Unlocking Cyber Education with John Hammond

Unlocking Cyber Education with John Hammond

John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective.

Timecode Guide:

[01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content

[06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success”

[13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches

[16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team

[21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands”

Sponsor Links:

Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!

What is your origin story for wanting to educate other hackers?

Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.

“Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”

What feelings do you get looking back on the YouTube content you’ve created so far?

John prioritizes clarity, transparency, and honesty in what he does, and he’s not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he’s showing in his videos, he prefers to keep things honest, to show where he’s made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.

“I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It’s not all sexy, there’s a lot of failure in hacking.”

Have you ever considered focusing on the blue team or the defensive side of cybersecurity?

The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John’s own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team.

“We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”

What advice do you have for red team content creators that want to share content and spread awareness safely?

With the impact that he’s had and the content he’s put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before.

Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone.

“Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.”

----------

Links:

Check out our guest, John Hammond, on YouTube and LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Ron Eddings on Twitter and LinkedIn.

Catch up with Chris Cochran on Twitter and LinkedIn.

Continue the conversation by joining our Discord.

Episoder(404)

Episode 164 - Demystifying Product Innovation with Erik Goldman

Episode 164 - Demystifying Product Innovation with Erik Goldman

Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a software engineer, expert in product and an entrepreneur.  Erik is great at asking questions, that is one of his superpowers. One of his strategies to build a product is to sit down with customers, ask them what they want him to do, deeply understand their persona, and gather data. Erik builds his thesis for success, and knows how to distinguish a good company from a great company by analyzing which one has a philosophy that goes beyond the software. Erik offers advice for listeners on how to operate better on their company.   1:03 - Intro 2:37 – Bio 6:18 – The difference between building a product and building a business 7:18 – What are Erik’s strengths based on his past experiences 9:20 – How Erik stays away from tinkering with the code, and more of the technical aspects 11:48 – Erik’s power of understanding the concepts by asking questions 13:19 – The difference between a good company and a great company 15:20 – What Erik thinks about the future of technology and the cyber security of the future 19:30 – Erik’s thoughts about automating security operation 26:07 – Erik’s advice for listeners to operate better in their company’s environment 27:50 – How to stay up to date with Panther Labs.   Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Erik Goldman: Panther Website Support Hacker Valley Studio on Patreon Join our monthly mastermind group via Patreon Visit our sponsor Panther Labs

24 Aug 202128min

Episode 163 - A Blueprint for Learning Cyber with Keith Wilson

Episode 163 - A Blueprint for Learning Cyber with Keith Wilson

Hosts Ron and Chris interview guest Keith Wilson, director of cyber security education at Attack IQ Academy. Keith is the perfect example on how to take years of experience in engineering and analysis, and turn it into something that is impactful for all people. Keith has created educational content for people in the industry and different types of learners. His trajectory is filled with success stories, and also invites people who want to get into cyber security.    1:11 - Intro 3:03 – Bio 6:13 – How Keith’s fascination with education started 9:09 – Blueprint for education: concepts, the structure of classes, and activities 12:33 – The approach to different types of learners  15:21 – Discussion about students who want to get into cyber security or transition into another aspect of it 16:51 – Keith’s creative process for building new content and sharing information 20:51 – Success story of when education is done right 22:41 – Advice to listeners about putting out educational content  24:16 – How to stay up to date with Keith and Attack Academy IQ   Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Keith C. Wilson: LinkedIn | Instagram | Twitter | Attack IQ Academy  Support Hacker Valley Studio on Patreon Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs.

17 Aug 202125min

Episode 162 - Security in Space with Frank Pound

Episode 162 - Security in Space with Frank Pound

What do you call cyberspace in space? What is the evolution of cyber security in space? The expert Frank Pound, computer scientist, entrepreneur, founder and president of Astro Sec is the guest to clarify all things related to cyberspace. Space traffic control is discussed. Frank advised the Air Force, Space Force, and their contractors to help build the Hack-A-Sat competition which attracted teams from around the world to demonstrate their prowess in this blended space and cyber competition challenging them in everything from orbital dynamics to radio communications.   1:00 – Intro  2:10 – Bio Frank Pound 11:10 - Frank Pound talks about the democratization of technology  12:03 – The explosion of IOTs on the market, sensors, and rapid advancements on space launch  12:54 – The open-source hardware movement 18:04 – General excitement about space in 2019 and investment in safety 20:56 – Potential for a cascading effect making space travel impossible  23:37 – Frank Pound talks about safety measures 24:50 – A summary of Hack-A-Sat’s latest works 27:22 – Alternatives to cyber security and safety in space  37:00 – Frank answers the question on how to do missions in space 40:16 – How to find out more about Frank Pound and Hack-A-Sat’s competition, interviews and resources    Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Frank Pound: Twitter | Website Support Hacker Valley Studio on Patreon Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

10 Aug 202141min

QuickQ: What is Social Networking? Hacker Summer Camp FOMO

QuickQ: What is Social Networking? Hacker Summer Camp FOMO

In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question of the day is, “what is social networking?” Together they discuss different aspects of social media and how it facilitates connections and careers. Ron’s perspective is that social networking empowers folks to find like minded people, learn new things, self advocate and learn about others. Chris shares how social networking on LinkedIn put him in a position to build a community in cybersecurity. Timecodes 01:53 - The difference between networking and social networking and polishing profiles. 04:00 - How Ron engages with social networking mindfully. 06:30 - How LinkedIn helped Chris and Ron find their community. 08:46 - How social networks can elevate cybersecurity practitioners, researchers and businesses. 10:00 - Threat intelligence, open source intelligence and finding family on social networks 13:00 - Perspectives on the future of social networks and digital interaction. 15:45 - Making the most of social networks   Links Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon

8 Aug 202117min

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life.  Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!   01:30 Guest Intro 02:14 Bio  11:30 Ken’s journey in content creation 13:22 Why focusing on giving value first matters 16:15 Ken’s future plan for content 23:50 The path to making an impact 29:40 Connecting with your audience 37:58 Get in touch with Ken    Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Ken Underhill: Courses | YouTube | Website | LinkedIn  Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

4 Aug 202139min

QuickQ: What is Threat Hunting?

QuickQ: What is Threat Hunting?

In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue season 1. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation.  Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself: What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one?    Key Takeaways:   0:00 Welcome to the podcast! 1:10 Introduction/ Bio 2:55 What is Threat Hunting? 5:25 Chris’ take on working with a Threat Hunter (Ron) 7:08 Valentina’s Threat Hunting flow 9:18 Ron and Valentina talk about progressions in Threat Intelligence 12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions 18:00 How to get into Threat Hunting 20:55 Get in touch with Valentina!   Valentina Palacín: Book | LinkedIn | Twitter Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon

30 Jul 202122min

Episode 158 - Wild Adventures with Chef Bri Van Scotter

Episode 158 - Wild Adventures with Chef Bri Van Scotter

In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat.    Key Moments 00:56 - Intro to Bri 02:41 - Bri’s Background 03:59 - The darker side of food production 04:57 - The hunt begins 06:13 - For the love of food 11:41 - On going deep with your craft 16:10 - Getting more in touch with your food 21:33 -  Eating for Health 22:52 - Honoring our food sources 25:28 - Knowledge is power   Visit Bri at her website Follow Bri on Instagram Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

28 Jul 202127min

QuickQ: What is Security Architecture?

QuickQ: What is Security Architecture?

Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic. Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money. Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )   Key Takeaways: 0:00 - Welcome back to the Hacker Valley Studio 1:10 - Ron's favorite topic! Security Architecture 1:45 - Security architecture is the foundation  2:21 - Where a security architecture starts and stops 4:00 - A security architect is playing a game of Tower Defense 6:27 - Using EASY Framework as a security architect 10:04 - Prerequisites for becoming a security architect 13:55 - Differences between security architect and security engineers 16:55 - Resources for learning more about security architecture 19:21 - Stay in touch with Hacker Valley Studio!   Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Learn more about our fantastic sponsor Upytcs

22 Jul 202120min

Populært innen Fakta

merry-quizmas
fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
rss-strid-de-norske-borgerkrigene
treningspodden
foreldreradet
jakt-og-fiskepodden
rss-kull
dypdykk
rss-var-forste-kaffe
fryktlos
hverdagspsyken
sinnsyn
rss-sarbar-med-lotte-erik
rss-kunsten-a-leve
gravid-uke-for-uke
tomprat-med-gunnar-tjomlid
skravleklassen
ukast