

Red Team Hacker, Cybersecurity Expert & DOD Advisor | Matt Devost | Ep. 176
9 snips Nov 21, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46
Introduction
00:00 • 3min
How Did You Get Your Superpowers?
02:50 • 3min
The Hacker Mindset
06:12 • 2min
What Was the Next Step for You in Hacking?
07:43 • 2min
National Security and the Information Age
09:22 • 2min
Is It a Disembodied Astral Projection of Matt?
11:23 • 3min
Social Engineering - What Is Social Engineering?
13:58 • 2min
The Joint Task Force, You Know, Was a Command and Control System.
16:01 • 4min
Hackers as a National Resource
19:42 • 2min
Using Unclassified Networks to Target US Department of Defense Systems
21:29 • 6min
The Constant Podcast - Pirate History Podcast
27:54 • 2min
Red Teaming
29:43 • 2min
Do You Have a Combat Ready Password?
31:51 • 3min
How Hard Is It?
34:33 • 2min
Is There a Cyber Threat Intelligence Company?
36:46 • 3min
Anonymized Information Sharing
39:59 • 3min
Is There a Way to Automate the Cyber Threat Intelligence Practice?
42:51 • 2min
The Terrorism Research Center - Can You Trust Your Toasters?
45:11 • 4min
The Terrorism Early Warning Group
49:13 • 4min
How to Build a Terror Training Camp
53:12 • 3min
My History Can Beat Up Your Politics Podcast
56:21 • 4min
Cyber Red Teaming
01:00:43 • 2min
Social Engineering - Is Social Engineering Important?
01:02:15 • 2min
The Human Element in Cyber Security
01:03:46 • 3min
Cyber Threat Intelligence Collection at the TRC
01:07:15 • 2min
Using a Relational Database for Counterterrorism Data
01:09:01 • 3min
The Relational Knowledge Base
01:11:36 • 2min
Red Teaming in the Private Sector
01:13:19 • 3min
The Early Success of Red Teaming Was Based on My Reputation
01:16:43 • 3min
Using the Fusion Ex Methodology to Build Great Teams
01:19:51 • 3min
Cybersecurity - What Are the Best Avenues to Get Into Cybersecurity?
01:22:27 • 2min
How to Take Advantage of the Veteran Workforce
01:24:10 • 3min
Is It a Spy?
01:26:54 • 6min
How Deep Entangled the Web Can Become?
01:32:43 • 2min
Do You Know What's Going on in Cyber Command?
01:34:48 • 2min
Do We Have a Capacity in Offense Cyber Operations?
01:36:58 • 3min
Is Critical Infrastructure a Viable Target in the US?
01:40:21 • 2min
Critical Infrastructure Is a Viable Target From a Strategic Perspective
01:42:38 • 2min
Do You Think We're in a Better Place Today?
01:44:48 • 2min
The Challenge of a Cybersecurity Community Right Now
01:46:49 • 2min
DevSecOps Education
01:48:50 • 2min
Is There a Such Thing as Hegemony in Cyberspace?
01:50:28 • 2min
Is There a Hegemony of Technology?
01:52:57 • 2min
The Trade-Off Is Worth It, Right?
01:54:27 • 2min
Developing Capabilities in Python
01:56:56 • 2min
Is There a Challenge With Security?
01:58:42 • 5min