

Penetration Testing Stories w/ Emilie St-Pierre - PSW #788
Jun 22, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
Introduction
00:00 • 4min
The Lavender Gin Sour Cocktail
03:37 • 2min
How I Got Started in Information Security
05:34 • 2min
How I Learned the Lingo of Healthcare
07:27 • 4min
How to Define Penetration Testing
11:55 • 2min
What Is a Pen Test?
14:03 • 2min
How to Set Expectations for Pen Testing
16:19 • 4min
How to Pretend to Be Pregnant on a Bed Test
19:55 • 3min
How I Met a Senior Manager at a Bank
22:35 • 5min
The Impact of Social Engineering on Digital Chain of Custody
27:27 • 5min
The Chain of Custody Integrity Challenge
32:10 • 2min
The Dangers of Tampering With Medical Imaging Systems
33:59 • 3min
How to Measure Caffeine in Your Coffee
37:24 • 4min
How to Be a Successful Pen Tester
41:24 • 5min
The Biggest Security Threat Facing Medical Devices
46:45 • 4min
The Impact of Ransomware on Peacemakers
51:13 • 4min
The Importance of Data Privacy Regulation
54:54 • 3min
How to Be a Successful Hacker
58:20 • 5min
The Gigabyte Hack
01:03:35 • 4min
How to Stop a Malware Updater From Downloading Payloads
01:07:57 • 6min
Move It: A Sequel Injection Vulnerability
01:13:29 • 2min
Moved's SQL Injection Vulnerabilities
01:15:42 • 5min
How to Securely Share Files
01:20:49 • 6min
How to Manage Virtualized Applications at Scale
01:26:36 • 6min
Fortinet's Response to Vulnerabilities
01:32:34 • 6min
Barracuda's Email Security Gateway 400
01:38:21 • 4min
The End of Support in IOT Devices
01:42:25 • 4min
The Role of Seat Belts in Automobile Safety
01:46:33 • 2min
N Phase Systems Unresponsive to CSA Request to Fix Remotely Exploited Flaws
01:48:13 • 2min
The Authority of CISA
01:50:38 • 2min
CISA and NIST: A Comparison
01:52:22 • 3min
The Importance of Incentives in Hacker Security
01:55:01 • 2min
The Importance of Motivation in Security
01:57:22 • 3min
How to Overfeed Your Pets
01:59:55 • 5min
The Science of Overfeeding Your Dog
02:04:47 • 2min
The Problem With Replacing Appliances
02:06:39 • 5min
The Importance of Third Party Influence in the PCI World
02:11:33 • 3min
The Importance of Understanding Your Culture
02:14:40 • 2min
The Importance of Arguing the Deep
02:16:34 • 2min
The Importance of Compliance in Business
02:18:09 • 2min
The Evolution of Grant Requirements for Cybersecurity
02:19:49 • 2min
The Cost of Doing Business
02:21:31 • 3min
Rob Lee Has Shaved His Beard
02:24:35 • 3min
Will Ferrell: The Man Who Built Drago's
02:27:28 • 5min
What Is Your Favorite Soccer Team?
02:32:09 • 2min
How to Get Tickets to Games Where Messi Is Going to Play in the MLS for Miami
02:33:57 • 5min
I Killed My Smart Meter and Made It Smoke
02:39:17 • 3min
How to Overfeed Your Compressor
02:42:42 • 2min
The Ethics of Using a Flipper Zero
02:44:21 • 2min
How to Use a Flipper Zero for Good
02:45:57 • 4min
The History of Dick Clark and Chris Ingles
02:49:38 • 3min
The Executive Branch Is the Business of the Government
02:52:27 • 3min
The Importance of Respect for Legislators
02:55:38 • 3min
The Fall of the 911 Memorial
02:58:42 • 5min
The Importance of Prioritizing Spend
03:03:48 • 3min
The Barrier Between Technologist and Business Risk
03:06:52 • 2min
The Importance of a Direct Conversation With Your Leadership
03:08:55 • 2min
Empathy as a Security Practitioner
03:11:06 • 2min
The Importance of Empathy in Security
03:13:31 • 3min