Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Introduction
00:00 • 4min
How to Beat the CCDC Team in College
04:01 • 4min
The Negative Ramifications of Open Source Attack Tool Sets
07:43 • 5min
The Minimum Viable Standard for Security
13:00 • 3min
Open Source Tooling Saves Time and Resources From the Detection Engineering Process
16:07 • 5min
The Motivation Behind Creating Detection Lab
21:30 • 2min
Detection Lab: An Open Source Project
23:59 • 5min
The Complexity of Monitoring for Drop Off
28:32 • 3min
The Longevity of a Zoom Call
31:07 • 5min
How to Inform the Blue Team on How to Do Things Better
36:01 • 1min
How to Be a Great Red Teamer
37:23 • 4min
The Defensive's Dilemma
41:15 • 4min
The Reality of Red Teaming
44:52 • 3min
The Importance of Detection and Response in Team Sports
47:56 • 4min
The Value of Having a Red Team in a Blue Team
52:12 • 4min
The Importance of Having a Red Team in Detection Engineering
56:13 • 5min
The Importance of Mindset in Security
01:00:52 • 6min
Preventative Controls for Small Businesses
01:06:45 • 3min
The Value of Telemetry in Protecting Your Environment
01:10:03 • 2min
The Barrier to Entry in the Security Industry
01:12:25 • 2min
The Power of PowerShell
01:14:51 • 4min
How to Pick Up the Skills You Need for a Spectrophs Interview
01:18:58 • 2min
The Importance of Remote Procedure Call in Telemetry
01:20:32 • 2min
The Importance of Integer Data
01:22:15 • 4min
The Flexibility of OS Query on Linux
01:25:47 • 5min


