Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
The Pound Sign
01:56 • 1min
The Price of Genius
03:19 • 2min
How to Get Sponsored on Twitter
05:33 • 2min
How to Get a Partner on Twitch
07:31 • 3min
The Point of Detection
10:32 • 3min
How to Define a Violent Attack
13:57 • 3min
The Importance of Preventative Controls
16:48 • 5min
The Pros and Cons of Power Shell
21:49 • 3min
How Microsoft Gap Changed Security
24:20 • 6min
The Value of Detection in Threat Hunting
29:54 • 6min
The Importance of Operating Under Constraints
35:31 • 5min
The Paradigm Shift in Processes
40:47 • 3min
How to Deal With Laziness in the Workplace
43:19 • 3min
The Importance of Identifying Problems
46:32 • 5min
The Crucible of Information Security
51:22 • 2min
How to Deploy a Heart Bleed Patch Effectively
53:29 • 4min
How to Measure the Effectiveness of Your Product
57:48 • 5min
How to Differ Between Approved Use and Unapproved Use
01:02:39 • 5min
The Importance of Knowing About a Worm
01:07:51 • 4min
The Base Condition for Kerbrosi
01:12:08 • 2min
How to Automate Detection and Triage
01:13:39 • 6min
Kerbiroast Authentication: How to Protect Your System From Attacks
01:19:13 • 3min
How to Reduce the Scope of Kerb Roasting Attacks
01:22:18 • 2min
The Importance of Prevention and Detection in an Organization
01:24:28 • 3min
The Importance of Implementation Consulting in Information Security
01:27:05 • 5min


