The Team House

Red Team Hacker, Cybersecurity Expert & DOD Advisor | Matt Devost | Ep. 176

9 snips
Nov 21, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 3min
2
How Did You Get Your Superpowers?
02:50 • 3min
3
The Hacker Mindset
06:12 • 2min
4
What Was the Next Step for You in Hacking?
07:43 • 2min
5
National Security and the Information Age
09:22 • 2min
6
Is It a Disembodied Astral Projection of Matt?
11:23 • 3min
7
Social Engineering - What Is Social Engineering?
13:58 • 2min
8
The Joint Task Force, You Know, Was a Command and Control System.
16:01 • 4min
9
Hackers as a National Resource
19:42 • 2min
10
Using Unclassified Networks to Target US Department of Defense Systems
21:29 • 6min
11
The Constant Podcast - Pirate History Podcast
27:54 • 2min
12
Red Teaming
29:43 • 2min
13
Do You Have a Combat Ready Password?
31:51 • 3min
14
How Hard Is It?
34:33 • 2min
15
Is There a Cyber Threat Intelligence Company?
36:46 • 3min
16
Anonymized Information Sharing
39:59 • 3min
17
Is There a Way to Automate the Cyber Threat Intelligence Practice?
42:51 • 2min
18
The Terrorism Research Center - Can You Trust Your Toasters?
45:11 • 4min
19
The Terrorism Early Warning Group
49:13 • 4min
20
How to Build a Terror Training Camp
53:12 • 3min
21
My History Can Beat Up Your Politics Podcast
56:21 • 4min
22
Cyber Red Teaming
01:00:43 • 2min
23
Social Engineering - Is Social Engineering Important?
01:02:15 • 2min
24
The Human Element in Cyber Security
01:03:46 • 3min
25
Cyber Threat Intelligence Collection at the TRC
01:07:15 • 2min
26
Using a Relational Database for Counterterrorism Data
01:09:01 • 3min
27
The Relational Knowledge Base
01:11:36 • 2min
28
Red Teaming in the Private Sector
01:13:19 • 3min
29
The Early Success of Red Teaming Was Based on My Reputation
01:16:43 • 3min
30
Using the Fusion Ex Methodology to Build Great Teams
01:19:51 • 3min
31
Cybersecurity - What Are the Best Avenues to Get Into Cybersecurity?
01:22:27 • 2min
32
How to Take Advantage of the Veteran Workforce
01:24:10 • 3min
33
Is It a Spy?
01:26:54 • 6min
34
How Deep Entangled the Web Can Become?
01:32:43 • 2min
35
Do You Know What's Going on in Cyber Command?
01:34:48 • 2min
36
Do We Have a Capacity in Offense Cyber Operations?
01:36:58 • 3min
37
Is Critical Infrastructure a Viable Target in the US?
01:40:21 • 2min
38
Critical Infrastructure Is a Viable Target From a Strategic Perspective
01:42:38 • 2min
39
Do You Think We're in a Better Place Today?
01:44:48 • 2min
40
The Challenge of a Cybersecurity Community Right Now
01:46:49 • 2min
41
DevSecOps Education
01:48:50 • 2min
42
Is There a Such Thing as Hegemony in Cyberspace?
01:50:28 • 2min
43
Is There a Hegemony of Technology?
01:52:57 • 2min
44
The Trade-Off Is Worth It, Right?
01:54:27 • 2min
45
Developing Capabilities in Python
01:56:56 • 2min
46
Is There a Challenge With Security?
01:58:42 • 5min