All Episodes

Displaying 41 - 60 of 65 in total

Episode 41 — Anticipate Next Moves with Kill Chain and Diamond Model Threat Frameworks

In this episode, we explore how to predict attacker steps by utilizing structured models like the Cyber Kill Chain and the Diamond Model of Intrusion Analysis. We defi...

Episode 42 — Prioritize Intelligence: Indicators, Observables, and the Pyramid of Pain

Prioritizing security efforts is essential in a data-heavy environment, and this episode examines how to focus on intelligence that truly changes attacker behavior usi...

Episode 43 — Spaced Retrieval: Threat Frameworks Recap Through Rapid Adversary Story Prompts

This high-intensity spaced retrieval session focuses on fusing various threat frameworks into a single, cohesive narrative that you can recall quickly under pressure. ...

Episode 44 — Build a Defensive Technologies Stack from Logs, Telemetry, and Alerts

Building a manageable defense requires a clear visibility stack, and this episode explores the roles of logs, telemetry, and alerts in creating a measurable security p...

Episode 45 — Work Smarter with SIEM Correlation and Scalable Alert Triage Workflows

This episode deconstructs how to work smarter by utilizing Security Information and Event Management (S I E M) correlation and scalable triage workflows to reduce aler...

Episode 46 — Understand EDR and NDR Visibility for Defensive Technologies and Emerging Intelligence

Deep visibility into both hosts and networks is critical for modern defense, and this episode examines the unique roles of E D R and N D R in the technology stack. We ...

Episode 47 — Leverage Automation and AI in Defense While Avoiding Dangerous Overtrust

In this episode, we focus on leveraging automation and A I to scale your defense while maintaining the professional judgment needed to avoid dangerous overtrust. We de...

Episode 48 — Spaced Retrieval: Defensive Technologies Recall and Triage Decision Practice

This spaced retrieval session is designed to turn your defensive tools into instincts through rapid recall and practical triage decision practice. We move through spok...

Episode 49 — Identify Privilege Escalation and Credential Theft in Post-Exploitation Techniques

Recognizing how attackers expand control after an initial entry is a primary focus of this episode on privilege escalation and credential theft. We define privilege es...

Episode 50 — Trace Lateral Movement and Internal Discovery in Advanced Threat Techniques

In this episode, we trace the methodical patterns of lateral movement and internal discovery used by advanced threat actors to navigate your network. We define lateral...

Episode 51 — Understand Command and Control and Living Off the Land Stealth

This episode explores how attackers maintain a persistent connection to compromised systems while evading traditional detection through command and control (C2) channe...

Episode 52 — Recognize Data Exfiltration Patterns and Advanced Threat Techniques at Scale

Data exfiltration represents the final, often most damaging stage of a cyber attack, and this episode focuses on recognizing the technical patterns associated with una...

Episode 53 — Spaced Retrieval: Post-Exploitation Tactics and Detection Cues Rapid Review

This high-intensity spaced retrieval session reinforces the post-exploitation story, ensuring you can rapidly recognize signs of escalation, lateral movement, and data...

Episode 54 — Adopt the Shared Responsibility Mindset for Securing Connected and Cloud-Based Environments

Securing modern cloud and connected environments requires a clear understanding of the shared responsibility model, which divides security duties between the service p...

Episode 55 — Harden Cloud Identity, Keys, and Access Guardrails for Data Protection

In the cloud, identity is the new perimeter, and this episode focuses on hardening cloud access by securing identities, keys, and implementing automated guardrails. We...

Episode 56 — Secure Data in Cloud Storage and SaaS Workflows Without Losing Control

This episode examines how to maintain control over organization data within cloud storage and Software as a Service (SaaS) workflows. We explain that cloud storage ris...

Episode 57 — Reduce Connected Device and IoT Risk Through Isolation, Updates, and Monitoring

The Internet of Things (IoT) represents a significant expansion of the attack surface, and this episode focuses on reducing the risks associated with these often unman...

Episode 58 — Identify Fundamental Web Security Risks in Security Foundations and Awareness

Many modern cyber attacks begin within the browser, making the identification of fundamental web security risks a vital professional skill. This episode explains web r...

Episode 59 — Coordinate Security Roles to Strengthen Organizational Posture and Shared Accountability

Improving security outcomes requires knowing exactly who is responsible for specific tasks across the enterprise, and this episode focuses on coordinating security rol...

Episode 60 — Build Security Awareness Habits that Reduce Real Risk Across Teams

Building security awareness is about changing routine behaviors to reduce avoidable mistakes and organizational exposures. This episode explains awareness not as a one...

Broadcast by