<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/bhis-webcasts" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>BHIS Webcasts</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/bhis-webcasts</itunes:new-feed-url>
    <description>Podcast audio-only versions of weekly webcasts from Black Hills Information Security</description>
    <copyright>© Black Hills Information Security</copyright>
    <podcast:guid>d7087d50-12f3-5e72-af9d-040f7921f47d</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="7009cf9d-3ce4-5dc6-8ada-5fc1dabb887b" feedUrl="https://feeds.transistor.fm/talkin-bout-infosec-news"/>
      <podcast:remoteItem feedGuid="0543e6d6-b875-52ac-bb17-d2b531254cfe" feedUrl="https://feeds.transistor.fm/ai-security-ops"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Fri, 24 Apr 2026 15:56:50 -0400</pubDate>
    <lastBuildDate>Wed, 29 Apr 2026 01:05:34 -0400</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/oQfWIfNInofOUoUcR7od8EubMDeWhpqfwfCWKE2rL2s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTNh/MGZmODJlNTAxNDll/MzljMzAzMjlkM2M1/ZDI2MS5wbmc.jpg</url>
      <title>BHIS Webcasts</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Black Hills Information Security</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/oQfWIfNInofOUoUcR7od8EubMDeWhpqfwfCWKE2rL2s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTNh/MGZmODJlNTAxNDll/MzljMzAzMjlkM2M1/ZDI2MS5wbmc.jpg"/>
    <itunes:summary>Podcast audio-only versions of weekly webcasts from Black Hills Information Security</itunes:summary>
    <itunes:subtitle>Podcast audio-only versions of weekly webcasts from Black Hills Information Security.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Black Hills Information Security</itunes:name>
      <itunes:email>marketing@blackhillsinfosec.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Learning to Trust AI Agents with Automation w/ Ethan and Derek</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Learning to Trust AI Agents with Automation w/ Ethan and Derek</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">93d446a0-5461-446c-819e-e16a507f3d75</guid>
      <link>https://share.transistor.fm/s/08d46b5c</link>
      <description>
        <![CDATA[<p>What if you could safely harness AI agents to automate real work, without spending a dime?</p><p><br>Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why they’re not just for developers, and how to start for free. </p><p>You’ll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf"><strong>https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf<br></strong></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Learning to Trust AI Agents with Automation Ethan and Derek</li>
<li>(01:37) - Background</li>
<li>(05:26) - What is a coding agent?</li>
<li>(11:41) - Pick one and start learning</li>
<li>(12:31) - The Cost of AI</li>
<li>(15:26) - Opencode - Getting Started</li>
<li>(19:26) - Free Models - Never truely free</li>
<li>(22:21) - What can I do here?</li>
<li>(24:40) - Running models locally</li>
<li>(27:33) - Why would I need a coding agent?</li>
<li>(28:00) - Code Agent Examples</li>
<li>(35:48) - Openwork Demo</li>
<li>(38:49) - Ask the agent to help you use it better (Help me help you)</li>
<li>(41:07) - But AI always makes things up</li>
<li>(43:44) - Prompting an LLM</li>
<li>(46:37) - Concepts &amp; Terminology</li>
<li>(49:25) - Context usage</li>
<li>(51:02) - Model Tokein Limits</li>
<li>(55:14) - Guiding an Agent : Best Practices</li>
<li>(57:18) - 80% planning 20% execution</li>
<li>(58:05) - Guardrails for command execution</li>
<li>(01:00:37) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/tom-smith">Tom Smith</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ethan-robish">Ethan Robish</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/william-corbin">William Corbin</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=KObmDor4OTA" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/08d46b5c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if you could safely harness AI agents to automate real work, without spending a dime?</p><p><br>Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why they’re not just for developers, and how to start for free. </p><p>You’ll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf"><strong>https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf<br></strong></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Learning to Trust AI Agents with Automation Ethan and Derek</li>
<li>(01:37) - Background</li>
<li>(05:26) - What is a coding agent?</li>
<li>(11:41) - Pick one and start learning</li>
<li>(12:31) - The Cost of AI</li>
<li>(15:26) - Opencode - Getting Started</li>
<li>(19:26) - Free Models - Never truely free</li>
<li>(22:21) - What can I do here?</li>
<li>(24:40) - Running models locally</li>
<li>(27:33) - Why would I need a coding agent?</li>
<li>(28:00) - Code Agent Examples</li>
<li>(35:48) - Openwork Demo</li>
<li>(38:49) - Ask the agent to help you use it better (Help me help you)</li>
<li>(41:07) - But AI always makes things up</li>
<li>(43:44) - Prompting an LLM</li>
<li>(46:37) - Concepts &amp; Terminology</li>
<li>(49:25) - Context usage</li>
<li>(51:02) - Model Tokein Limits</li>
<li>(55:14) - Guiding an Agent : Best Practices</li>
<li>(57:18) - 80% planning 20% execution</li>
<li>(58:05) - Guardrails for command execution</li>
<li>(01:00:37) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/tom-smith">Tom Smith</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ethan-robish">Ethan Robish</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/william-corbin">William Corbin</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=KObmDor4OTA" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/08d46b5c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Apr 2026 15:50:29 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/08d46b5c/f50c0b5d.mp3" length="83831632" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GbLvxD6AVy7OrU7yUod1nlNbcMo5SgWz7_Oj6Y91U04/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NWEz/ZmRjODAxZWJjNGJl/ZWE0MjFlOWJjZmQ3/ZDZjNC5wbmc.jpg"/>
      <itunes:duration>5063</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if you could safely harness AI agents to automate real work, without spending a dime?</p><p><br>Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why they’re not just for developers, and how to start for free. </p><p>You’ll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf"><strong>https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Mar-26-Learning-to-Trust-AI-Agents-with-Automation-w-Ethan-Robish.pdf<br></strong></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Learning to Trust AI Agents with Automation Ethan and Derek</li>
<li>(01:37) - Background</li>
<li>(05:26) - What is a coding agent?</li>
<li>(11:41) - Pick one and start learning</li>
<li>(12:31) - The Cost of AI</li>
<li>(15:26) - Opencode - Getting Started</li>
<li>(19:26) - Free Models - Never truely free</li>
<li>(22:21) - What can I do here?</li>
<li>(24:40) - Running models locally</li>
<li>(27:33) - Why would I need a coding agent?</li>
<li>(28:00) - Code Agent Examples</li>
<li>(35:48) - Openwork Demo</li>
<li>(38:49) - Ask the agent to help you use it better (Help me help you)</li>
<li>(41:07) - But AI always makes things up</li>
<li>(43:44) - Prompting an LLM</li>
<li>(46:37) - Concepts &amp; Terminology</li>
<li>(49:25) - Context usage</li>
<li>(51:02) - Model Tokein Limits</li>
<li>(55:14) - Guiding an Agent : Best Practices</li>
<li>(57:18) - 80% planning 20% execution</li>
<li>(58:05) - Guardrails for command execution</li>
<li>(01:00:37) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/tom-smith">Tom Smith</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ethan-robish">Ethan Robish</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/william-corbin">William Corbin</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=KObmDor4OTA" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/08d46b5c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/tom-smith/" img="https://img.transistorcdn.com/12nWkYs19paQvHCEIO-1B52mRZINRauVUmtefM4gzrc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kM2Jl/NGUzOGUyZjA0MzQ0/N2IxYzljNjU5OTM1/ZTVmMS5qcGc.jpg">Tom Smith</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/ethan-robish/" img="https://img.transistorcdn.com/HXQAv2X2lVILOBewflc7W8ee_FIPqxdNz-IlkdIAPjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNTQ3/MjlmOGYwYzA3YmQ2/Mzc2NGVlZGYwMDA4/ZGYwMi5qcGc.jpg">Ethan Robish</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/william-corbin/">William Corbin</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/08d46b5c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/08d46b5c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/08d46b5c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/08d46b5c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/08d46b5c/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/08d46b5c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Do it, do it NOW! - A Pre-Incident Checklist w/ Patterson</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Do it, do it NOW! - A Pre-Incident Checklist w/ Patterson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dc6cd8f1-bdef-4040-a231-55aa3a05daa2</guid>
      <link>https://share.transistor.fm/s/aa25dcc1</link>
      <description>
        <![CDATA[<p>Post-incident “lessons learned” are extremely valuable and very, very expensive! </p><p>But you don’t have to wait until “right of boom” to make meaningful improvements to your cybersecurity resilience! <br> <br>Join us for a free one-hour webcast with Patterson Cake from Black Hills Information Security: Do it, do it NOW!! A Pre-Incident Checklist.<br> <br>You’ll learn the top 10 low-effort, high-impact lessons every business should review and fix before a cybersecurity incident.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf</a><strong><br></strong><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Do it, do it NOW! - A Pre-Incident Checklist - Patterson</li>
<li>(06:27) - Presuppositions</li>
<li>(08:28) - In the event of an Emergency...</li>
<li>(10:04) - YOUR INCIDENT RESPONSE PLAN IS USELESS</li>
<li>(12:47) - YOUR CYBER INSURANCE PROVIDER SHOULD NOT BE YOUR ADVERSARY</li>
<li>(15:44) - YOUR LOG DETAIL &amp; RETENTION ARE INADEQUATE</li>
<li>(18:51) - YOUR MOST IMPORTANT ASSET IS __________</li>
<li>(20:48) - IMPLEMENT OUT-OF-BAND COMMS BEFORE CRISIS &amp; TEST REGULARLY</li>
<li>(23:34) - YOUR STAFF ARE AWESOME BUT NOT SUPERHUMAN</li>
<li>(25:45) - EFFECTIVE IR TAKES TRAINING &amp; PRACTICE</li>
<li>(28:04) - YOU MUST HAVE IMMUTABLE BACKUPS</li>
<li>(31:45) - YOU HAVE 0 HOURS TO FIX INTERNET-FACING VULNERABILITIES</li>
<li>(35:11) - THE TWO IR PLAYBOOKS YOU NEED MOST</li>
<li>(43:48) - 10 Things</li>
<li>(50:49) - Q&amp;A</li>
<li>(57:37) - The "Working with BHIS" part</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=jYaMkv56xSk" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aa25dcc1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Post-incident “lessons learned” are extremely valuable and very, very expensive! </p><p>But you don’t have to wait until “right of boom” to make meaningful improvements to your cybersecurity resilience! <br> <br>Join us for a free one-hour webcast with Patterson Cake from Black Hills Information Security: Do it, do it NOW!! A Pre-Incident Checklist.<br> <br>You’ll learn the top 10 low-effort, high-impact lessons every business should review and fix before a cybersecurity incident.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf</a><strong><br></strong><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Do it, do it NOW! - A Pre-Incident Checklist - Patterson</li>
<li>(06:27) - Presuppositions</li>
<li>(08:28) - In the event of an Emergency...</li>
<li>(10:04) - YOUR INCIDENT RESPONSE PLAN IS USELESS</li>
<li>(12:47) - YOUR CYBER INSURANCE PROVIDER SHOULD NOT BE YOUR ADVERSARY</li>
<li>(15:44) - YOUR LOG DETAIL &amp; RETENTION ARE INADEQUATE</li>
<li>(18:51) - YOUR MOST IMPORTANT ASSET IS __________</li>
<li>(20:48) - IMPLEMENT OUT-OF-BAND COMMS BEFORE CRISIS &amp; TEST REGULARLY</li>
<li>(23:34) - YOUR STAFF ARE AWESOME BUT NOT SUPERHUMAN</li>
<li>(25:45) - EFFECTIVE IR TAKES TRAINING &amp; PRACTICE</li>
<li>(28:04) - YOU MUST HAVE IMMUTABLE BACKUPS</li>
<li>(31:45) - YOU HAVE 0 HOURS TO FIX INTERNET-FACING VULNERABILITIES</li>
<li>(35:11) - THE TWO IR PLAYBOOKS YOU NEED MOST</li>
<li>(43:48) - 10 Things</li>
<li>(50:49) - Q&amp;A</li>
<li>(57:37) - The "Working with BHIS" part</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=jYaMkv56xSk" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aa25dcc1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Thu, 19 Mar 2026 13:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/aa25dcc1/ca959f0a.mp3" length="83818369" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8kKMvNcwlHPp2Zw7MiUO-LC6dDsNRfkwQzWGseHZQJo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NGJl/MTU5YjQyNzg5NWU2/ZWMwMGViNzVjZjRh/NWFhMS5wbmc.jpg"/>
      <itunes:duration>5098</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Post-incident “lessons learned” are extremely valuable and very, very expensive! </p><p>But you don’t have to wait until “right of boom” to make meaningful improvements to your cybersecurity resilience! <br> <br>Join us for a free one-hour webcast with Patterson Cake from Black Hills Information Security: Do it, do it NOW!! A Pre-Incident Checklist.<br> <br>You’ll learn the top 10 low-effort, high-impact lessons every business should review and fix before a cybersecurity incident.</p><p><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_IR-Preparedness-Checklist-03032026.pdf</a><strong><br></strong><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Do it, do it NOW! - A Pre-Incident Checklist - Patterson</li>
<li>(06:27) - Presuppositions</li>
<li>(08:28) - In the event of an Emergency...</li>
<li>(10:04) - YOUR INCIDENT RESPONSE PLAN IS USELESS</li>
<li>(12:47) - YOUR CYBER INSURANCE PROVIDER SHOULD NOT BE YOUR ADVERSARY</li>
<li>(15:44) - YOUR LOG DETAIL &amp; RETENTION ARE INADEQUATE</li>
<li>(18:51) - YOUR MOST IMPORTANT ASSET IS __________</li>
<li>(20:48) - IMPLEMENT OUT-OF-BAND COMMS BEFORE CRISIS &amp; TEST REGULARLY</li>
<li>(23:34) - YOUR STAFF ARE AWESOME BUT NOT SUPERHUMAN</li>
<li>(25:45) - EFFECTIVE IR TAKES TRAINING &amp; PRACTICE</li>
<li>(28:04) - YOU MUST HAVE IMMUTABLE BACKUPS</li>
<li>(31:45) - YOU HAVE 0 HOURS TO FIX INTERNET-FACING VULNERABILITIES</li>
<li>(35:11) - THE TWO IR PLAYBOOKS YOU NEED MOST</li>
<li>(43:48) - 10 Things</li>
<li>(50:49) - Q&amp;A</li>
<li>(57:37) - The "Working with BHIS" part</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=jYaMkv56xSk" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aa25dcc1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand" img="https://img.transistorcdn.com/eStU88KNcCYeBF7vHPfDc5tBToOrcofdWVGkNUhU61Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDIw/OWZlZGI2NDZkOGQ0/ZTY1YjhjODI5NGZj/ZjkyMi5qcGc.jpg">Bryan Strand</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/patterson-cake/" img="https://img.transistorcdn.com/fKCzGNRDYgP_afBiZPfX5g_OJKwplHvl7RaNafiFa_c/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ODU1/ZmI5ODM1ZjVhNzFj/NjU2MGY1OWQ2Njkx/MjBlMi5qcGc.jpg">Patterson Cake</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/aa25dcc1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aa25dcc1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aa25dcc1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aa25dcc1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/aa25dcc1/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/aa25dcc1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d46cb6f2-4468-4ee5-b518-701c8b64d89c</guid>
      <link>https://share.transistor.fm/s/8be9ade7</link>
      <description>
        <![CDATA[<p>What if an attacker lived inside your network for seven months and your tools never noticed?<br> <br>During a real breach assessment, Black Hills Information Security uncovered a stealthy intrusion using a COM-based persistence technique hidden in native Windows scheduled tasks. There were no obvious indicators of compromise. No suspicious process names. No malicious file hashes. <br> <br>Just a quiet foothold designed to stay invisible.</p><p><br><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf<br></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Breach Assessment - The Curious Case of the Comburglar - Troy Wojewoda</li>
<li>(02:15) - Agenda</li>
<li>(03:02) - What Is a Breach Assessment?</li>
<li>(10:50) - 5 Pillars of Data Telemetry</li>
<li>(16:23) - The Hunt Begins</li>
<li>(29:15) - Attack Chain</li>
<li>(38:39) - Timeline &amp; Scope</li>
<li>(45:21) - Threat Hunting Playbook</li>
<li>(51:29) - Key Takeaways</li>
<li>(53:52) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/logan-bender">Logan Bender</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/keith-chew">Keith Chew</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=u8rRyTVopmI" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/8be9ade7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if an attacker lived inside your network for seven months and your tools never noticed?<br> <br>During a real breach assessment, Black Hills Information Security uncovered a stealthy intrusion using a COM-based persistence technique hidden in native Windows scheduled tasks. There were no obvious indicators of compromise. No suspicious process names. No malicious file hashes. <br> <br>Just a quiet foothold designed to stay invisible.</p><p><br><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf<br></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Breach Assessment - The Curious Case of the Comburglar - Troy Wojewoda</li>
<li>(02:15) - Agenda</li>
<li>(03:02) - What Is a Breach Assessment?</li>
<li>(10:50) - 5 Pillars of Data Telemetry</li>
<li>(16:23) - The Hunt Begins</li>
<li>(29:15) - Attack Chain</li>
<li>(38:39) - Timeline &amp; Scope</li>
<li>(45:21) - Threat Hunting Playbook</li>
<li>(51:29) - Key Takeaways</li>
<li>(53:52) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/logan-bender">Logan Bender</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/keith-chew">Keith Chew</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=u8rRyTVopmI" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/8be9ade7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Thu, 12 Mar 2026 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8be9ade7/35db5a1e.mp3" length="75995112" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RL355hZCSOgqlleGqhSG7JGaZsdml9w1ctiVX7lomlY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYzE4/Yzc5NzI2YWQzZjRl/MzdhODc3ODQ5NzBj/MTllMi5wbmc.jpg"/>
      <itunes:duration>4745</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if an attacker lived inside your network for seven months and your tools never noticed?<br> <br>During a real breach assessment, Black Hills Information Security uncovered a stealthy intrusion using a COM-based persistence technique hidden in native Windows scheduled tasks. There were no obvious indicators of compromise. No suspicious process names. No malicious file hashes. <br> <br>Just a quiet foothold designed to stay invisible.</p><p><br><strong>🛝 Webcast Slides<br></strong><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_CuriousCaseOfTheComburglar_BreachAssessment-2026-03-12.pdf<br></a><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Breach Assessment - The Curious Case of the Comburglar - Troy Wojewoda</li>
<li>(02:15) - Agenda</li>
<li>(03:02) - What Is a Breach Assessment?</li>
<li>(10:50) - 5 Pillars of Data Telemetry</li>
<li>(16:23) - The Hunt Begins</li>
<li>(29:15) - Attack Chain</li>
<li>(38:39) - Timeline &amp; Scope</li>
<li>(45:21) - Threat Hunting Playbook</li>
<li>(51:29) - Key Takeaways</li>
<li>(53:52) - Q&amp;A</li>
</ul><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/logan-bender">Logan Bender</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/keith-chew">Keith Chew</a> - Guest</li>
</ul></strong></p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=u8rRyTVopmI" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/8be9ade7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/troy-wojewoda/" img="https://img.transistorcdn.com/ZsWQcwvwq47ZVKZnG5C6Bf3uF3oVf0rLwsGmXZy2cjI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wN2Q1/ZGEzYzU1NGQ5MjJm/YWQ0ZmE1NDBiNzM4/NjllMC5qcGc.jpg">Troy Wojewoda</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/logan-bender/" img="https://img.transistorcdn.com/xczL51LLwDmuUhN2ak4ko6gFVTcDyfOlMQzIlvyB7Ic/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNGIw/ZmJjOWM3NDk3MDJh/YjQ2NzcxNjBkNmJk/NDZhNC5qcGc.jpg">Logan Bender</podcast:person>
      <podcast:person role="Guest" href="https://www.activecountermeasures.com/about-us/" img="https://img.transistorcdn.com/XJMhPK5EbriL8a17heuTkRLHyh9ajfhnIylwMBeJGOk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kN2Nj/OWRjMzBjZTZjZmY3/NzI1NDdlMmEyODNm/NGE1Mi5wbmc.jpg">Keith Chew</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8be9ade7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8be9ade7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8be9ade7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8be9ade7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8be9ade7/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/8be9ade7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Data Loss Prevention (DLP) Survival Guide - Ashley Knowles</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Data Loss Prevention (DLP) Survival Guide - Ashley Knowles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99015de1-96e1-4b77-990d-26e23ffa0a5d</guid>
      <link>https://share.transistor.fm/s/d0fa6726</link>
      <description>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Feb 2026 11:16:33 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d0fa6726/65f2bd80.mp3" length="69354945" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wg1T6pg8cCI_RosB2vYwj6-3Q-oJx4Q7ftW2TUYD_xc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTdh/MTkxMWFkZmFlZWEw/OGM1OGI4MzJlOTYy/NDFiNy5wbmc.jpg"/>
      <itunes:duration>4160</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand" img="https://img.transistorcdn.com/eStU88KNcCYeBF7vHPfDc5tBToOrcofdWVGkNUhU61Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDIw/OWZlZGI2NDZkOGQ0/ZTY1YjhjODI5NGZj/ZjkyMi5qcGc.jpg">Bryan Strand</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/ashley-knowles/" img="https://img.transistorcdn.com/5kO2dt1bzuEW3f6YVkHAwpqQH4qE41noK503hAbe-fA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YzVi/MTE4YzY5ZWU0MzEy/NWI1ZTI5ODk4YmNh/YmIzZS5qcGc.jpg">Ashley Knowles</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/d0fa6726/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Simplify Pentest Workflows Using Cerno - Chris Traynor</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Simplify Pentest Workflows Using Cerno - Chris Traynor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb2f0248-f2f5-4666-a636-18c2dd1c5c83</guid>
      <link>https://share.transistor.fm/s/a77039a3</link>
      <description>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </content:encoded>
      <pubDate>Sun, 01 Feb 2026 13:43:37 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a77039a3/a08ec740.mp3" length="82876495" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/60_4UPOpieFBlPyfHUvCs5FrISSDahs7Iy_w59dZnyo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NWI3/NjVmMWFhZTBlNzkx/NmZhZDY3ZWRlYWNh/ZGZmMC5wbmc.jpg"/>
      <itunes:duration>4989</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/chris-traynor/" img="https://img.transistorcdn.com/e41hK0gZX6Mo2e_Q7g-XN4r-Z6CVt4RtSCvdIs8ZyVU/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNjc3/Zjg5OTc2ZTkxYWM1/NGMxMjgwNDg2MWM0/ZGM4NC5qcGc.jpg">Chris Traynor</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/logan-bender/" img="https://img.transistorcdn.com/xczL51LLwDmuUhN2ak4ko6gFVTcDyfOlMQzIlvyB7Ic/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNGIw/ZmJjOWM3NDk3MDJh/YjQ2NzcxNjBkNmJk/NDZhNC5qcGc.jpg">Logan Bender</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/a77039a3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Zero to Zeek: Build a Network Sensor Fast and Easy w/ Troy Wojewoda</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Zero to Zeek: Build a Network Sensor Fast and Easy w/ Troy Wojewoda</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e8e7e4-add8-49e3-a1db-33fad39b4a0a</guid>
      <link>https://share.transistor.fm/s/61a55fcb</link>
      <description>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 24 Jan 2026 09:50:47 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/61a55fcb/358e4c94.mp3" length="76555087" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/aKNtD0DQqk9gkkI7evqf2HZIKLjonoHx_jyRSVcoTcU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZjkx/NjEzYmEwMTgxYzRh/YTExZmVjMDBjZjll/ZDVkOC5wbmc.jpg"/>
      <itunes:duration>4595</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/troy-wojewoda/" img="https://img.transistorcdn.com/ZsWQcwvwq47ZVKZnG5C6Bf3uF3oVf0rLwsGmXZy2cjI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wN2Q1/ZGEzYzU1NGQ5MjJm/YWQ0ZmE1NDBiNzM4/NjllMC5qcGc.jpg">Troy Wojewoda</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/tom-smith/" img="https://img.transistorcdn.com/12nWkYs19paQvHCEIO-1B52mRZINRauVUmtefM4gzrc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kM2Jl/NGUzOGUyZjA0MzQ0/N2IxYzljNjU5OTM1/ZTVmMS5qcGc.jpg">Tom Smith</podcast:person>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/">Zach Hill</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/61a55fcb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Active Directory Attack Path in Action</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Active Directory Attack Path in Action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6173b064-5acf-4e06-8c01-d71440af6af7</guid>
      <link>https://share.transistor.fm/s/ab1c4609</link>
      <description>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 19 Jan 2026 09:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ab1c4609/13cdae77.mp3" length="73529362" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BvoMpsbMv1S8d8rLMhA9r_vnB7j531A0dcpH0Iks99Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Njk0/MjRjMGI4MDMwOTEw/MDZiOTBlOGVmMTk1/ZGVjNC5wbmc.jpg"/>
      <itunes:duration>4190</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/">Zach Hill</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/alyssa-snow/" img="https://img.transistorcdn.com/1wfrG-4htAdGokgXyuT8WzrrnKPojGvQ1kkAMbNLrhg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMTEz/M2JmNGI1ZTc5YTk1/NDY4MmQzOGU4OWFk/YTdkMS5qcGVn.jpg">Alyssa Snow</podcast:person>
      <podcast:person role="Guest" href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand" img="https://img.transistorcdn.com/eStU88KNcCYeBF7vHPfDc5tBToOrcofdWVGkNUhU61Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDIw/OWZlZGI2NDZkOGQ0/ZTY1YjhjODI5NGZj/ZjkyMi5qcGc.jpg">Bryan Strand</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/kaitlyn-wimberley/" img="https://img.transistorcdn.com/l3d4M7122B749mJWRi3ymcYsgZAXctFlYUjMluqivgY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzBj/ZWI2YzhiZDE4OTdl/NzM2N2UzYzZiYWM0/OWI3Ny5qcGVn.jpg">Kaitlyn Wimberley</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/ab1c4609/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">15e71739-59da-4f14-9dd8-9e0157143efc</guid>
      <link>https://share.transistor.fm/s/37089631</link>
      <description>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Dec 2025 16:40:11 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/37089631/037232ef.mp3" length="84219346" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KRLDzo3BpKSCVFV5TFaXNEvtrJXMlJ3loIodWiIUyDE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOWJh/OWUzMTM3ZDY0ZDBl/MmU3MzE5NGVjYzg0/ZmJjMy5qcGc.jpg"/>
      <itunes:duration>4719</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Black Hills Information Security,BHIS,webcasts</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/37089631/chapters.json" type="application/json+chapters"/>
    </item>
  </channel>
</rss>
