Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 3min
How to Stay Current in the Cyber Security Industry
02:58 • 2min
How to Start a Conversation With Someone With a Hashtag
04:37 • 4min
The Importance of a Plan for Information Security
08:07 • 2min
Anti-Cyphon Training
09:41 • 3min
How to Troubleshoot a Missing Input Device
12:51 • 3min
The DARPA Led Initiative at Black Hat
15:50 • 6min
The Uncrackable Encryption Algorithm
21:29 • 4min
Android 14 Security Fixed Award of 2G Attacks
25:32 • 5min
The Impact of Encryption Keys on the CPU Core
30:15 • 3min
How to Be a Successful Cyber Security Streamer
33:15 • 5min
The Consolidation of Health Care Businesses
38:23 • 4min
The Importance of Phishing as a Service Platform
42:46 • 4min
The Importance of Data Classification
46:54 • 4min
Epic's Fortnite and Apple's Antitrust Case
50:27 • 3min
The Legend of VIM
53:31 • 2min
The Simply Cyber Daily Cyber Threat Brief
55:59 • 6min
How Much Cash Should I Save for Black Hat and Defcon?
01:01:39 • 3min
How to Enter a Cyber Role
01:04:38 • 3min
The Importance of Being a GRC Analyst
01:07:20 • 4min
How to Avoid Pushy Recruiters
01:11:37 • 4min
Daedri Diamond's Green Tea
01:15:56 • 2min
The Green Drink That From Day to Day, Diamond
01:18:20 • 2min
How to Jawjack in Vegas
01:20:39 • 2min
How to Get Interviews More Consistently for CISO Roles Without Prior Experience With That Title Specifically
01:22:39 • 3min
The Implications of AI for SOC Teams
01:25:35 • 4min


