PLAY PODCASTS
401 Access Denied

401 Access Denied

263 episodes — Page 3 of 6

Ep 51401 Access Denied Podcast Ep. 51 | Privilege Escalation Using HackTricks with Carlos Polop

In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS). Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws. Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.Check out Carlos' book: https://book.hacktricks.xyz/ Follow Carlos on GitHub & submit pull requests: https://github.com/carlospolop Join Carlos' Discord community: https://discord.gg/hRep4RUj7f Follow Carlos on Twitter: https://twitter.com/carlospolopm Connect with Delinea:Delinea WebsiteDelineaLinkedInDelinea TwitterDelinea FacebookDelinea YouTube

Mar 24, 202249 min

Ep 50401 Access Denied Podcast Ep. 50 | The State of Global Information Wars with Dan Lohrmann

As cybersecurity teams seek to enhance their defenses in the wake of worldwide ransomware attacks and the spread of wiper malware in Ukraine, what predictions can we make about the evolution of global information wars? Acclaimed security leader and Field CISO at Presidio, Dan Lohrmann, discusses emerging trends in cyber insurance, cyber incident reporting, and incident response planning. Learn more about the potential impact of the Shields Up advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Amidst growing risk and uncertainty, hear Dan's advice on how you can develop best practices for training and preparing your security team.Connect with Dan!~ LinkedIn ~ Twitter Check out Dan's Book: ~Cyber Mayday and the Day After Read Dan's Blog Post on Cyber Insurance: ~Where Next for Government in the Cyber Insurance Market? Read More on Cybersecurity and the Invasion of Ukraine:~What the Newly Signed US Cyber-Incident Law Means for Security ~‘For the first time in history anyone can join a war’: Volunteers join Russia-Ukraine cyber fight Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedIn

Mar 23, 202246 min

Analyzing Cyberattacks in Ukraine with Secureworks | The Cybrary Podcast Ep. 80

During unprecedented times when cyber and kinetic military actions coalesce, what can we learn about the evolving nature of warfare? Mike McLellan and Rafe Pilling join us from the Counter Threat Unit at Secureworks to discuss the latest cyberattacks in Ukraine. What is distinctive about these emergent types of wiper malware, and how can we better discern the objectives of threat actors? Get advice from the security research experts about how your organization can enhance defenses and incident response planning in the face of new threats. Read more about this subject in our blog post: ~Cyberwarfare: Evolution and Impact on the Russia-Ukraine Conflict Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Mar 16, 202244 min

Ep 49401 Access Denied Podcast Ep. 49 | Getting Smart About Security Awareness Training with Paula Januszkiewicz

In just the first half of 2021, the financial industry saw a 1,318% in ransomware attacks. How can knowledge of ransomware gangs' encryption strategies help employees at every level of an organization to develop stronger incident response plans? Paula Januszkiewicz, acclaimed security leader, pen tester, and CQURE CEO, offers practical guidance on inclusive approaches to security awareness training. As the threat landscape evolves alongside new technological innovations, questions emerge about how we need to rethink password protection, privilege access, and at-home security. Enjoy this thought-provoking conversation about the value of curiosity and teamwork in forward-thinking security strategy development.Connect with Paula!~ LinkedIn~ TwitterFollow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedIn

Mar 9, 202255 min

Adventures in Red Teaming with Matt Mullins | The Cybrary Podcast Ep. 79

Come on over to the dark side with Matt Mullins, the red teamer and penetration tester who is here to help you think like an adversary. Cybrary Course Manager Jenn Barnabee talks with Matt about his Cybrary courses that teach you how to exploit and mitigate the latest critical vulnerabilities, including Log4j, HiveNightmare, and more. Considering a path forward in offensive security? Then you'll love hearing about how Matt's career aspirations evolved from Buddhism studies to the "Help Desk Farm" to penetration testing. From zen to ZAP, he has a lot to share about taking risks and learning new tools! Enroll now in Matt's Cybrary courses! ~CVE Series: Log4j (CVE-2021-44228) ~CVE Series: HiveNightmare (CVE-2021-36934) ~CVE Series: InstallerFileTakeOver (CVE-2021-41379) ~CVE Series: MSHTML Vulnerability (CVE-2021-40444) ~Cybrary's MITRE ATT&CK TTP Course: SSH Authorized Keys Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Mar 2, 202226 min

Ep 48401 Access Denied Podcast Ep. 48 | IoT Hacking with Beau Woods and Paulino Calderon

How can we improve the security of life-saving medical, communications, and transportation devices? What hands-on skills do we need in order to design more trustworthy hardware? In this episode of 401 Access Denied, InfoSec veterans Beau Woods and Paulino Calderon discuss key tips from their informative book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things." If you enjoy working with your hands and breaking things, then you'll want to hear Beau and Paulino's tips for how to kick off a dynamic, fulfilling career in IoT security. Learn more about why accessibility and collaboration are essential to improving the way that humans interact with, trust, and benefit from technological devices. Check out Beau and Paulino's book!~"Practical IoT Hacking" Connect with Beau and Paulino on social media~Beau's Twitter~Beau's LinkedIn~Paulino's Twitter~Paulino's LinkedInJoin the IoT Village Discord server~IoT Village~#practical-iot-hacking ChannelFollow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedIn 

Feb 23, 202256 min

Mitigating Polkit CVE-2021-4034 with CyDefe | The Cybrary Podcast Ep. 78

Ready to defend your organization against the widespread PolicyKit vulnerability that experts are comparing to the Log4j flaw? In this episode of the Cybrary Podcast, Raymond Evans, CEO of CyDefe Labs, discusses his latest Cybrary course on Polkit CVE-2021-4034. By exploiting this flaw, just how easy is it to gain root access on a target system? What can we learn from this vulnerability about the value of penetration testers and open-source software? Find out in this podcast and in Ray's course! Enroll now in Ray's newest course! ~CVE Series: Polkit (CVE-2021-4034) Learn more about Cybrary's partnership with CyDefe: ~https://www.cybrary.it/catalog/vendor/cydefe/ Follow CyDefe Labs on Social Media! ~Twitter Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Feb 16, 202238 min

Ep 47401 Access Denied Podcast Ep. 47 | Cybersecurity Conference Survival Tips with Chris Roberts

Whether you’re new to cybersecurity or a longtime security professional, one of your best opportunities to network is at conferences. In this fun-filled episode of 401 Access Denied, seasoned conference-goers, Joe Carson and HillBilly Hit Squad’s vCISO (aka “Chief Geek”), Chris Roberts, share their insights on how to make the most of networking events. What clothes should you pack? How can you best plan your daily schedule so that you maximize productivity and have time to socialize? And, most importantly, where in the world can you find the best whiskey? Cheers to a new year filled with engaging, informative cybersecurity events!Connect with Chris on social media!~LinkedIn ~Twitter Follow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Feb 9, 202250 min

Leaping into Quantum Security with Aegiq | The Cybrary Podcast Ep. 77

The next revolution in quantum computing and technologies is happening now, but how exactly will these growing innovations affect our lives? Dr. Maksym Sich, CEO of the groundbreaking quantum photonics startup, Aegiq, discusses how quantum will impact our medical, communications, and financial industries. Addressing the myth that quantum computing will break all our encryption keys, Maksym elaborates on quantum communications, post-quantum cryptography, and efforts to develop sustainable solutions with security by design. Be ahead of the curve in knowing how we will want to upgrade our systems to improve efficiency, data privacy, and more! Learn more about Maksym's startup, Aegiq: ~Company Website For more information on Quantum Computing: ~Quantum Manifesto ~Quantum Technologies - Blackett Review ~Quantum Comms Hub, "What does QKD mean for the Economy?" ~Report from the QED-C, "Guide to a Quantum Safe Organization" ~Downloadable Report from the QED-C Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Feb 2, 202251 min

Ep 46401 Access Denied Podcast Ep. 46 | Fighting Cybercrime & Tracking Malware Trends with Shyam Sundar Ramaswami

Everyone is talking about malware these days, but what new developments and trends are we seeing in malware attacks? This week’s featured guest is Shyam Sundar Ramaswami—Senior Research Scientist at Cisco by day, and the Batman of Hacking by night. So how does cybersecurity’s Bruce Wayne propose that we strengthen our incident response plans against emerging malware threats? What’s really happening when we click that inconspicuous link in the “Delivery Address Confirmation Needed” email? Find out the answers to these questions from the ethical hacker hero who’s here to help you save the world from cyberattacks!Read Shyam's Book!~"It's Your Digital Life" - https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041Check out Shyam’s TED Talks~Can a Couch Potato Save the Digital World? | Shyam Sundar Ramaswami | TEDxIIITBangalore - https://youtu.be/VEDF8bQPOeY~Cyber Security - The Responsibility | Shyam Sundar Ramaswami | TEDxBITSathy - https://youtu.be/D4wJMjDhUBwFollow Shyam on social media!~Twitter ~LinkedIn Follow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Jan 26, 202256 min

From the WWE to Cybersecurity with Cybrary Instructor Corey Holzer | The Cybrary Podcast Ep. 76

How did Cybrary instructor Corey Holzer go from being the IT help desk person for the World Wrestling Federation to becoming a PhD-holding Information Security Manager? In this episode of the Cybrary podcast, please enjoy Corey’s fascinating stories of nearly colliding with the Undertaker, losing his internet connection during the CRISC exam, and developing essential problem-solving skills as a cybersecurity professional. Get a behind-the-scenes look at Corey’s newest course, Linux Hardening—out now on the Cybrary platform! Connect with Corey: ~LinkedIn Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Jan 19, 202243 min

Ep 45401 Access Denied Podcast Ep. 45 | Establishing Multinational Cyber Partners in NATO CCDCOE with Jaak Tarien

The 2007 cyberattacks on Estonia culminated into a watershed moment in global cybersecurity awareness. Jaak Tarien, Director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, discusses the geopolitical concerns of cybercrime. Ransomware attacks can have a significant economic impact, but how are cybercrime operations also indicative of a breach of sovereignty? To best approach this question, Jaak emphasizes the importance of the CCDCOE's legal scholarship, such as the Tallinn Manual, among other efforts that foster transparent multinational cybersecurity communications, research, and training.Check out the following resources for more information on the CCDCOE:~Official CCDCOE Website: https://ccdcoe.org/~Tallinn Manual: https://ccdcoe.org/research/tallinn-manual/~Locked Shields 2021: https://youtu.be/oHmVjwKi1P8Follow Joe on Twitter!~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Jan 12, 202241 min

Ep 44401 Access Denied Podcast Ep. 44 | Cybersecurity Year in Review and 2022 Predictions ​with Art Gilliland

2021 has been quite a year for all of us, but what have we accomplished and learned in the cybersecurity field? We have certainly had to adjust to a global remote work culture and step up our security strategies to take on new challenges involving more specialized cybercrime. Art Gilliland, CEO of ThycoticCentrify, joins our host, Joseph Carson, to reflect on key lessons learned and predictions for 2022. Will Zero Trust become a security norm like Defense in Depth? How could governments get more involved in cryptocurrency regulation efforts? Enjoy this engaging discussion before we kick off the new year!Connect with Art!~LinkedInFollow Joe on Twitter!~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Dec 29, 202154 min

Holiday Break

Welcome back to the Cybrary Podcast, and happy holidays! Whether you are celebrating with family and friends, or simply enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you. As 2021 comes to a close and we look back at all we accomplished this year, despite the circumstances, we raise a glass to you and cheers for making it this far. Thank you for joining us each week to learn something new and continuing to share this journey with us. With your constant support each week, we were able to acheive more than ever before, and the podcast continues to grow in ways we never expected! We can’t help but feel excited for what new opportunities will present themselves in 2022. So, mark you calendars, and stick with us for brand new episodes of the Cybrary Podcast, starting January 19th! If you or someone you know would like to be a guest on the Cybrary Podcast or 401 Access Denied, email us at [email protected]. On behalf of Cybrary, thanks for another great year - and we will see you in 2022! Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Dec 22, 20211 min

Ep 43401 Access Denied Podcast Ep. 43 | Hacking the Game: Cybersecurity Training Meets Esports

Could online gaming be the key to bridging the cybersecurity skills gap? Is enumeration more than a scanner's sport? Ian Austin, Head of Content Innovation at Hack The Box, tackles these questions as he explains why cybersecurity training should be less about checking the boxes and more about thinking outside the box. Hear Ian's thoughts on the global reach of gamified security education and the significance of "purple-minded" cybersecurity initiatives that bring red and blue teams together.Connect with Ian Austin!~LinkedInFollow Joe on Twitter!~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Dec 15, 202141 min

A Veteran's Guide to a Cybersecurity Career Transition with Tim Ramirez | The Cybrary Podcast Ep. 75

Ready to make a career transition from the military to IT? How can veterans effectively communicate transferrable skills that stand out in the competitive cybersecurity industry? Cybrary Insider Pro Community Manager, Tim Ramirez, shares how he started a new career path after serving 12 years in the U.S. Air Force. Learn about how he began a 3-year IT master's program with no IT experience, managed his expectations on the job market, and finally passed the CISSP exam. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Connect with Tim! ~Linkedin Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Dec 8, 202141 min

Ep 42401 Access Denied Podcast Ep. 42 | Adopting Simulation-Based Gamified Cybersecurity Training with JC Vega

When it comes to incident response, “Your plan is worthless, but your planning is priceless.” These wise words from JC Vega, CISO at Devo, highlight the critical difference between having an incident response plan and being incident response ready. In this episode of the 401 podcast, JC explains how unpredictable, engaging simulations can be a game-changer in building an organization’s resilience against critical cyberattacks like ransomware. Find out how your simulation-based training can effectively help your entire organization to build trust and get actively involved in cybersecurity preparedness.Connect with JC!~LinkedInFollow Joe on Twitter!~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Dec 1, 202147 min

Strengthening Cyber Threat Intelligence with MITRE ATT&CK | The Cybrary Podcast Ep. 74

What does it take to be a cyber threat intelligence analyst? How can cyber threat intelligence or CTI training be applied in real-world strategic defense planning and risk management assessment? Cybrary Course Manager Jennifer Barnabee returns to the Cybrary Podcast with two guests from MITRE to discuss the value of CTI teams and their research. Jackie Lasky, Senior Cybersecurity Engineer, and Amy Robertson, Cyber Operations Lead, break down the ways that cyber threat intelligence is used to produce actionable defensive recommendations to any organization. Learn more about why it’s more important than ever for CTI teams to have diverse contributors with both technical and non-technical skillsets. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Nov 24, 202126 min

Ep 41401 Access Denied Podcast Ep. 41 | Unlocking the State of Cybersecurity with Quentyn Taylor

If the security industry is booming, what does this mean for the state of cybersecurity and for humanity at large? Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products. Follow Quentyn's advice to make your organization not only more cyber-aware, but also resilient.Connect with Quentyn!~LinkedIn ~Twitter Follow Joe on Twitter!~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Nov 17, 202150 min

Disrupting the Adversary with MITRE's Threat-Informed Defense Approach | The Cybrary Podcast Ep. 73

How can you build smarter cyber defense strategies that reduce your organization's risk against the threats you care about most? Let the subject-matter experts at MITRE teach you how to disrupt the adversary by employing a threat-informed defense approach. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Enroll now in our FREE MITRE ATT&CK Defender courses! ~MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training ~MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training ~MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training Check out Cybrary Now!!! ~Cybrary Follow Thor on Twitter! ~@thorin_around Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Nov 10, 202137 min

Ep 40401 Access Denied Podcast Ep. 40 | Leveraging Data Science in Security with Kevin Hanes and Jon Ramsey

Cybersecurity is a growing, expansive industry that transcends the fields of technology and even security. How can organizations leverage the critical work of data scientists not only for machine learning automation, but also for diversifying threat detection strategies? In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence, machine learning, and deep learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.Connect with Jon and Kevin on Linkedin!~Jon Ramsey ~Kevin Hanes Follow Joe on Twitter~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Nov 3, 202150 min

Exploring Adversary Emulation with MITRE Cyber Engineer Michael Long | The Cybrary Podcast Ep. 72

Think you've got what it takes to replicate the real-world cyber attacks of threat actors like FIN7? Learn how ethical hackers are putting their skills to the test in MITRE ATT&CK TTP-based adversary emulations. In this episode of the Cybrary Podcast, Cybrary Course Manager Jennifer Barnabee chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you're managing a red team or just getting into ethical hacking, you'll want to hear this discussion about the value of emulating adversaries and simulating malware. Stay tuned for Michael's upcoming MITRE adversary threat emulation course--only on Cybrary! Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary Follow Thor on Twitter! ~@thorin_around Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Oct 27, 202121 min

Ep 39401 Access Denied Podcast Ep. 39 | Breaking Down Zero Trust Security with Dave Lewis

Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship.Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Dave on Social Media!~LinkedIn ~Twitter Follow Joe on Twitter~@joe_carsonFollow us on Social!!~Cybrary Twitter~Thycotic Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Thycotic LinkedIn

Oct 20, 202139 min

How to Confidently Discuss Cyber Skills with Cybrary Mentor Mark Nibert | The Cybrary Podcast Ep. 71

You've got the technicals skills, but how do you explain them to someone? Knowing how to communicate about technology to different audiences is a crucial part of cybersecurity career development. Listen to Chief Cybrary Mentor, Mark Nibert, share his advice on how to tackle your public speaking fears, know when that email should be a meeting, and ask the right questions as you expand your network. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary Connect with Mark! ~ Mark Nibert's Linkedin Mark's Reading List ~"The Ghost in the Wires" by Kevin Mitnick and William L. Simon ~"Talk Like TED" by Carmine Gallo ~"Executive Presence" by Sylvia Ann Hewlett Follow Thor on Twitter! ~@thorin_around Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Oct 13, 202146 min

Ep 38401 Access Denied Podcast Ep. 38 | Password Cracking with Ethical Hacker Dustin Heywood (aka EvilMog)

X-Force Red Hacker Dustin Heywood aka EvilMog joins us during the first week of Cybersecurity Awareness Month to share how to be cyber smart with your passwords. He shares critical steps for protecting passwords and some insight into his world of password hacking.Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Dustin on Social Media!~LinkedIn ~TwitterFollow Joe on Twitter ~@joe_carson Follow us on Social!!~Cybrary Twitter ~Thycotic Twitter ~Instagram ~Facebook ~YouTube ~Cybrary LinkedIn ~Thycotic LinkedIn 

Oct 6, 202147 min

Meet the IT Guy: Chatting with IT Infrastructure Leader Nick Marentic | The Cybrary Podcast Ep. 70

How do you get a cybersecurity job without experience, and how do you gain experience without a job? Our new Cybrary instructor, IT security manager Nick Marentic, delves into this classic chicken-and-egg problem as he shares insightful career advice. Learn how you can break into cybersecurity from any field, as well as hear what it's like to work in an IT management role.Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!!~Cybrary Connect with Nick!~Nick Marentic's LinkedIn Follow Thor on Twitter!~@thorin_around Follow Cybrary on Social!!~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn 

Sep 29, 202146 min

Ep 37401 Access Denied Podcast Ep. 37 | Assessing Cyber Insurance Needs with Resilience

How do we accurately measure and minimize cybersecurity risks? How does cyber insurance fit into the risk management process? Joseph Carson, Chief Security Scientist at Thycotic, discusses these questions and more with members of the Resilience cyber insurance company, including Ann Irvine, Chief Data Scientist, and Kevin McGowan, VP of Cyber Underwriting. Learn about how insurance companies like Resilience work with organizations to find the best solutions to offset critical risks.Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson Follow us on Social!!~Cybrary Twitter ~Thycotic Twitter ~Instagram ~Facebook ~YouTube ~Cybrary LinkedIn ~Thycotic LinkedIn 

Sep 22, 202154 min

A Humanizing Approach to Passing the CISSP Exam with Kelly Handerhan | The Cybrary Podcast Ep. 69

When your instructor is the legendary Kelly Handerhan, you know you're going to pass the CISSP exam and actually enjoy studying for it. As humans become more technical, Kelly humanizes the technical world so that you can better relate to the subject matter. In this episode of the Cybrary Podcast, Kelly shares what's new in the updated CISSP exam and offers tips for how you can prepare. Hear more of her timeless stories in her new and improved CISSP course on the Cybrary platform! Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!!~Cybrary Follow Cybrary on Social!!~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn 

Sep 15, 202124 min

Ep 36401 Access Denied Podcast Ep. 36 | Prepping for Operational Technology Risks with Jon Ramsey and Juan Espinosa

If you've ever closed your garage door or checked your home security camera with a mobile app, then you've relied on a technical communication network of virtual Information Technology and physical Operational Technology devices. This synthesis of IT and OT provides convenient ways for you to secure your home, but your assets are at risk when malicious actors exploit those networks. In this episode of 401 Access Denied, listen to host Joseph Carson, Chief Security Scientist at Thycotic, talk with cybersecurity executives, Jon Ramsey and Juan Espinosa, about the significance of OT risk management and mitigation. Learn how security managers can work with designers, vendors, and compliance officers to prioritize investment in OT security. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson  Follow us on Social!!~Cybrary Twitter  ~Thycotic Twitter  ~Instagram  ~Facebook  ~YouTube  ~Cybrary LinkedIn  ~Thycotic LinkedIn  

Sep 8, 202154 min

Defending the Enterprise with Owen Dubiel | The Cybrary Podcast Ep. 68

Meet our newest Cybrary instructor, Owen Dubiel! Interested in a cybersecurity career, but don't know what to expect? In this episode of the Cybrary podcast, Owen shares what he wishes every intern knew about life in the defensive security space. Using his expertise as an Information Security Engineer, Owen is eager to design Cybrary courses that give entry-level security workers a competitive edge. Learn how he balances his time as an engineer, analyst, and content creator. Plus, hear what a cybersecurity expert really thinks about the accuracy of Mr. Robot and "IT guy" tropes. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Connect with Owen! - Owen's LinkedIn Follow Thor on Twitter! ~@thorin_around&nbsp; Follow us on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~<span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist,...

Sep 1, 202131 min

Ep 35401 Access Denied Podcast Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller

401 Access Denied Ep. 35 | Safeguarding Critical Infrastructure with Ben MillerIn this episode of 401 Access Denied, we're joined by Dragos VP of Services and R&amp;D, Ben Miller to discuss how securing critical infrastructure has changed over the past 10 years, including the convergence of OT and IT, the increase in ransomware attacks, and the need for critical visibility into industrial control systems (ICS).&nbsp;Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!&nbsp;Follow Ben and Dragos on Twitter~@DragosInc&nbsp;~@electricfork&nbsp;Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Aug 25, 202155 min

Demystifying the Dark Web to Entering Ethical Hacking with Clint Kehr | The Cybrary Podcast Ep. 67

Ever wondered what it was really like to be a hacker? Is there more to Dark Web policing than meets the eye? Ethical hacker and Cybrary instructor Clint Kehr tells the story of his law enforcement career transition from the streets to the web. Gain insights from the conversation on "failing up," networking, and mentoring in the cybersecurity industry. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Check out Clint's Course on Cybrary ~Offensive Pen Testing&nbsp; Connect with Clint ~Clint's LinkedIn&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow us on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;

Aug 18, 202137 min

Ep 34401 Access Denied Podcast Ep. 34 | Analyzing Verizon&apos;s Data Breach Investigations Report

In this episode, Joseph Carson and Jonathan Meyers discuss the 2021 Verizon Data Breach Investigations Report and its findings. We cover how the threat landscape has changed in the past year and why there's been an increase in the number of cyberattacks. Hear what the experts say you can do to balance security and productivity. Plus, the top-cited causes of data breaches.&nbsp;&nbsp;Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~https://twitter.com/joe_carsonFollow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Aug 11, 202155 min

How to Succeed in Cybersecurity with Meg West | The Cybrary Podcast Ep. 66

How did Meg West go from a political science degree to an incident response manager career in 3 years? Listen to her story of perseverance and her advice for any of you who want to jump into the dynamic cybersecurity field. We debunk the biggest myths about security work, uncover what it’s really like to be a “woman in tech,” and discuss her growing virality on YouTube as “Cybersecurity Meg.” Follow Cybersec Meg on Social! ~@cybersecmeg ~YouTube Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;&nbsp;

Aug 4, 202125 min

Ep 33401 Access Denied Podcast Ep. 33 | Red Team 101: Offensive Security with Joe Vest

In this episode, Joe Vest joins the 401 Access Denied team to discuss red teaming and pen testing operations and fundamentals. Joe is the author of the original SANS SEC 564 Red Teaming and Threat Emulation course, former technical lead for a DoD red team, and co-author of Red Team Development &amp; Operations. Joe walks us through how to build and run a professional red team, along with the common pitfalls and obstacles most organizations face. Check out Joe's book here: https://redteam.guide/Follow Joe Vest on Twitter: @joevestDon't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Jul 28, 202151 min

Building a Culture of Security with Haekka | The Cybrary Podcast Ep. 65

In this episode, Cybrary's Mike Gruen and Jonathan Meyers sit down with Travis Good and Ryan Rich, co-founders of Haekka, a Security Awareness training company that lives directly in Slack. Travis and Ryan discuss their history in security and ways to keep security training up-to-date with the ever-changing digital landscape. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;&nbsp;

Jul 21, 202142 min

Ep 32401 Access Denied Podcast Ep. 32 | Best Practices on Penetration Testing with Dave Kennedy

In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of Metasploit: The Penetration Testers Guide joins the 401 team to talk about penetration testing. We uncover invaluable lessons from a master in the industry.Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Jul 14, 202158 min

Cybersecurity Exercises and FBI Backdoors | The Cybrary Podcast Ep. 64

In this episode of the Cybrary Podcasts, Cybrary's Jonathan Meyers, along with Michael Weigand and Josh Lospinoso from Shift5, are joined by Dr. TJ O'Connor to discuss their shared experience of army cyber defense exercises. Dr. OConnor also touches on his journey in cybersecurity education and explains his current role as the Cybersecurity Program Chair at Florida Tech, which includes participating in FITSEC defensive and offensive competitions. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;

Jul 7, 202146 min

Ep 31401 Access Denied Podcast Ep. 31 | Ransomware &amp; Critical Infrastructure Q&amp;A with Dan Lohrmann

Recent events confirm that the US’s critical infrastructure and supply chain are very vulnerable to ransomware attacks. What more can and should be done to keep them safe from ransomware? As NATO and the White House announce steps to crack down on bad actors, will it move the needle at all? Dan Lohrmann, CSO of Security Mentor, and formerly of State of Michigan and the NSA, joins the 401 team to discuss.&nbsp;Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Jun 30, 20211h 0m

Finding Your Hope | Go For It with Sarah Moffat Ep. 8

As the first season of Go For It comes to an end, Sarah shares her experience with overcoming mental obstacles such as depression and finding hope amidst an uncertain time. Sarah explains the importance of "thinking everything is rigged in your favor" when your faith is being tested by a difficult, and sometimes abusive, working environment.

Jun 28, 202121 min

Making Security Awareness Fun with Mimecast&apos;s Jann Yogman | The Cybrary Podcast Ep. 63

On this episode of the Cybrary Podcast, Jann Yogman continues the conversation on Mimecast's Security Awareness Training. Jann shares his journey as one of the writers for the training show, including his experience in brainstorm sessions and favorite moments on the set. If the last Cybrary Podcast left you curious about the production process, this podcast episode is for you! Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;&nbsp;

Jun 23, 202159 min

Ep 30401 Access Denied Podcast Ep. 30 | Pen Testing &amp; Incident Response with Pathfynder

There are a lot of myths about what pen testing or red-teaming really are. DJ Fuller, CEO of Pathfynder joins us today to share what companies should expect when they engage a third-party to help them with cyber security and how to establish a good incident response program. Get the low down on the common mistakes that organizations make when hiring a third-party service or choosing to move forward internally.Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!&nbsp;Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Jun 15, 202150 min

Finding Your Path with Jonathan Alboum | Go For It with Sarah Moffat Ep. 7

In this episode of Go For it, Jonathan Alboum joins Sarah to discuss his journey in security, ranging from his former CIO of USDA position to his current work in the government as the Federal CTO of Service Now. Sarah and Jonathan talk about the importance of leaping into new opportunities and ways on handling career transitions.

Jun 14, 202130 min

Drew Freed on His Role as Mimecast&apos;s Human Error | The Cybrary Podcast Ep. 62

In this episode of the Cybrary Podcast Drew Freed, the face behind Mimecast's iconic Human Error character, discusses being approached at his bartending gig for the role as well as his journey within the security education space. Get to know Drew's acting experience, hobbies, favorite movies, and his most memorable moments on the Mimecast set. Want to know how Human Error got his iconic costume? Ever wondered what it's like to get tackled by the Melbourne Rebels rugby team? We discuss it all on the Cybrary Podcast. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~<a...

Jun 9, 202150 min

Ep 29401 Access Denied Podcast Ep. 29 | Helpful or Harmful? The Microsoft Exchange Server Hack &amp; FBI Cleanup with Josh Lospinoso

After the four zero-day vulnerabilities were discovered, the FBI also proactively removed backdoors on numerous private Exchange servers. Was that overreach or the right thing to do? On today's episode, we're joined by Josh Lospinoso, CEO and co-founder of Shift5 and former U.S. Army cyber officer, to discuss law enforcement in cyber security.Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

Jun 2, 202153 min

Transitioning to DevSecOps with Bella Trenkova | The Cybrary Podcast Ep. 61

In this episode of the Cybrary Podcast, Mike Gruen, the CISO at Cybrary, sits down with Bella Trenkova, the Founder of Ardigent Consulting, which offers Agile and DevSecOps services and coaching. Mike and Bella discuss the importance of and the common misconceptions about DevSecOps. They do a deep dive into the nuances of investing in DevSecOps for any company as well as transitioning into a DevSecOps team. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;&nbsp;

May 26, 202148 min

Ep 28401 Access Denied Podcast Ep. 28 | Digital Forensics &amp; Incident Response with Ondrej Krehel of LIFARS

In this episode of 401 Access Denied, we are joined by Ondrej Krehel, CEO and Founder of LIFARS, to discuss Digital Forensics, Incident Response, Ransomware Mitigation, and Cyber Resiliency. Do you know your risks and how to respond if targeted by hackers? We discuss how to be resilient on both a personal and organizational level.Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

May 19, 202151 min

Finding Your Gratitude with Kerry Wekolo | Go For It with Sarah Moffat Ep. 6

On this week's episode, Sarah sits down with Kerry Wekelo, the COO of&nbsp; Actualize Consulting, to discuss the power of gratitude for career development. Using her personal work experience and leadership development expertise, Kerry shares her techniques on nourishing gratitude on a daily basis in order to grow your professional mindset.

May 17, 202125 min

Instructor Spotlight with Nick Moy | The Cybrary Podcast Ep. 60

In this week’s episode of The Cybrary Podcast we are speaking with Nick Moy, renowned Cybrary Instructor and VP of Security Engineering for a mortgage firm. Nick discusses how he began his cyber journey and the courses he teaches on Cybrary. Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! Follow Nick on Twitter and YouTube ~@m0n42ch&nbsp; ~YouTube&nbsp; Check out Cybrary Now!!! ~Cybrary&nbsp; Follow Thor on Twitter! ~@thorin_around&nbsp; Follow Cybrary on Social!! ~Twitter&nbsp; ~Instagram&nbsp; ~FaceBook&nbsp; ~YouTube&nbsp; ~LinkedIn&nbsp;&nbsp;

May 12, 202130 min

Ep 27401 Access Denied Podcast Ep. 27 | 1 Year Anniversary Special: The Making of 401 Access Denied

It’s the special anniversary edition of the 401 Access Denied podcast! In honor of our 1-year anniversary and more than 16,000 listens, Joe and Mike want to take you behind the scenes and introduce you to everyone who works on the podcast and brings it to you biweekly. Listeners, thank you for hanging out with us for 1 magical year. We want to hear your thoughts here. What topics or guest stars matter to you?Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!Follow Joe on Twitter ~@joe_carson&nbsp;Follow us on Social!!~Cybrary Twitter&nbsp;~Thycotic Twitter&nbsp;~Instagram&nbsp;~Facebook&nbsp;~YouTube&nbsp;~Cybrary LinkedIN&nbsp;~Thycotic LinkedIn&nbsp;

May 5, 202149 min