エピソード

  • The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada
    2025/09/10

    The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada

    Learning, Listening, and Leading in Cybersecurity

    In this episode of the Security by Default podcast, host Joe Carson speaks with Zaira Pirzada, managing partner of Infinitus Management Consulting. They discuss Zaira's journey into cybersecurity, the importance of open source intelligence, and the lessons learned from her time at Gartner. Together, they delve into the intricate world of cybersecurity marketing, exploring the unique challenges faced by CMOs in this dynamic industry. From the perception of marketing as a cost center to the complexities of standing out in a crowded market, Zaira shares her insights on navigating these hurdles. Tune in to discover how effective storytelling, data-driven strategies, and a deep understanding of market dynamics can transform cybersecurity marketing efforts. The conversation also covers the significance of unique value propositions, and the evolving landscape of cybersecurity vendors. Zaira emphasizes the role of data in decision-making and the need for continuous learning in a rapidly changing field.

    #Cybersecurity #MarketingChallenges #Podcast

    Takeaways

    • Zaira Pirzada's journey into cybersecurity was unintentional but evolved into a passion.
    • Open source intelligence (OSINT) played a crucial role in Zaira's early career.
    • Listening and learning from others is vital in the cybersecurity industry.
    • The transition from analyst to CMO involves understanding market dynamics and customer needs.
    • Unique value propositions are essential for startups to stand out in a crowded market.
    • Data is a key asset in cybersecurity, influencing decision-making and strategy.
    • Building trust and reliability is crucial in cybersecurity communications.
    • Negotiation in cybersecurity is evolving with the introduction of AI and data valuation.
    • Education and knowledge sharing are fundamental to success in the cybersecurity community.
    • Continuous learning is necessary to keep up with the fast-paced changes in the industry.


    Chapters

    • 00:00 Introduction to Cybersecurity Journeys
    • 02:58 The Path to Cybersecurity: Education and Early Experiences
    • 06:04 The Role of Open Source Intelligence in Cybersecurity
    • 09:09 The Evolution of Cybersecurity Careers
    • 11:59 Lessons from Gartner: Listening and Learning
    • 14:44 The Transition to CMO: Marketing in Cybersecurity
    • 17:48 The Importance of Unique Value Propositions
    • 20:51 Navigating the Cybersecurity Vendor Landscape
    • 23:59 The Role of Data in Cybersecurity
    • 26:50 Staying Updated in a Rapidly Changing Field
    • 29:41 Conclusion and Future Directions

    続きを読む 一部表示
    51 分
  • From Chaos to Clarity: A Cybersecurity Journey with Secretary Harry Coker Jr.
    2025/08/27

    In this episode of the Security by Default podcast, host Joe Carson speaks with Secretary Harry Coker Jr. about his journey into cybersecurity, the importance of mentorship, and the challenges faced in leadership roles. They discuss the evolving role of AI in government and cybersecurity, the significance of resilience in the face of failures, and personal interests that help them unplug from their busy lives. The conversation emphasizes the need for clarity in chaos and the importance of learning from every experience.

    Takeaways

    • Bringing clarity to chaos is essential for success.
    • Mentorship plays a crucial role in career development.
    • Every day in leadership presents new challenges and opportunities.
    • Learning from both successes and failures is vital.
    • Trust but verify is a key principle in leadership.
    • AI is transforming government operations and cybersecurity.
    • Cyber resilience is becoming more important than ever.
    • Personal interests help leaders to unplug and recharge.
    • Success is often shared, while failure is solitary.
    • The human element must remain in AI decision-making.

    Chapters

    00:00 Introduction to Cybersecurity and Personal Journeys

    06:05 The Importance of Mentorship and Teamwork

    11:48 A Day in the Life of a Cybersecurity Leader

    17:51 Lessons Learned from Challenges and Failures

    21:53 The Impact of AI on Cybersecurity and Governance

    29:42 Personal Interests and Unplugging from Work

    Resources

    The following books and resources were mentioned:

    1. "Character" by retired U.S. Army General Stan McChrystal - Harry Coker mentioned he started reading this book and found it insightful, particularly about self-awareness and challenging oneself.
    2. "The Power of Now" - Joseph Carson mentioned this book as one he was recommended to read and was working towards.

    続きを読む 一部表示
    37 分
  • Special Episode with Mikko Hyppönen: From Malware to Drones – A Black Hat Farewell
    2025/08/14

    In this special edition episode of the Security by Default podcast, Mikko discusses his extensive career in cybersecurity, his transition to a new role in drone defense, and the innovative Museum of Malware that showcases the intersection of art and cybersecurity. He reflects on his journey, memorable experiences, and the importance of storytelling in engaging audiences

    Takeaways

    • Mikko's alternative career choice was journalism.
    • He started in programming and transitioned to cybersecurity.
    • Keynote speaking at Black Hat involves storytelling.
    • Experience reduces anxiety in public speaking.
    • The Omega virus was Mikko's first memorable malware.
    • The Museum of Malware archives the history of cyber threats.
    • The museum features art inspired by malware and cyberattacks.
    • Mikko is transitioning to a drone defense company.
    • He sees parallels between cybersecurity and drone defense.
    • Mikko expresses gratitude for his 34 years in the cybersecurity industry.

    Resources:

    https://www.withsecure.com/en/experiences/museum-of-malware-art

    続きを読む 一部表示
    10 分
  • Exploring Machine Identities in Cybersecurity with Evandro
    2025/08/13

    In this episode of the Security by Default podcast, Joseph Carson and Evandro Goncalves discuss the critical topic of machine identities also known as non-human identities (NHI), exploring their definitions, challenges, and best practices for management. They delve into the complexities of managing non-human identities in cybersecurity, emphasizing the importance of visibility, risk management, and the principle of least privilege.

    The conversation also highlights experiences from the NATO Lock Shield event, showcasing the real-world implications of identity security. Evandro shares insights on staying updated in the cybersecurity field and the importance of hands-on learning.

    Takeaways

    • The podcast aims to make security accessible to everyone.
    • Machine identities are non-interactive identities used in IT environments.
    • Organizations may have up to 80 machine identities for every human identity.
    • Visibility and management of machine identities are significant challenges.
    • Over-privileged accounts are a common issue in organizations.
    • Applying the principle of least privilege is crucial for security.
    • Communication and coordination are vital during cybersecurity events.
    • Hands-on experience and laboratories are effective for learning new technologies.
    • Staying updated with threat reports is essential for cybersecurity professionals.
    • Networking through platforms like LinkedIn is beneficial for knowledge sharing.

    Keywords

    machine identities, cybersecurity, identity security,

    non-human identities, security management, best practices, NATO Lock Shield,

    visibility, risk management, zero trust

    続きを読む 一部表示
    40 分
  • From Hacker to Hero: Hieu Minh Ngo's Journey
    2025/07/30

    In this episode of the Security by Default podcast, host Joe Carson interviews Hieu Minh Ngo, a former cyber-criminal turned cybersecurity advocate. Hieu shares his journey from a curious teenager in Vietnam to a successful hacker, his time in prison, and his eventual redemption as he now works to help others avoid the pitfalls he faced. He discusses the importance of honesty, mentorship, and using one's skills for good, emphasizing the need for awareness in cybersecurity and the potential for change in the lives of young hackers.

    Takeaways

    • Hieu Minh Ngo transitioned from a cyber-criminal to a cybersecurity advocate.
    • His journey began with curiosity about computers and the internet.
    • He faced severe consequences for his hacking activities, including imprisonment.
    • Prison became a time for self-reflection and personal growth for Hieu.
    • He emphasizes the importance of being honest with oneself.
    • After prison, he was recruited by the Vietnamese government for cybersecurity work.
    • Hieu now mentor’s young hackers to use their skills for good.
    • He believes in the power of community and positive influences.
    • Hieu encourages young hackers to participate in bug bounty programs.
    • He stresses that good things will happen when you do the right thing.

    Chapters

    • 00:00 Introduction to Cybercrime and Transformation
    • 11:56 The Journey from Hacking to Cybersecurity
    • 23:48 The Dark Web and Identity Theft
    • 29:46 Finding Purpose in Prison
    • 31:41 The Journey to Redemption
    • 35:59 Consequences and Redemption
    • 37:27 Life After Prison: A New Beginning
    • 42:31 Using Skills for Good
    • 49:23 Awards and Recognition
    • 51:22 Future Aspirations and Mentorship

    続きを読む 一部表示
    49 分
  • Understanding Identity Threats in Cybersecurity with Filipi Pires
    2025/07/16

    In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.

    Takeaways

    • Identity is a central theme in cybersecurity.
    • Misconfiguration is a leading cause of security issues.
    • Continuous learning is essential in the cybersecurity field.
    • Tools should be used to understand techniques, not just for their own sake.
    • Community engagement is vital for knowledge sharing.
    • Phishing remains a simple yet effective attack method.
    • Legacy software poses significant risks to organizations.
    • Observability is crucial for effective security management.
    • Respecting the journey in cybersecurity is important for growth.

    Chapters

    • 00:00 Introduction to Cybersecurity Journey
    • 02:49 Exploring Cybersecurity Research and Trends
    • 05:32 Tools and Techniques in Cybersecurity Research
    • 08:34 Learning Through Capture The Flag Events
    • 11:28 Identity Threats and Misconfigurations
    • 14:16 Legacy Systems and Their Impact on Security
    • 25:40 Understanding Use Cases in Security Permissions
    • 27:36 The Principle of Least Privilege
    • 29:31 The Complexity of Identity Management
    • 30:28 Challenges in Observability and Access Control
    • 32:16 Navigating Multi-Cloud Permissions
    • 34:07 Tools for Enhancing Security Visibility
    • 36:14 Continuous Learning in Cybersecurity
    • 41:53 Community Engagement and Knowledge Sharing
    • 45:32 Respecting the Journey in Cybersecurity

    続きを読む 一部表示
    48 分
  • Evolution of Identity Governance in Modern Organizations with Martin Sandren
    2025/06/18

    In this conversation, Joseph Carson and Martin Sandren delve into the evolving landscape of Identity Governance and Access Management (IGA). They discuss the significance of IGA in modern organizations, the challenges faced, and the impact of cloud solutions and AI on identity management. The conversation highlights the need for contextual and adaptive policies, the importance of interoperability, and the role of community engagement through conferences to stay updated in this rapidly changing field.

    Key Takeaways

    • IGA is essential for managing access and compliance in organizations.
    • The shift to cloud-based IGA solutions has transformed the landscape.
    • Contextual and adaptive policies are becoming the norm in identity management.
    • AI is playing a crucial role in enhancing identity governance.
    • Interoperability between systems is a significant challenge.
    • Phishing attacks are increasingly sophisticated due to AI advancements.
    • Zero trust principles emphasize reducing friction in access management.
    • Shadow IT and shadow AI pose risks to organizational security.
    • The signal-to-noise ratio in ITDR systems is a major concern.
    • Engagement in conferences and communities is vital for professional growth in IGA.

    Chapters

    • 00:00 Introduction to Identity Governance and Administration
    • 01:43 Understanding IGA vs. IAM
    • 04:02 Challenges and Shortcomings of IGA
    • 10:05 The Role of IGA in Modern Organizations
    • 17:20 Modernizing IGA: Cloud Solutions and Innovations
    • 19:07 The Acceleration of Cloud Adoption
    • 21:01 Evolving Identity Management Landscape
    • 22:53 AI's Role in Identity Governance
    • 24:41 Managing Non-Human Identities
    • 26:05 The Rise of Shadow IT and AI
    • 28:37 Future of AI in Identity Management
    • 30:35 Staying Updated in a Rapidly Changing Field

    Resources:

    Join an IdentiBeer meetup near you

    https://identi.beer/

    続きを読む 一部表示
    35 分