology is headed. 20:20 - Rachel shares the scariest part of social engineering hacks. 25:29 - Rachel’s key takeaways. 34:11 - Rachel is looking toward 2020 election security. Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Follow Rachel Tobac on Twitter Learn more about the season sponsor, RiskIQ
6 Loka 202038min

Hacker Valley Red Episode 1
In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris introduce the podcast’s new series: Hacker Valley Red. After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side. Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season. As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like. The hosts then share their own backgrounds in red teaming. While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season. As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more. In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners. These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it. Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team. 0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security. 2:48 - Ron and Chris share their respective backgrounds in red teaming. 7:25 - What other aspects of life and technology help guests with red teaming? 10:50 - Chris asks about Ron’s exploitation video. 12:52 - The hosts address the iterative improvement of an organization’s security posture. 18:14 - Ron and Chris talk about purple team engagement. 21:12 - Is unhackability real or possible? 24:53 - Hacking can have to deal with a human, rather than a device or application. 26:34 - What key takeaways do the hosts want listeners to take from the season? 28:10 - What do Ron and Chris want listeners to learn? Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Learn more about the season sponsor, RiskIQ
6 Loka 202030min

Hacker Valley Blue Season Finale
In this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series, Ron and Chris wrap up the season with a recap of its past episodes and major takeaways, as well as a look at what’s to come for them personally and for the podcast. Looking back on the season, Ron and Chris consider the importance of communication in the field of threat intelligence, specifically thinking of insights from their talk with D’Arcy and lessons in poetry and delivery from Valentina. They cover the surprise of Jack’s willingness to share personal thoughts, review their discussions of bias (specifically highlighting talks with Jon and Susan), and recount things learned about the concept of unhackability. Listeners will hear about the inevitability of mistakes in threat intelligence work, the “easy button” framework, the season theme of sharpening oneself outside of work, and the dynamic of a threat intelligence team. The episode then turns toward Ron and Chris, themselves. Ron first puts Chris in the hot seat and asks what the future of threat intelligence is for him. Chris explains that, while he thinks his days as an individual contributor for threat intelligence are over, he is still doing some quiet, yet-to-be revealed work, and is turning much of his attention to giving back to the field. Ron, in explaining his own work, talks about bouncing between tasks, building tools for others, distilling information into simple messages, and continuing to navigate issues of automation. Finally, Ron and Chris thank people involved with the season and address what the future holds for the Hacker Valley Studio podcast. Listeners hear the exciting announcement of the next season: Hacker Valley Red! 0:47 - Ron and Chris talk about the importance of communication in the field of threat intelligence. 2:56 - What was one surprise in this season? 3:52 - The hosts review their conversations about bias. 6:55 - The episode turns to the “easy button” framework and the need for personal sharpening outside of work. 16:15 - Ron and Chris consider the inevitability of analysts missing things and the building of a team. 20:22 - What is the future of threat intelligence for Chris and Ron? 27:50 - The hosts review their insights about the possibility of an unhackable device or app. 29:43 - What is next for the Hacker Valley Studio podcast? Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Learn more about RiskIQ
1 Syys 202035min

Hacker Valley Blue Episode 7 - D'Arcy Webb
Ron and Chris host their vocal coach, D’Arcy Webb, for this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series. Since threat intelligence is a communications-based function, Ron and Chris look to “The Speech Diva” for insight. She has experience as an actress, was a coach for TEDxCambridge, and loves teaching people how to access the power of language to touch people’s hearts and change their minds. As the conversation begins, D’Arcy explains her background to listeners. She explains how an acting incident early in her career turned her attention to the topic of vocals, and clarifies that she has spent the last 25 years teaching and exploring this aspect of performance. D’Arcy is passionate about treating the voice as the instrument that it is, and she works with students such as Chris and Ron to help them discover the musical and magical components to language and improve their own speaking practice. The way we speak, she insists, impacts people, and so it is well worth pursuing excellence in this area. The conversation also highlights various details pertaining to vocal training. D’Arcy lists some of her favorite speakers and the reasons why she loves them (going out of her way to point listeners to NPR’s Fresh Air and its host, Terry Gross) She also speaks to the nature of vowels and consonants, the usefulness of pauses and variety in speech, how listeners can grow through coaching and - even today - through working on their breathing, the place of filler words in language, and the ideal of comfort with one’s own technique. Listeners will hear about Pablo Nerudo, onomatopoeia, vibrations, and so much more! 1:29 - Listeners are introduced to D’Arcy. 4:35 - The group considers Ron and Chris’s progress in speech. 6:08 - D’Arcy believes that magic and music are inherent in language. 8:48 - Who are D’Arcy’s favorite speakers, and what is the value of pauses? 12:03 - People wanting to grow need to learn the fundamentals. 17:05 - D’Arcy addresses filler words. 19:31 - The group thinks about comfortable technique, Pablo Neruda, onomatopoeia, and more. 27:52 - D’Arcy speaks to the power of speech and the importance of proper breathing. Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Learn more about D’Arcy Webb Connect with D’Arcy on Facebook Email D’Arcy at darcy@darcywebb.com Learn more about our sponsor RiskIQ
1 Syys 202033min

Hacker Valley Blue Episode 6 - Brandon Dixon
This episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series is a bit unique. It features Brandon Dixon, the VP of Strategy at RiskIQ, a major sponsor of the podcast. Brandon co-founded Passive Total in 2014, and it was later purchased by RiskIQ. He is the quintessential guest, invested in fitness, philosophy, tech, and leadership. He is an expert in both the practice and business of threat intelligence, and he shares with Ron and Chris about himself, his work, and the field. Much of the conversation focuses on Brandon and his work background. Brandon explains his journey into the threat intelligence field, from his early interest, through jobs in tech and academia, and to work in espionage research. Eventually, he and friend Steve McGinty saw a need and tried to solve it; their efforts took shape in the company they co-founded, Passive Total. Brandon explains to listeners the process by which he and Steve created Passive Total, as well as the way in which they arrived at the deal to sell Passive Total to RiskIQ. Brandon was heavily involved in the integration of Passive Total into RiskIQ, before eventually settling into a specific role within RiskIQ that capitalizes his love of the business side of the field. He aims to work in light of his personal philosophy on life and success, which he also details. The conversation touches on many practically relevant details of the threat intelligence field, as well. Brandon addresses the changes in the field and motivation he draws from these changes, bias and intelligence collection, and lessons that have arisen through his specific experiences. Other topics covered include intelligence leads and the future of threat intelligence, unhackability, the place of circumstances in life and business, and how intelligence leaders can improve their programs. As Brandon anticipates that threat intelligence will only become a more pervasive field, listeners will doubtless benefit from his own insights, as well as his recommendations of such resources as Malcolm Gladwell’s Outliers and RiskIQ workshops. 0:26 - The conversation begins with an introduction to this unique episode, its guest, and his background. 2:43 - The group considers the changing business of threat intelligence and what drives Brandon. 8:24 - The next topics are bias and intelligence collection, as well as what surprises Brandon. 13:00 - Brandon shares the story of Passive Total and its integration into RiskIQ, also addressing the business side of the field and lessons learned through his experience. 24:04 - Brandon addresses intelligence leads and the question of unhackability. 34:44 - What is Brandon’s philosophy on life and success? 39:37 - Brandon explains what threat intelligence leaders need to do to improve their programs. Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Follow Brandon on Twitter Learn more about our sponsor RiskIQ Follow RiskIQ on Twitter Connect with RiskIQ on YouTube
1 Syys 202043min

Hacker Valley Blue Episode 5 - Susan Peediyakkal
This episode of the Hacker Valley Studio podcast is the fifth installment in this first season of the Hacker Valley Blue series, and features guest Susan Peediyakkal, an expert in building threat intelligence programs. Susan is a cyber threat intelligence consultant, the founder of BSides Sacramento, and a member of the advisory boards for several cybersecurity companies. She joins hosts Ron and Chris to speak to her background, the future of threat intelligence, and much more. Susan first details her background, running through the highlights of her approximately 16 years in cybersecurity, which have focused mostly on threat intelligence. Susan began her career in the air force, and is still a reservist. She worked with radar, and eventually decided to cross-train and branch into IT. The following years saw her in a number of roles with various organizations, and move decisively into the threat intelligence field. Eventually, Susa noticed that her career trajectory was moving her toward building threat intelligence programs for government entities. She built programs for such varied clients as the government of Abu Dhabi, USPS, US courts, and industry leaders. She recently paused her work to pursue further education, but has since returned to work as a threat intelligence practitioner.. As the conversation continues, Ron and Chris ask Susan to share insights on several topics. The group considers the importance of community and a human element within the threat intelligence field, ways Susan has faced misconceptions when starting threat intelligence programs, the concept of unhackability, and what stakeholders outside the field get wrong about it. Returning to a topic that has been forefront on Ron and Chris’s minds recently, Susan also shares about bias in her line of work and how threat intelligence analysts go wrong in dealing with it. Moving into more personal topics, the group discusses Susan’s podcast-worthy voice, clarity, and articulation. Susan explains how experts in threat intelligence can cultivate a new wave of speakers, and the conversation ends with a look at what the future holds for both Susan and the field of threat intelligence. 1:40 - Listeners are introduced to the episode and today’s guest, Susan Peediyakkal; Susan then shares her background. 5:41 - The group considers the importance of community, misconceptions Susan has noticed about her field, and the artistry and human element of threat intelligence. 16:02 - What kind of bias is Susan running into, and where do analysts go wrong with regard to bias? 21:38 - Susan addresses the term “unhackable.” 24:35 - Susan and her hosts turn to matters of podcasting, voice, and speaking. 31:40 - What do people outside the field get wrong about it? 33:48 - What’s the future look like for Susan, her field, and the workforce? Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Follow Susan on Twitter Connect with Susan on LinkedIn Learn more about the episode sponsor, RiskIQ
1 Syys 202040min

Hacker Valley Blue Episode 4 - Jon DiMaggio
This episode of the Hacker Valley Studio podcast features Jon DiMaggio, a Senior Threat Intelligence Analyst at Symantec. Jon is a researcher and longtime bad guy chaser, and Ron and Chris fill this installment of Hacker Valley Blue with Jon’s thoughts on ransomware, threat research, attribution, and more! Jon introduces himself to listeners who may not yet know much about him, explaining that he started his career as an engineer and that his work for the government in the early 2000s forced him to focus a lot on defending against nation-state attacks. He developed into an expert in the field, and transitioned about 13-14 years ago into his current line of work. He now teaches alongside his work as an analyst, and he moved from a government position to Symantec in 2014. Jon’s specialty is still nation-state, but he has also ventured into enterprise ransomware. He shares about these areas of specialization with Ron and Chris, detailing what a nation-state is and how to combat it within the context of threat intelligence, and addressing the economics of ransomware. As the conversation continues, Ron and Chris raise a variety of other topics for Jon to address. Jon considers the threat of a future major worm attack, and provides listeners with insight on how to become established in his line of work. There are a lot of available resources that people can use to develop their own skills and increase their visibility. However, becoming a government hacker, and so having an offensive rather than a defensive role, is much more challenging. Moving toward the conclusion of the conversation, Jon offers tips on navigating attribution and bias (such as being sure to have evidence before making public claims!), explains how he mentally organizes and recalls information, and speaks to the nature of strong communication. 1:41 - Listeners are introduced to Jon DiMaggio and the episode before Jon explains his background.. 5:04 - The first major topic Jon shares about is that of nation-states, specifically speaking to the work of combating nation-state attackers. 12:57 - The conversation turns to the economics of ransomware. 18:39 - What are Jon’s thoughts on the possibility of another major worm attack? 20:26 - Jon is asked about how people can enter his field or that of hacking. 24:54 - How should listeners approach attribution and bias, and how has Jon navigated bias in his own life? 31:31 - The group considers Jon’s mental organization, his recall of information, and the topic of communication. Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Access the recent work and research on Symantec’s threat intelligence feed Learn more about the episode sponsor, RiskIQ
1 Syys 202040min

Hacker Valley Blue Episode 3 - Valentina Palacín
In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris welcome Valentina Palacín for the third episode in the Hacker Valley Blue series. Valentina is a threat hunter who used to work as a translator, and she is currently a senior cyber threat intelligence analyst. She joins Ron and Chris to talk about her background in languages, poetry and the impact of words, and much more. As the conversation gets underway, Valentina explains her background to listeners. She studied translation before starting her career in that field, but transitioned to information technology about two years ago. In her free time, she researches threat hunting in her home country of Argentina. It was challenging for Valentina to change her career path, since she had no background in computer science, but she took multiple steps - working in web development, learning to do programming, taking courses, and more - ultimately becoming a threat intel analyst and speaker. Though the journey was difficult, Valentina feels she was born to work in her current field, and has found her past experience, including knowledge of over 7 languages, to be helpful in her work. The episode also features Valentina’s insights into threat intelligence. She and her hosts discuss how knowledge of programming can aid a threat intel analyst, Valentina’s philosophy of MITRE, the relationship between intelligence and threat hunting, and how to keep up with changes in the field. They arrive at the conclusion that, while it is helpful to stay up to date on political and cyber news, analysts must realize that they cannot know everything, and people in general must realize that threat intelligence is not a catch-all. The group bridges the gap between personal and professional aspects of life by talking about the importance of hobbies outside of work; most notably, the group addresses poetry and its usefulness for threat intelligence. Finally, the conversation turns to Valentina’s work with BlueSpace Security. 1:38 - Listeners are introduced to Valentina, her background, and her challenging process to enter into the large intel community in Argentina . 5:24 - Did knowledge of language impact Valentina’s threat intelligence work? 7:55 - Valentina shares about her programming experience and details her journey into threat intel. 14:23 - What are Valentina’s thoughts about MITRE and the relation between intelligence and threat hunting? 18:06 - The group considers how to keep up with changes in the field, and acknowledges that threat intelligence will not catch everything. 22:48 - One thing that Valentina is passionate about pursuing is hobbies outside of work. 27:56 - Does poetry help with threat intelligence work? 32:53 - The conversation turns to Valentina’s community, focusing on BlueSpace Security. Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Connect with Valentina Palacín on Twitter Connect with Valentina on LinkedIn Learn more about the episode sponsor, RiskIQ
1 Syys 202036min






















