Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
Introduction
00:00 • 2min
Paul Asadorian on Darth Vader
01:43 • 1min
Cryptocurrencies and the Ukraine
03:12 • 2min
How I Got Into Information Security
05:33 • 2min
Trusted Sec's Journey
07:45 • 2min
C2: A Public Profile
09:57 • 2min
Microsoft's Early Years in Detecting Social Media Attacks
11:36 • 1min
The Advantages of Internal Frameworks for EDR
13:04 • 2min
The Internal Joke at the Company
14:41 • 2min
The Importance of Blending In
16:26 • 2min
The Importance of C2 in Pentesting
17:59 • 2min
The Importance of Internal Frameworks in Defensive Operations
19:45 • 3min
The Future of Networking Devices
22:31 • 2min
The Future of Trust the Sex
24:02 • 2min
The Difference Between the Private Sector and the Government Sector
26:31 • 2min
Sysmon for Linux: How to Track Network Connections and Processes
28:40 • 2min
The Importance of Open Source Software
30:44 • 2min
The Importance of Having a SOC Team on Twitter
32:51 • 2min
The Importance of Pen Tests
34:39 • 3min
How to Define a Trusted Set for Your Salespeople
37:14 • 3min
The Nuanced Differences Between Physical and Physical Pen Tests
40:15 • 2min
The Importance of Physical Security
41:54 • 2min
TSMC's IP-Sensitive Design
43:33 • 2min
The Different Types of Pen Testing
45:19 • 2min
How to Get More Organizations to Be Proactive About PCI Compliance
47:12 • 2min
How to Establish a Good Relationship With Management
48:47 • 2min
The North Koreans and the Crypto Industry
50:25 • 2min
The Importance of DC Sync in Decision Country
52:12 • 2min
How to Double My Operational Activity
53:44 • 2min
How to Configure an Event Log in MSDN
55:45 • 2min
How to Protect Yourself From Operator Errors
57:22 • 2min
How to Disable WMI Event Logs
59:14 • 2min
How to Find Gaps in Event Logs
01:01:03 • 2min
The Importance of Copyright Protection
01:02:57 • 2min
How to Detect Registry Changes Inside of WMI Event Channels
01:04:28 • 2min
Security Weekly: A Call-Out Seat for You
01:06:03 • 2min
How to Trust a Vulnerability Scanner
01:08:13 • 2min
PCI 4.0 and the Need for Credentialed Scans
01:10:11 • 2min
The Impact of Local Checks on Nessus
01:12:04 • 2min
The Road Map to PCI Compliance
01:13:51 • 3min
The FDA's S Bomb Mandate Changed the Game for Open Source Software Security
01:16:37 • 2min
The Unintended Consequences of the EU AI Act
01:18:15 • 2min
The Limits of Medical Devices
01:20:00 • 1min
The Difference Between a Rock and Hardware That Has No Firmware
01:21:30 • 2min
The FDA's Role in Cyber Security
01:23:20 • 2min
The Seed Bill of Materials for Open Source Software
01:25:06 • 1min
How to Use Chat GPT to Summarize YouTube Videos
01:26:36 • 2min
S-Bomb: A Process Problem
01:28:29 • 2min
How to Build an Open Source Process That Is Ready for Production
01:30:00 • 2min
The Importance of Code Review
01:31:38 • 2min
How AI Maps Software
01:33:27 • 3min
The Future of Two Factor Authentication
01:36:30 • 2min
The Benefits of Duo
01:38:23 • 2min
The Importance of Two Factor Authentication
01:39:54 • 2min
The Importance of Biometrics in Authentication
01:41:37 • 2min
The Difference Between Authentication and Authorization
01:43:25 • 2min
The Difference Between Identity Access Management and Authentication
01:45:00 • 2min
The Problem With Proof of Record of Humans
01:46:36 • 2min
The Importance of Security Numbers
01:48:13 • 2min
The Cost of Biometrics
01:50:20 • 2min
The SISA Directive and the FTP and Telnet Mandate
01:52:04 • 2min
The Role of Telnet in Tax Surface Monitoring
01:54:06 • 2min
The Problems With CMMC's Telnet Standards
01:56:09 • 2min
The Importance of Self-Assessment
01:57:40 • 2min
The Joker Spy Back Door
01:59:22 • 2min
The Problem With the Japanese Cryptocurrency Exchange
02:01:44 • 2min
The Importance of Cryptocurrency in the Workplace
02:03:25 • 2min
Cryptocurrency and Money
02:05:12 • 2min
The Future of Cryptocurrency
02:06:47 • 2min
The Advantages of Cryptocurrency
02:08:19 • 2min
How to Use Cryptocurrency to Transfer Value From Business to Business
02:10:07 • 2min
The NSA's Black Lotus Mitigation Guides
02:11:44 • 4min
How to Remove a Certificate From the Operating System
02:15:32 • 2min
The Impacts of Key Leaks on the Intel Boot Process
02:17:12 • 2min
The TPM and the Key Leak
02:18:44 • 3min
The Unimpressive Bug in EDK2
02:21:35 • 2min
The SEC's Wells Notice to Solar Winds
02:23:22 • 2min
SZA's Response to the 2020 Attack on the Company's Infrastructure
02:24:53 • 2min
The Vulnerability of SolarWinds
02:26:44 • 2min
The SolarWinds Supply Chain Breach
02:28:17 • 2min
The Impact of Insider Trading on CISOs
02:29:59 • 2min
The Importance of Initial Disclosure
02:32:17 • 2min
The Importance of Process in Security Investigations
02:34:08 • 2min
The Crossover Between PCI and the Card Industry
02:35:55 • 3min
The Differences Between Electra and Smart Thermostats
02:38:37 • 3min
MQTT: The Standard for IoT Messaging
02:41:32 • 2min
The Role of HTTP in IoT Devices
02:43:13 • 2min
Telnet and FTP: A Human Supply Chain
02:44:56 • 2min
The Importance of Wi-Fi in a Two Zone System
02:46:38 • 2min
The Importance of Usability in Device Security
02:48:12 • 3min


