<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/simply-defensive" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Simply Defensive</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/simply-defensive</itunes:new-feed-url>
    <description>Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions.

Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in as we discuss the latest threats, emerging technologies, and best practices for protecting your organization from cyberattacks.

=========================
Connect with your hosts:
Josh Mason: https://www.linkedin.com/in/joshuacmason
Wade Wells: https://www.linkedin.com/in/wadingthrulogs

=========================
Simply Cyber empowers people who want a rewarding cybersecurity career 💪
=========================
=========================
All the ways to connect with Simply Cyber
https://SimplyCyber.io/Socials
=========================</description>
    <copyright>2025 Simply Cyber Media Group</copyright>
    <podcast:guid>02546dc0-0020-5a8a-9e02-0d6eea49d5cf</podcast:guid>
    <podcast:locked owner="joshua.c.mason@Gmail.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Mon, 04 May 2026 16:35:22 -0400</pubDate>
    <lastBuildDate>Mon, 04 May 2026 16:36:06 -0400</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/oa1l4EtHX5NwP6bIuT7BhS-P7lq7jhrSnGhzEauCOng/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMGNk/N2Y0M2I5MGFkZTk2/OTc5NGJkYjliODRl/YWEzMy5qcGc.jpg</url>
      <title>Simply Defensive</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Careers"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Simply Cyber Media Group</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/oa1l4EtHX5NwP6bIuT7BhS-P7lq7jhrSnGhzEauCOng/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMGNk/N2Y0M2I5MGFkZTk2/OTc5NGJkYjliODRl/YWEzMy5qcGc.jpg"/>
    <itunes:summary>Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions.

Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in as we discuss the latest threats, emerging technologies, and best practices for protecting your organization from cyberattacks.

=========================
Connect with your hosts:
Josh Mason: https://www.linkedin.com/in/joshuacmason
Wade Wells: https://www.linkedin.com/in/wadingthrulogs

=========================
Simply Cyber empowers people who want a rewarding cybersecurity career 💪
=========================
=========================
All the ways to connect with Simply Cyber
https://SimplyCyber.io/Socials
=========================</itunes:summary>
    <itunes:subtitle>Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts.</itunes:subtitle>
    <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
    <itunes:owner>
      <itunes:name>Josh Mason &amp; Wade Wells</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>S6:E3 - Tom Dejong - Inside the BHIS SOC: Triage, Curiosity, and Career Growth</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:title>S6:E3 - Tom Dejong - Inside the BHIS SOC: Triage, Curiosity, and Career Growth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e22e3df-d55f-4623-aa9f-a8a67a587b1a</guid>
      <link>https://simplydefensive.transistor.fm/s6/3</link>
      <description>
        <![CDATA[<p><strong><br>Episode Show Notes</strong></p><p><strong>S6:E3 - Tom Dejong - Inside the BHIS SOC: Triage, Curiosity, and Career Growth</strong></p><p><strong><br>Episode Summary</strong></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Tom Dejong, Triage Lead at Black Hills Information Security (BHIS). Tom shares his unconventional path into cybersecurity — from a South Dakota apprenticeship scholarship to becoming one of the most detail-oriented analysts in the BHIS SOC. The conversation covers the realities of SOC triage, the importance of detailed documentation, mentoring new analysts, and how AI is reshaping (but not replacing) blue team work.</p><p>Whether you're an aspiring SOC analyst, a seasoned defender, or someone curious about how to build a career in cyber without a traditional path, Tom's story and practical advice will resonate.</p><p><strong><br>What You'll Learn</strong></p><ul><li>How the Build Dakota Scholarship led Tom from apprenticeship to a cybersecurity career</li><li>What it's really like working triage at the BHIS SOC</li><li>Why detailed ticket notes are a force multiplier for SOC teams</li><li>The hypothesis-driven approach to alert investigation</li><li>How to pivot off IPs, hashes, process names, and file paths</li><li>Why curiosity is the #1 skill for SOC analysts</li><li>How AI is being used in modern SOCs (and why it's not taking your job)</li><li>The challenge of building SOC training and webcasts</li><li>Advice for handling mistakes and learning from them</li></ul><p><strong><br>Episode Highlights</strong></p><p><strong>Tom's Journey Into Cyber</strong> From discovering Darknet Diaries and hearing John Strand mention Spearfish, South Dakota — the same town Tom was living in — to landing his first day at Wild West Hacking Fest 2022 as a BHIS intern.</p><p><strong>The Triage Mindset</strong> Tom walks through his approach to investigating alerts: starting with detection logic, checking for prior tickets, and breaking down each piece of evidence in writing to make the logic click.</p><p><strong>Documentation as a Superpower</strong> Why Tom believes detailed notes aren't just nice-to-have — they're essential for the next analyst down the line and for his own thought process.</p><p><strong>AI in the SOC</strong> Tom's honest take on using AI for investigations, polishing client communications, and writing detection logic — plus why he's not worried about it taking his job.</p><p><strong>Advice for Blue Teamers</strong> You're going to make mistakes. Use them as learning experiences. Lean on your teammates. Stay curious.</p><p><strong><br>Timestamps</strong></p><ul><li>00:00 Intro and Welcome</li><li>01:00 Tom's Role at the BHIS SOC</li><li>01:30 From Apprenticeship to Cybersecurity: The Build Dakota Story</li><li>03:00 Discovering BHIS Through Darknet Diaries</li><li>04:00 Wild West Hacking Fest as Day One</li><li>04:30 Behind the Scenes of a SOC Webcast</li><li>06:30 The Art of Alert Triage and Pivoting</li><li>08:30 Building Conference Talks and Training Content</li><li>10:30 Where Tom Sees His Career Going</li><li>11:30 Why Curiosity Is the #1 SOC Skill</li><li>12:30 Favorite Alert Types to Work</li><li>14:00 Round Robin vs. Self-Assigned Tickets</li><li>15:00 Note-Taking and Documentation Best Practices</li><li>19:00 Building a Hypothesis When an Alert Comes In</li><li>20:30 AI in the SOC: Hype, Reality, and Use Cases</li><li>24:00 Will AI Replace SOC Analysts?</li><li>26:00 Training Resources for New Analysts</li><li>28:00 Advice for Aspiring Blue Teamers</li><li>29:30 Closing Thoughts</li></ul><p><strong><br>Resources Mentioned</strong></p><ul><li><strong>Black Hills Information Security:</strong> <a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com/</a></li><li><strong>Antisyphon Training:</strong> <a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></li><li><strong>Build Dakota Scholarship:</strong> <a href="https://www.builddakotascholarships.com/">https://www.builddakotascholarships.com/</a></li><li><strong>Darknet Diaries Podcast:</strong> <a href="https://darknetdiaries.com/">https://darknetdiaries.com/</a></li><li><strong>Wild West Hacking Fest:</strong> <a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com/</a></li></ul><p><strong><br>Connect with Tom</strong></p><ul><li><strong>LinkedIn:</strong> Tom Dejong at Black Hills Information Security</li><li><strong>BHIS Webcasts &amp; Workshops:</strong> Available through Black Hills Information Security</li></ul><p><strong><br>Connect with Your Hosts</strong></p><ul><li><strong>Josh Mason:</strong> <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/</a></li><li><strong>Wade Wells:</strong> <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>Episode Show Notes</strong></p><p><strong>S6:E3 - Tom Dejong - Inside the BHIS SOC: Triage, Curiosity, and Career Growth</strong></p><p><strong><br>Episode Summary</strong></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Tom Dejong, Triage Lead at Black Hills Information Security (BHIS). Tom shares his unconventional path into cybersecurity — from a South Dakota apprenticeship scholarship to becoming one of the most detail-oriented analysts in the BHIS SOC. The conversation covers the realities of SOC triage, the importance of detailed documentation, mentoring new analysts, and how AI is reshaping (but not replacing) blue team work.</p><p>Whether you're an aspiring SOC analyst, a seasoned defender, or someone curious about how to build a career in cyber without a traditional path, Tom's story and practical advice will resonate.</p><p><strong><br>What You'll Learn</strong></p><ul><li>How the Build Dakota Scholarship led Tom from apprenticeship to a cybersecurity career</li><li>What it's really like working triage at the BHIS SOC</li><li>Why detailed ticket notes are a force multiplier for SOC teams</li><li>The hypothesis-driven approach to alert investigation</li><li>How to pivot off IPs, hashes, process names, and file paths</li><li>Why curiosity is the #1 skill for SOC analysts</li><li>How AI is being used in modern SOCs (and why it's not taking your job)</li><li>The challenge of building SOC training and webcasts</li><li>Advice for handling mistakes and learning from them</li></ul><p><strong><br>Episode Highlights</strong></p><p><strong>Tom's Journey Into Cyber</strong> From discovering Darknet Diaries and hearing John Strand mention Spearfish, South Dakota — the same town Tom was living in — to landing his first day at Wild West Hacking Fest 2022 as a BHIS intern.</p><p><strong>The Triage Mindset</strong> Tom walks through his approach to investigating alerts: starting with detection logic, checking for prior tickets, and breaking down each piece of evidence in writing to make the logic click.</p><p><strong>Documentation as a Superpower</strong> Why Tom believes detailed notes aren't just nice-to-have — they're essential for the next analyst down the line and for his own thought process.</p><p><strong>AI in the SOC</strong> Tom's honest take on using AI for investigations, polishing client communications, and writing detection logic — plus why he's not worried about it taking his job.</p><p><strong>Advice for Blue Teamers</strong> You're going to make mistakes. Use them as learning experiences. Lean on your teammates. Stay curious.</p><p><strong><br>Timestamps</strong></p><ul><li>00:00 Intro and Welcome</li><li>01:00 Tom's Role at the BHIS SOC</li><li>01:30 From Apprenticeship to Cybersecurity: The Build Dakota Story</li><li>03:00 Discovering BHIS Through Darknet Diaries</li><li>04:00 Wild West Hacking Fest as Day One</li><li>04:30 Behind the Scenes of a SOC Webcast</li><li>06:30 The Art of Alert Triage and Pivoting</li><li>08:30 Building Conference Talks and Training Content</li><li>10:30 Where Tom Sees His Career Going</li><li>11:30 Why Curiosity Is the #1 SOC Skill</li><li>12:30 Favorite Alert Types to Work</li><li>14:00 Round Robin vs. Self-Assigned Tickets</li><li>15:00 Note-Taking and Documentation Best Practices</li><li>19:00 Building a Hypothesis When an Alert Comes In</li><li>20:30 AI in the SOC: Hype, Reality, and Use Cases</li><li>24:00 Will AI Replace SOC Analysts?</li><li>26:00 Training Resources for New Analysts</li><li>28:00 Advice for Aspiring Blue Teamers</li><li>29:30 Closing Thoughts</li></ul><p><strong><br>Resources Mentioned</strong></p><ul><li><strong>Black Hills Information Security:</strong> <a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com/</a></li><li><strong>Antisyphon Training:</strong> <a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></li><li><strong>Build Dakota Scholarship:</strong> <a href="https://www.builddakotascholarships.com/">https://www.builddakotascholarships.com/</a></li><li><strong>Darknet Diaries Podcast:</strong> <a href="https://darknetdiaries.com/">https://darknetdiaries.com/</a></li><li><strong>Wild West Hacking Fest:</strong> <a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com/</a></li></ul><p><strong><br>Connect with Tom</strong></p><ul><li><strong>LinkedIn:</strong> Tom Dejong at Black Hills Information Security</li><li><strong>BHIS Webcasts &amp; Workshops:</strong> Available through Black Hills Information Security</li></ul><p><strong><br>Connect with Your Hosts</strong></p><ul><li><strong>Josh Mason:</strong> <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/</a></li><li><strong>Wade Wells:</strong> <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/</a></li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 04 May 2026 16:29:05 -0400</pubDate>
      <author>Simply Defensive</author>
      <enclosure url="https://media.transistor.fm/e66628ce/1a4c48e8.mp3" length="29484874" type="audio/mpeg"/>
      <itunes:author>Simply Defensive</itunes:author>
      <itunes:duration>1839</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>Episode Show Notes</strong></p><p><strong>S6:E3 - Tom Dejong - Inside the BHIS SOC: Triage, Curiosity, and Career Growth</strong></p><p><strong><br>Episode Summary</strong></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Tom Dejong, Triage Lead at Black Hills Information Security (BHIS). Tom shares his unconventional path into cybersecurity — from a South Dakota apprenticeship scholarship to becoming one of the most detail-oriented analysts in the BHIS SOC. The conversation covers the realities of SOC triage, the importance of detailed documentation, mentoring new analysts, and how AI is reshaping (but not replacing) blue team work.</p><p>Whether you're an aspiring SOC analyst, a seasoned defender, or someone curious about how to build a career in cyber without a traditional path, Tom's story and practical advice will resonate.</p><p><strong><br>What You'll Learn</strong></p><ul><li>How the Build Dakota Scholarship led Tom from apprenticeship to a cybersecurity career</li><li>What it's really like working triage at the BHIS SOC</li><li>Why detailed ticket notes are a force multiplier for SOC teams</li><li>The hypothesis-driven approach to alert investigation</li><li>How to pivot off IPs, hashes, process names, and file paths</li><li>Why curiosity is the #1 skill for SOC analysts</li><li>How AI is being used in modern SOCs (and why it's not taking your job)</li><li>The challenge of building SOC training and webcasts</li><li>Advice for handling mistakes and learning from them</li></ul><p><strong><br>Episode Highlights</strong></p><p><strong>Tom's Journey Into Cyber</strong> From discovering Darknet Diaries and hearing John Strand mention Spearfish, South Dakota — the same town Tom was living in — to landing his first day at Wild West Hacking Fest 2022 as a BHIS intern.</p><p><strong>The Triage Mindset</strong> Tom walks through his approach to investigating alerts: starting with detection logic, checking for prior tickets, and breaking down each piece of evidence in writing to make the logic click.</p><p><strong>Documentation as a Superpower</strong> Why Tom believes detailed notes aren't just nice-to-have — they're essential for the next analyst down the line and for his own thought process.</p><p><strong>AI in the SOC</strong> Tom's honest take on using AI for investigations, polishing client communications, and writing detection logic — plus why he's not worried about it taking his job.</p><p><strong>Advice for Blue Teamers</strong> You're going to make mistakes. Use them as learning experiences. Lean on your teammates. Stay curious.</p><p><strong><br>Timestamps</strong></p><ul><li>00:00 Intro and Welcome</li><li>01:00 Tom's Role at the BHIS SOC</li><li>01:30 From Apprenticeship to Cybersecurity: The Build Dakota Story</li><li>03:00 Discovering BHIS Through Darknet Diaries</li><li>04:00 Wild West Hacking Fest as Day One</li><li>04:30 Behind the Scenes of a SOC Webcast</li><li>06:30 The Art of Alert Triage and Pivoting</li><li>08:30 Building Conference Talks and Training Content</li><li>10:30 Where Tom Sees His Career Going</li><li>11:30 Why Curiosity Is the #1 SOC Skill</li><li>12:30 Favorite Alert Types to Work</li><li>14:00 Round Robin vs. Self-Assigned Tickets</li><li>15:00 Note-Taking and Documentation Best Practices</li><li>19:00 Building a Hypothesis When an Alert Comes In</li><li>20:30 AI in the SOC: Hype, Reality, and Use Cases</li><li>24:00 Will AI Replace SOC Analysts?</li><li>26:00 Training Resources for New Analysts</li><li>28:00 Advice for Aspiring Blue Teamers</li><li>29:30 Closing Thoughts</li></ul><p><strong><br>Resources Mentioned</strong></p><ul><li><strong>Black Hills Information Security:</strong> <a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com/</a></li><li><strong>Antisyphon Training:</strong> <a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></li><li><strong>Build Dakota Scholarship:</strong> <a href="https://www.builddakotascholarships.com/">https://www.builddakotascholarships.com/</a></li><li><strong>Darknet Diaries Podcast:</strong> <a href="https://darknetdiaries.com/">https://darknetdiaries.com/</a></li><li><strong>Wild West Hacking Fest:</strong> <a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com/</a></li></ul><p><strong><br>Connect with Tom</strong></p><ul><li><strong>LinkedIn:</strong> Tom Dejong at Black Hills Information Security</li><li><strong>BHIS Webcasts &amp; Workshops:</strong> Available through Black Hills Information Security</li></ul><p><strong><br>Connect with Your Hosts</strong></p><ul><li><strong>Josh Mason:</strong> <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/</a></li><li><strong>Wade Wells:</strong> <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>SOC analyst, SOC triage, blue team, cybersecurity podcast, Black Hills Information Security, BHIS, Tom Dejong, alert triage, detection engineering, incident response, SOC career, breaking into cybersecurity, cybersecurity internship, SOC analyst training, Antisyphon Training, Wild West Hacking Fest, John Strand, EDR analysis, Azure login investigation, cybersecurity mentorship, blue team skills, SOC documentation, ticket investigation, AI in SOC, cybersecurity AI, threat hunting, purple team, cloud security, AWS logs, Azure logs, SOC analyst advice, cybersecurity career path, simply defensive, Josh Mason, Wade Wells, defensive cybersecurity, infosec podcast, SOC fundamentals, cyber triage, security operations center, blue team training</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e66628ce/transcript.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e66628ce/transcript.json" type="application/json"/>
    </item>
    <item>
      <title>S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:title>S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4ac6fd94-1673-4269-995e-7f41fd0697d3</guid>
      <link>https://simplydefensive.transistor.fm/s6/2</link>
      <description>
        <![CDATA[<p>John Hammond on Security Research, Storytelling, and Deception for Defenders</p><p>In this Simply Defensive episode, hosts Josh Mason and Wade Wells interview John Hammond, a Huntress security researcher, YouTuber, and educator, about his career path and defensive research. Hammond explains he has never worked as a penetration tester, SOC analyst, or detection engineer, instead “falling into” security research through hands-on Capture the Flag work and building cyber threat emulation course content, earning Offensive Security’s OSCE3 bundle recognition. He discusses why storytelling and communication are critical for translating attacker tradecraft into actionable defenses, emphasizing understanding the attack chain to identify places to break it. He recommends building a public portfolio of write-ups and notes, and says multiple creators covering the same topic can still provide value through different explanations. The conversation also highlights endpoint deception and honeypots, challenges of reversing compiled binaries versus script-based malware, and his advice to document thoroughly in shared organizational knowledge bases.</p><p>00:00 S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity<br>01:27 Meet John Hammond<br>01:57 Security Researcher Life<br>04:43 OffSec Certs Explained<br>06:55 From CTF to Research<br>08:47 Storytelling in Cyber<br>12:10 Turning Attacks to Defense<br>15:19 Getting Hired as Researcher<br>16:48 Portfolio and Honeypots<br>19:05 Make the Video Anyway<br>21:40 Alternate Data Streams Nerdout<br>23:36 CTFs Then and Now<br>24:28 Life Shifts Priorities<br>25:44 Beyond CTFs Next Trend<br>26:52 Deception Meets Detection<br>28:48 Honeypots and Program Maturity<br>31:13 Malware Reversing Boss Fights<br>35:09 Blue Team Advice Document Everything<br>37:51 Where to Find John and Training<br>38:49 Wrap Up and Farewell</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>John Hammond on Security Research, Storytelling, and Deception for Defenders</p><p>In this Simply Defensive episode, hosts Josh Mason and Wade Wells interview John Hammond, a Huntress security researcher, YouTuber, and educator, about his career path and defensive research. Hammond explains he has never worked as a penetration tester, SOC analyst, or detection engineer, instead “falling into” security research through hands-on Capture the Flag work and building cyber threat emulation course content, earning Offensive Security’s OSCE3 bundle recognition. He discusses why storytelling and communication are critical for translating attacker tradecraft into actionable defenses, emphasizing understanding the attack chain to identify places to break it. He recommends building a public portfolio of write-ups and notes, and says multiple creators covering the same topic can still provide value through different explanations. The conversation also highlights endpoint deception and honeypots, challenges of reversing compiled binaries versus script-based malware, and his advice to document thoroughly in shared organizational knowledge bases.</p><p>00:00 S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity<br>01:27 Meet John Hammond<br>01:57 Security Researcher Life<br>04:43 OffSec Certs Explained<br>06:55 From CTF to Research<br>08:47 Storytelling in Cyber<br>12:10 Turning Attacks to Defense<br>15:19 Getting Hired as Researcher<br>16:48 Portfolio and Honeypots<br>19:05 Make the Video Anyway<br>21:40 Alternate Data Streams Nerdout<br>23:36 CTFs Then and Now<br>24:28 Life Shifts Priorities<br>25:44 Beyond CTFs Next Trend<br>26:52 Deception Meets Detection<br>28:48 Honeypots and Program Maturity<br>31:13 Malware Reversing Boss Fights<br>35:09 Blue Team Advice Document Everything<br>37:51 Where to Find John and Training<br>38:49 Wrap Up and Farewell</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 11:57:34 -0400</pubDate>
      <author>Simply Defensive</author>
      <enclosure url="https://media.transistor.fm/b213cabd/94903531.mp3" length="37889220" type="audio/mpeg"/>
      <itunes:author>Simply Defensive</itunes:author>
      <itunes:duration>2364</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>John Hammond on Security Research, Storytelling, and Deception for Defenders</p><p>In this Simply Defensive episode, hosts Josh Mason and Wade Wells interview John Hammond, a Huntress security researcher, YouTuber, and educator, about his career path and defensive research. Hammond explains he has never worked as a penetration tester, SOC analyst, or detection engineer, instead “falling into” security research through hands-on Capture the Flag work and building cyber threat emulation course content, earning Offensive Security’s OSCE3 bundle recognition. He discusses why storytelling and communication are critical for translating attacker tradecraft into actionable defenses, emphasizing understanding the attack chain to identify places to break it. He recommends building a public portfolio of write-ups and notes, and says multiple creators covering the same topic can still provide value through different explanations. The conversation also highlights endpoint deception and honeypots, challenges of reversing compiled binaries versus script-based malware, and his advice to document thoroughly in shared organizational knowledge bases.</p><p>00:00 S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity<br>01:27 Meet John Hammond<br>01:57 Security Researcher Life<br>04:43 OffSec Certs Explained<br>06:55 From CTF to Research<br>08:47 Storytelling in Cyber<br>12:10 Turning Attacks to Defense<br>15:19 Getting Hired as Researcher<br>16:48 Portfolio and Honeypots<br>19:05 Make the Video Anyway<br>21:40 Alternate Data Streams Nerdout<br>23:36 CTFs Then and Now<br>24:28 Life Shifts Priorities<br>25:44 Beyond CTFs Next Trend<br>26:52 Deception Meets Detection<br>28:48 Honeypots and Program Maturity<br>31:13 Malware Reversing Boss Fights<br>35:09 Blue Team Advice Document Everything<br>37:51 Where to Find John and Training<br>38:49 Wrap Up and Farewell</p>]]>
      </itunes:summary>
      <itunes:keywords>John Hammond, cybersecurity, security researcher, Huntress, Simply Defensive, penetration testing, OSCP, OSCE3, offensive security, capture the flag, CTF, imposter syndrome, cybersecurity career, malware analysis, reverse engineering, threat intelligence, detection engineering, deception engineering, honeypots, blue team, red team, cyber kill chain, attack chain, cybersecurity storytelling, cybersecurity education, YouTube, Hack the Box, TryHackMe, cybersecurity portfolio, alternate data streams, PowerShell malware, living off the land, endpoint security, dynamic analysis, cybersecurity documentation, Obsidian, security program maturity, cybersecurity hiring, content creator, cybersecurity podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b213cabd/transcript.json" type="application/json"/>
      <podcast:transcript url="https://share.transistor.fm/s/b213cabd/transcript.vtt" type="text/vtt" rel="captions"/>
    </item>
    <item>
      <title>From Blue Team Challenges to AI Innovations: A Conversation with Jason Haddix</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:title>From Blue Team Challenges to AI Innovations: A Conversation with Jason Haddix</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7f983e7b-6198-4d60-8d50-1d31b7604c99</guid>
      <link>https://simplydefensive.transistor.fm/s6/1</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Jason Haddix — CISO veteran, AI security thought leader, and founder of Arcanum Information Security — for a wide-ranging conversation on where AI is actually headed in cybersecurity, and what blue teamers need to know right now.</p><p>Jason shares what he's learned from running AI scaling assessments inside major enterprises, why most organizations are still in the early stages of AI adoption, and how the industry needs to stop thinking about AI security like traditional web app security. He breaks down the stages of AI adoption (from custom bots to agents), explains why input validation is a losing game for LLM security, and makes the case for classifiers, guardrails, and LLM-based routing as the real defense-in-depth play for AI systems.</p><p>Wade and Jason also revisit the Red Blue Purple AI course, talk through how RAG and context engineering are transforming what's possible for blue teamers, and discuss why the credential leakage problem is still one of the biggest vectors defenders aren't taking seriously enough.</p><p><strong>Topics covered:</strong></p><ul><li>Why CTI struggles to prove value — and where it actually matters most</li><li>Stealer logs, credential leakage, and when rolling an account isn't enough</li><li>AI adoption stages: custom bots → RAG → agents</li><li>Why SOAR skepticism is a preview of AI hesitancy</li><li>Context engineering vs. prompt engineering</li><li>Defending AI systems: prompt-level protections, classifiers, guardrails, and LLM routing</li><li>When does a prompt become IP?</li><li>Jason's advice for blue teamers: embrace AI as a tool, find your annoying tasks, and start chipping away</li></ul><p><strong>Connect with Jason Haddix:</strong></p><ul><li>Twitter/X: <a href="https://twitter.com/jhaddix">@jhaddix</a></li><li>Arcanum Information Security: <a href="https://arcanamsec.com">arcanam-sec.com</a></li><li>GitHub (free tools &amp; resources): ARCanum Information Security on GitHub</li><li>Newsletter: Executive Offense by Jay Haddix</li></ul><p><strong>Resources mentioned:</strong></p><ul><li>Red Blue Purple AI Course (ARCanum)</li><li>Flare (threat intelligence / credential monitoring): <a href="https://flare.io">flare.io</a></li><li>Detections.ai</li></ul><p><strong>Connect with the Hosts:</strong></p><ul><li>Josh Mason: <a href="https://linkedin.com/in/joshuacmason">linkedin.com/in/joshuacmason</a></li><li>Wade Wells: <a href="https://linkedin.com/in/wadingthrulogs">linkedin.com/in/wadingthrulogs</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Jason Haddix — CISO veteran, AI security thought leader, and founder of Arcanum Information Security — for a wide-ranging conversation on where AI is actually headed in cybersecurity, and what blue teamers need to know right now.</p><p>Jason shares what he's learned from running AI scaling assessments inside major enterprises, why most organizations are still in the early stages of AI adoption, and how the industry needs to stop thinking about AI security like traditional web app security. He breaks down the stages of AI adoption (from custom bots to agents), explains why input validation is a losing game for LLM security, and makes the case for classifiers, guardrails, and LLM-based routing as the real defense-in-depth play for AI systems.</p><p>Wade and Jason also revisit the Red Blue Purple AI course, talk through how RAG and context engineering are transforming what's possible for blue teamers, and discuss why the credential leakage problem is still one of the biggest vectors defenders aren't taking seriously enough.</p><p><strong>Topics covered:</strong></p><ul><li>Why CTI struggles to prove value — and where it actually matters most</li><li>Stealer logs, credential leakage, and when rolling an account isn't enough</li><li>AI adoption stages: custom bots → RAG → agents</li><li>Why SOAR skepticism is a preview of AI hesitancy</li><li>Context engineering vs. prompt engineering</li><li>Defending AI systems: prompt-level protections, classifiers, guardrails, and LLM routing</li><li>When does a prompt become IP?</li><li>Jason's advice for blue teamers: embrace AI as a tool, find your annoying tasks, and start chipping away</li></ul><p><strong>Connect with Jason Haddix:</strong></p><ul><li>Twitter/X: <a href="https://twitter.com/jhaddix">@jhaddix</a></li><li>Arcanum Information Security: <a href="https://arcanamsec.com">arcanam-sec.com</a></li><li>GitHub (free tools &amp; resources): ARCanum Information Security on GitHub</li><li>Newsletter: Executive Offense by Jay Haddix</li></ul><p><strong>Resources mentioned:</strong></p><ul><li>Red Blue Purple AI Course (ARCanum)</li><li>Flare (threat intelligence / credential monitoring): <a href="https://flare.io">flare.io</a></li><li>Detections.ai</li></ul><p><strong>Connect with the Hosts:</strong></p><ul><li>Josh Mason: <a href="https://linkedin.com/in/joshuacmason">linkedin.com/in/joshuacmason</a></li><li>Wade Wells: <a href="https://linkedin.com/in/wadingthrulogs">linkedin.com/in/wadingthrulogs</a></li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 24 Feb 2026 10:00:00 -0500</pubDate>
      <author>Josh and Wade</author>
      <enclosure url="https://media.transistor.fm/3099ae4f/c16e563c.mp3" length="30441165" type="audio/mpeg"/>
      <itunes:author>Josh and Wade</itunes:author>
      <itunes:duration>1898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Jason Haddix — CISO veteran, AI security thought leader, and founder of Arcanum Information Security — for a wide-ranging conversation on where AI is actually headed in cybersecurity, and what blue teamers need to know right now.</p><p>Jason shares what he's learned from running AI scaling assessments inside major enterprises, why most organizations are still in the early stages of AI adoption, and how the industry needs to stop thinking about AI security like traditional web app security. He breaks down the stages of AI adoption (from custom bots to agents), explains why input validation is a losing game for LLM security, and makes the case for classifiers, guardrails, and LLM-based routing as the real defense-in-depth play for AI systems.</p><p>Wade and Jason also revisit the Red Blue Purple AI course, talk through how RAG and context engineering are transforming what's possible for blue teamers, and discuss why the credential leakage problem is still one of the biggest vectors defenders aren't taking seriously enough.</p><p><strong>Topics covered:</strong></p><ul><li>Why CTI struggles to prove value — and where it actually matters most</li><li>Stealer logs, credential leakage, and when rolling an account isn't enough</li><li>AI adoption stages: custom bots → RAG → agents</li><li>Why SOAR skepticism is a preview of AI hesitancy</li><li>Context engineering vs. prompt engineering</li><li>Defending AI systems: prompt-level protections, classifiers, guardrails, and LLM routing</li><li>When does a prompt become IP?</li><li>Jason's advice for blue teamers: embrace AI as a tool, find your annoying tasks, and start chipping away</li></ul><p><strong>Connect with Jason Haddix:</strong></p><ul><li>Twitter/X: <a href="https://twitter.com/jhaddix">@jhaddix</a></li><li>Arcanum Information Security: <a href="https://arcanamsec.com">arcanam-sec.com</a></li><li>GitHub (free tools &amp; resources): ARCanum Information Security on GitHub</li><li>Newsletter: Executive Offense by Jay Haddix</li></ul><p><strong>Resources mentioned:</strong></p><ul><li>Red Blue Purple AI Course (ARCanum)</li><li>Flare (threat intelligence / credential monitoring): <a href="https://flare.io">flare.io</a></li><li>Detections.ai</li></ul><p><strong>Connect with the Hosts:</strong></p><ul><li>Josh Mason: <a href="https://linkedin.com/in/joshuacmason">linkedin.com/in/joshuacmason</a></li><li>Wade Wells: <a href="https://linkedin.com/in/wadingthrulogs">linkedin.com/in/wadingthrulogs</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>AI security, prompt injection, blue team, Jason Haddix, ARCanum, red blue purple AI, RAG, context engineering, LLM security, credential leakage, stealer logs, SOAR, detection engineering, AI adoption, guardrails, classifiers, cybersecurity podcast, simply defensive, SOC, threat intelligence, CTI</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3099ae4f/transcript.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3099ae4f/transcript.json" type="application/json"/>
    </item>
    <item>
      <title>From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a7ffa5d-b891-4b67-85b2-a6ff401f65bf</guid>
      <link>https://simplydefensive.transistor.fm/s5/8</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.</p><p><br></p><p>Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.</p><p><br></p><p>What you'll hear:</p><p>🔹 From pre-law to pilot training to PhD in cybersecurity</p><p>🔹 How teaching RE forced him to truly master it</p><p>🔹 Life inside Google's FLARE team (via Chronicle → Mandiant)</p><p>🔹 Flareon CTF — the RE challenge that's run for 12 years</p><p>🔹 A wild Black Hat NOC story involving an infected Mac and Atomic Stealer</p><p>🔹 Using AI to build malware samples for training labs</p><p>🔹 Why going low-level is the best advice for blue teamers</p><p><br></p><p>Chapters:</p><p>00:00 Introduction and Welcome</p><p>00:50 Josh's Connection to Dr. Gerald Auger</p><p>02:00 The Non-Traditional Path: Pre-Law, Pilot Training &amp; .NET Dev</p><p>05:00 Getting Into Security at a Credit Card Processor</p><p>07:00 Teaching Reverse Engineering at Dakota State</p><p>10:00 Flareon CTF and Educational CTF Design</p><p>14:00 Is Reverse Engineering Offensive or Defensive?</p><p>17:00 How Rare Are Full-Time RE Roles?</p><p>21:00 The Path to Google: Chronicle, Mandiant &amp; FLARE</p><p>25:00 Learning Through Teaching and YouTube Content</p><p>28:00 Black Hat NOC Story: Catching Atomic Stealer Live</p><p>33:00 Using AI to Create Malware Training Samples</p><p>37:00 Building a Defang Tool (and .NET Nightmares)</p><p>40:00 Advice for Blue Teamers: Go Low-Level</p><p><br></p><p>🎧 Find Josh Stroschein:</p><p>→ Website: https://www.thecyberyeti.com</p><p>→ YouTube: The Cyber Yeti</p><p>→ Podcast: The Cyber Yeti Podcast</p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.</p><p><br></p><p>Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.</p><p><br></p><p>What you'll hear:</p><p>🔹 From pre-law to pilot training to PhD in cybersecurity</p><p>🔹 How teaching RE forced him to truly master it</p><p>🔹 Life inside Google's FLARE team (via Chronicle → Mandiant)</p><p>🔹 Flareon CTF — the RE challenge that's run for 12 years</p><p>🔹 A wild Black Hat NOC story involving an infected Mac and Atomic Stealer</p><p>🔹 Using AI to build malware samples for training labs</p><p>🔹 Why going low-level is the best advice for blue teamers</p><p><br></p><p>Chapters:</p><p>00:00 Introduction and Welcome</p><p>00:50 Josh's Connection to Dr. Gerald Auger</p><p>02:00 The Non-Traditional Path: Pre-Law, Pilot Training &amp; .NET Dev</p><p>05:00 Getting Into Security at a Credit Card Processor</p><p>07:00 Teaching Reverse Engineering at Dakota State</p><p>10:00 Flareon CTF and Educational CTF Design</p><p>14:00 Is Reverse Engineering Offensive or Defensive?</p><p>17:00 How Rare Are Full-Time RE Roles?</p><p>21:00 The Path to Google: Chronicle, Mandiant &amp; FLARE</p><p>25:00 Learning Through Teaching and YouTube Content</p><p>28:00 Black Hat NOC Story: Catching Atomic Stealer Live</p><p>33:00 Using AI to Create Malware Training Samples</p><p>37:00 Building a Defang Tool (and .NET Nightmares)</p><p>40:00 Advice for Blue Teamers: Go Low-Level</p><p><br></p><p>🎧 Find Josh Stroschein:</p><p>→ Website: https://www.thecyberyeti.com</p><p>→ YouTube: The Cyber Yeti</p><p>→ Podcast: The Cyber Yeti Podcast</p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Dec 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/fdd90271/2c22e085.mp3" length="57124923" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2378</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.</p><p><br></p><p>Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.</p><p><br></p><p>What you'll hear:</p><p>🔹 From pre-law to pilot training to PhD in cybersecurity</p><p>🔹 How teaching RE forced him to truly master it</p><p>🔹 Life inside Google's FLARE team (via Chronicle → Mandiant)</p><p>🔹 Flareon CTF — the RE challenge that's run for 12 years</p><p>🔹 A wild Black Hat NOC story involving an infected Mac and Atomic Stealer</p><p>🔹 Using AI to build malware samples for training labs</p><p>🔹 Why going low-level is the best advice for blue teamers</p><p><br></p><p>Chapters:</p><p>00:00 Introduction and Welcome</p><p>00:50 Josh's Connection to Dr. Gerald Auger</p><p>02:00 The Non-Traditional Path: Pre-Law, Pilot Training &amp; .NET Dev</p><p>05:00 Getting Into Security at a Credit Card Processor</p><p>07:00 Teaching Reverse Engineering at Dakota State</p><p>10:00 Flareon CTF and Educational CTF Design</p><p>14:00 Is Reverse Engineering Offensive or Defensive?</p><p>17:00 How Rare Are Full-Time RE Roles?</p><p>21:00 The Path to Google: Chronicle, Mandiant &amp; FLARE</p><p>25:00 Learning Through Teaching and YouTube Content</p><p>28:00 Black Hat NOC Story: Catching Atomic Stealer Live</p><p>33:00 Using AI to Create Malware Training Samples</p><p>37:00 Building a Defang Tool (and .NET Nightmares)</p><p>40:00 Advice for Blue Teamers: Go Low-Level</p><p><br></p><p>🎧 Find Josh Stroschein:</p><p>→ Website: https://www.thecyberyeti.com</p><p>→ YouTube: The Cyber Yeti</p><p>→ Podcast: The Cyber Yeti Podcast</p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fdec267-9078-43df-8b3a-d6ecb0f73017</guid>
      <link>https://simplydefensive.transistor.fm/s5/7</link>
      <description>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built.</p><p><br>Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatLocker, he shapes the tools defenders use daily—from allow listing to compliance automation.</p><p><strong><br>Episode Highlights:</strong></p><ul><li>What product managers actually do at security companies</li><li>APT attack patterns: social engineering meets technical exploitation</li><li>How allow listing, ring fencing, and network control protect endpoints</li><li>Defense Against Configuration (DAC): automating FedRAMP, HIPAA, and NIST compliance</li><li>Why misconfigurations remain one of the biggest security gaps</li><li>Balancing strict security with real-world usability</li><li>Yuriy's top advice for defenders: Educate your personnel</li></ul><p><strong>Key Takeaway:</strong> Most breaches still come from employees clicking without paying attention. Security products matter, but user education accounts for the largest share of issues. Yuriy also emphasizes that when compliance drift happens—when systems become uncompliant—it should trigger an investigation into what changed and why.</p><p><strong><br>Resources Mentioned:</strong></p><ul><li>ThreatLocker Zero Trust Endpoint Protection</li><li>Defense Against Configuration (DAC) for compliance monitoring</li><li>Zero Trust World Conference</li></ul><p>Perfect for blue teamers, SOC analysts, security engineers, and anyone interested in how security products evolve from concept to deployment.</p><p>Connect with Yuriy Tsibere (Guest) on LinkedIn: <a href="https://www.linkedin.com/in/yuriy-tsibere/">https://www.linkedin.com/in/yuriy-tsibere/</a></p><p><br></p><p>🔗 Links &amp; Resources: <br>→ ThreatLocker Free Trial: <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive </a><br>→ Zero Trust World Conference: <a href="https://www.intlcybersec.org/zerotrustworldmain">https://www.intlcybersec.org/zerotrustworldmain</a></p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built.</p><p><br>Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatLocker, he shapes the tools defenders use daily—from allow listing to compliance automation.</p><p><strong><br>Episode Highlights:</strong></p><ul><li>What product managers actually do at security companies</li><li>APT attack patterns: social engineering meets technical exploitation</li><li>How allow listing, ring fencing, and network control protect endpoints</li><li>Defense Against Configuration (DAC): automating FedRAMP, HIPAA, and NIST compliance</li><li>Why misconfigurations remain one of the biggest security gaps</li><li>Balancing strict security with real-world usability</li><li>Yuriy's top advice for defenders: Educate your personnel</li></ul><p><strong>Key Takeaway:</strong> Most breaches still come from employees clicking without paying attention. Security products matter, but user education accounts for the largest share of issues. Yuriy also emphasizes that when compliance drift happens—when systems become uncompliant—it should trigger an investigation into what changed and why.</p><p><strong><br>Resources Mentioned:</strong></p><ul><li>ThreatLocker Zero Trust Endpoint Protection</li><li>Defense Against Configuration (DAC) for compliance monitoring</li><li>Zero Trust World Conference</li></ul><p>Perfect for blue teamers, SOC analysts, security engineers, and anyone interested in how security products evolve from concept to deployment.</p><p>Connect with Yuriy Tsibere (Guest) on LinkedIn: <a href="https://www.linkedin.com/in/yuriy-tsibere/">https://www.linkedin.com/in/yuriy-tsibere/</a></p><p><br></p><p>🔗 Links &amp; Resources: <br>→ ThreatLocker Free Trial: <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive </a><br>→ Zero Trust World Conference: <a href="https://www.intlcybersec.org/zerotrustworldmain">https://www.intlcybersec.org/zerotrustworldmain</a></p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Nov 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/e879b671/5fd14a52.mp3" length="52587154" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2188</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built.</p><p><br>Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatLocker, he shapes the tools defenders use daily—from allow listing to compliance automation.</p><p><strong><br>Episode Highlights:</strong></p><ul><li>What product managers actually do at security companies</li><li>APT attack patterns: social engineering meets technical exploitation</li><li>How allow listing, ring fencing, and network control protect endpoints</li><li>Defense Against Configuration (DAC): automating FedRAMP, HIPAA, and NIST compliance</li><li>Why misconfigurations remain one of the biggest security gaps</li><li>Balancing strict security with real-world usability</li><li>Yuriy's top advice for defenders: Educate your personnel</li></ul><p><strong>Key Takeaway:</strong> Most breaches still come from employees clicking without paying attention. Security products matter, but user education accounts for the largest share of issues. Yuriy also emphasizes that when compliance drift happens—when systems become uncompliant—it should trigger an investigation into what changed and why.</p><p><strong><br>Resources Mentioned:</strong></p><ul><li>ThreatLocker Zero Trust Endpoint Protection</li><li>Defense Against Configuration (DAC) for compliance monitoring</li><li>Zero Trust World Conference</li></ul><p>Perfect for blue teamers, SOC analysts, security engineers, and anyone interested in how security products evolve from concept to deployment.</p><p>Connect with Yuriy Tsibere (Guest) on LinkedIn: <a href="https://www.linkedin.com/in/yuriy-tsibere/">https://www.linkedin.com/in/yuriy-tsibere/</a></p><p><br></p><p>🔗 Links &amp; Resources: <br>→ ThreatLocker Free Trial: <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive </a><br>→ Zero Trust World Conference: <a href="https://www.intlcybersec.org/zerotrustworldmain">https://www.intlcybersec.org/zerotrustworldmain</a></p><p><br><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd6391be-aff9-455a-aade-ed355425ba76</guid>
      <link>https://simplydefensive.transistor.fm/s5/6</link>
      <description>
        <![CDATA[<p>From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️</p><p><br></p><p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Andy Runyan from Yukon</strong> to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and baseball coach to becoming a cyber insurance specialist, and explains why understanding your policy is just as important as your incident response plan.</p><p><br></p><p><strong>What you'll hear:</strong><br>🔹 How cyber insurance actually works (and what it doesn't cover)<br>🔹 Why having an incident response retainer matters — before you need it<br>🔹 The role of cyber insurance in incident response and recovery<br>🔹 Third-party contract requirements and state mandates on the rise<br>🔹 Common mistakes companies make when filing claims<br>🔹 FTC Safeguard Rules and what they mean for businesses<br>🔹 How to prepare your organization for cyber insurance requirements<br>🔹 What lowers premiums (and what should, but doesn't)</p><p><br></p><p><strong>Why This Matters for Blue Teamers:</strong><br>If you're in a SOC or handling incident response, you <em>will</em> interact with cyber insurance at some point. Understanding how policies work, what triggers coverage, and how to prepare can make the difference between a smooth recovery and a catastrophic financial loss. This episode gives you the insider knowledge to help your organization be ready.</p><p><br></p><p><strong>⏱️ Timestamps:</strong><br>00:00 Introduction and Welcome<br>00:15 Andy's Unique Background: From Teacher to Cyber Insurance<br>03:00 Getting Into Cyber Insurance in 2019<br>04:00 The Wild West of Cyber Insurance During COVID<br>06:00 When Companies Actually Buy Cyber Insurance<br>08:00 What Blue Teamers Need to Know About Insurance<br>10:00 The Problem with Incident Response Retainers<br>12:00 How Insurance Companies Handle IR vs. What You Need<br>15:00 Multi-Factor Authentication and Premium Discounts<br>18:00 Why Having an IR Plan Doesn't Lower Your Premium (But Should)<br>21:00 Third-Party Contract Requirements on the Rise<br>24:00 State Mandates: What's Coming Next?<br>27:00 FTC Safeguard Rules and Compliance Reality<br>30:00 Where to Learn More About Yukon</p><p><br></p><p><strong>🔗 Connect with Andy Runyan:</strong><br>→ Yukon Website: <a href="https://www.ukon.com">https://www.ukon.com<br></a>→ LinkedIn: <a href="https://www.linkedin.com/in/andy-runyan">https://www.linkedin.com/in/andy-runyan<br></a>→ Email: <a href="mailto:andy.runyan@ukon.com">andy.runyan@ukon.com</a></p><p><br></p><p><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️</p><p><br></p><p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Andy Runyan from Yukon</strong> to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and baseball coach to becoming a cyber insurance specialist, and explains why understanding your policy is just as important as your incident response plan.</p><p><br></p><p><strong>What you'll hear:</strong><br>🔹 How cyber insurance actually works (and what it doesn't cover)<br>🔹 Why having an incident response retainer matters — before you need it<br>🔹 The role of cyber insurance in incident response and recovery<br>🔹 Third-party contract requirements and state mandates on the rise<br>🔹 Common mistakes companies make when filing claims<br>🔹 FTC Safeguard Rules and what they mean for businesses<br>🔹 How to prepare your organization for cyber insurance requirements<br>🔹 What lowers premiums (and what should, but doesn't)</p><p><br></p><p><strong>Why This Matters for Blue Teamers:</strong><br>If you're in a SOC or handling incident response, you <em>will</em> interact with cyber insurance at some point. Understanding how policies work, what triggers coverage, and how to prepare can make the difference between a smooth recovery and a catastrophic financial loss. This episode gives you the insider knowledge to help your organization be ready.</p><p><br></p><p><strong>⏱️ Timestamps:</strong><br>00:00 Introduction and Welcome<br>00:15 Andy's Unique Background: From Teacher to Cyber Insurance<br>03:00 Getting Into Cyber Insurance in 2019<br>04:00 The Wild West of Cyber Insurance During COVID<br>06:00 When Companies Actually Buy Cyber Insurance<br>08:00 What Blue Teamers Need to Know About Insurance<br>10:00 The Problem with Incident Response Retainers<br>12:00 How Insurance Companies Handle IR vs. What You Need<br>15:00 Multi-Factor Authentication and Premium Discounts<br>18:00 Why Having an IR Plan Doesn't Lower Your Premium (But Should)<br>21:00 Third-Party Contract Requirements on the Rise<br>24:00 State Mandates: What's Coming Next?<br>27:00 FTC Safeguard Rules and Compliance Reality<br>30:00 Where to Learn More About Yukon</p><p><br></p><p><strong>🔗 Connect with Andy Runyan:</strong><br>→ Yukon Website: <a href="https://www.ukon.com">https://www.ukon.com<br></a>→ LinkedIn: <a href="https://www.linkedin.com/in/andy-runyan">https://www.linkedin.com/in/andy-runyan<br></a>→ Email: <a href="mailto:andy.runyan@ukon.com">andy.runyan@ukon.com</a></p><p><br></p><p><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Nov 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/6b3ca877/28d96a96.mp3" length="47438719" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1974</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️</p><p><br></p><p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Andy Runyan from Yukon</strong> to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and baseball coach to becoming a cyber insurance specialist, and explains why understanding your policy is just as important as your incident response plan.</p><p><br></p><p><strong>What you'll hear:</strong><br>🔹 How cyber insurance actually works (and what it doesn't cover)<br>🔹 Why having an incident response retainer matters — before you need it<br>🔹 The role of cyber insurance in incident response and recovery<br>🔹 Third-party contract requirements and state mandates on the rise<br>🔹 Common mistakes companies make when filing claims<br>🔹 FTC Safeguard Rules and what they mean for businesses<br>🔹 How to prepare your organization for cyber insurance requirements<br>🔹 What lowers premiums (and what should, but doesn't)</p><p><br></p><p><strong>Why This Matters for Blue Teamers:</strong><br>If you're in a SOC or handling incident response, you <em>will</em> interact with cyber insurance at some point. Understanding how policies work, what triggers coverage, and how to prepare can make the difference between a smooth recovery and a catastrophic financial loss. This episode gives you the insider knowledge to help your organization be ready.</p><p><br></p><p><strong>⏱️ Timestamps:</strong><br>00:00 Introduction and Welcome<br>00:15 Andy's Unique Background: From Teacher to Cyber Insurance<br>03:00 Getting Into Cyber Insurance in 2019<br>04:00 The Wild West of Cyber Insurance During COVID<br>06:00 When Companies Actually Buy Cyber Insurance<br>08:00 What Blue Teamers Need to Know About Insurance<br>10:00 The Problem with Incident Response Retainers<br>12:00 How Insurance Companies Handle IR vs. What You Need<br>15:00 Multi-Factor Authentication and Premium Discounts<br>18:00 Why Having an IR Plan Doesn't Lower Your Premium (But Should)<br>21:00 Third-Party Contract Requirements on the Rise<br>24:00 State Mandates: What's Coming Next?<br>27:00 FTC Safeguard Rules and Compliance Reality<br>30:00 Where to Learn More About Yukon</p><p><br></p><p><strong>🔗 Connect with Andy Runyan:</strong><br>→ Yukon Website: <a href="https://www.ukon.com">https://www.ukon.com<br></a>→ LinkedIn: <a href="https://www.linkedin.com/in/andy-runyan">https://www.linkedin.com/in/andy-runyan<br></a>→ Email: <a href="mailto:andy.runyan@ukon.com">andy.runyan@ukon.com</a></p><p><br></p><p><strong>👥 Connect with the Hosts:</strong><br>→ Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason/">https://www.linkedin.com/in/joshuacmason/<br></a>→ Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs/">https://www.linkedin.com/in/wadingthrulogs/<br></a>→ Swimlane: <a href="https://www.linkedin.com/company/swimlane">https://www.linkedin.com/company/swimlane</a></p><p><br></p><p><strong>🎙️ Listen on Your Favorite Platform:</strong><br>→ Spotify: <a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4">https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a>→ Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182">https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182<br></a>→ Full Playlist: <a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4">https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4</a></p><p><br></p><p><strong>👍 If you enjoyed this episode,</strong> don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.</p><p><br>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building Forensics Tools That Last | Brian Carrier (Autopsy, Sleuth Kit)</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Building Forensics Tools That Last | Brian Carrier (Autopsy, Sleuth Kit)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0982c621-e2d1-4bf6-b904-321186699e9d</guid>
      <link>https://simplydefensive.transistor.fm/s5/5</link>
      <description>
        <![CDATA[<p>Josh Mason and Wade Wells sit down with Brian Carrier, the creator of Sleuth Kit and Autopsy, two of the most widely used digital forensics tools in the world. They dig into how Brian got his start in the early days of computer forensics, how open source shaped his career, and what he’s building now with Cyber Triage.</p><p>From stories about government funding and tool rewrites to the evolving balance between open source and commercial software, this episode is packed with insight for blue teamers, DFIR pros, and anyone who cares about investigation tooling that actually works.</p><p>Watch to hear:</p><ul><li>The 25-year evolution of Sleuth Kit &amp; Autopsy</li><li>How Cyber Triage simplifies investigations for SOCs</li><li>The tradeoffs between open source and commercial tools</li><li>What Brian sees next in AI-driven forensics</li></ul><p><br></p><p>⏱️ <strong>Timestamps:<br></strong> 00:00 Introduction and Guest Introduction<br> 00:15 Brian Carrier's Journey with Sleuth Kit and Autopsy<br> 02:06 Evolution and Funding of Autopsy<br> 06:52 Open Source vs. Commercial Software<br> 10:16 Future Roadmap and Innovations<br> 14:16 Autopsy and Cyber Triage for Blue Teamers<br> 16:24 Challenges in EDR and SOC Analysis<br> 16:41 Investigative Process and Clues<br> 17:18 Handling Noisy Data in EDR<br> 17:49 Importance of Tracing Malware<br> 18:28 Deploying Additional Collectors<br> 19:25 Feedback from the Community<br> 21:21 Cyber Insurance and Incident Response<br> 23:34 Automation in Forensics<br> 28:41 Advice for Blue Teamers<br> 30:12 Conclusion and Final Thoughts</p><p><strong>Links:<br></strong> 🎧 Listen on Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a> 🍎 Listen on Apple Podcasts:<a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478"> https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478<br></a> 💻 Learn more about Sleuth Kit:<a href="https://sleuthkit.org/"> https://sleuthkit.org/<br></a> 🔍 Try Autopsy:<a href="https://www.autopsy.com/"> https://www.autopsy.com/<br></a> 🧠 Explore Cyber Triage:<a href="https://www.cybertriage.com/"> https://www.cybertriage.com/<br></a><br></p><p><strong>Connect with Brain:</strong><a href="https://www.linkedin.com/in/wadingthrulogs/"><br></a> 👤 Brian Carrier on LinkedIn:<a href="https://www.linkedin.com/in/brian-carrier-169243/"> https://www.linkedin.com/in/brian-carrier-169243/<br></a> 🏢 Sleuth Kit / Basis Technology on LinkedIn:<a href="https://www.linkedin.com/company/basis-technology/"> https://www.linkedin.com/company/basis-technology/<br></a> 💼 Cyber Triage on LinkedIn:<a href="https://www.linkedin.com/company/cyber-triage/"> https://www.linkedin.com/company/cyber-triage/<br></a><br></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber <br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Josh Mason and Wade Wells sit down with Brian Carrier, the creator of Sleuth Kit and Autopsy, two of the most widely used digital forensics tools in the world. They dig into how Brian got his start in the early days of computer forensics, how open source shaped his career, and what he’s building now with Cyber Triage.</p><p>From stories about government funding and tool rewrites to the evolving balance between open source and commercial software, this episode is packed with insight for blue teamers, DFIR pros, and anyone who cares about investigation tooling that actually works.</p><p>Watch to hear:</p><ul><li>The 25-year evolution of Sleuth Kit &amp; Autopsy</li><li>How Cyber Triage simplifies investigations for SOCs</li><li>The tradeoffs between open source and commercial tools</li><li>What Brian sees next in AI-driven forensics</li></ul><p><br></p><p>⏱️ <strong>Timestamps:<br></strong> 00:00 Introduction and Guest Introduction<br> 00:15 Brian Carrier's Journey with Sleuth Kit and Autopsy<br> 02:06 Evolution and Funding of Autopsy<br> 06:52 Open Source vs. Commercial Software<br> 10:16 Future Roadmap and Innovations<br> 14:16 Autopsy and Cyber Triage for Blue Teamers<br> 16:24 Challenges in EDR and SOC Analysis<br> 16:41 Investigative Process and Clues<br> 17:18 Handling Noisy Data in EDR<br> 17:49 Importance of Tracing Malware<br> 18:28 Deploying Additional Collectors<br> 19:25 Feedback from the Community<br> 21:21 Cyber Insurance and Incident Response<br> 23:34 Automation in Forensics<br> 28:41 Advice for Blue Teamers<br> 30:12 Conclusion and Final Thoughts</p><p><strong>Links:<br></strong> 🎧 Listen on Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a> 🍎 Listen on Apple Podcasts:<a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478"> https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478<br></a> 💻 Learn more about Sleuth Kit:<a href="https://sleuthkit.org/"> https://sleuthkit.org/<br></a> 🔍 Try Autopsy:<a href="https://www.autopsy.com/"> https://www.autopsy.com/<br></a> 🧠 Explore Cyber Triage:<a href="https://www.cybertriage.com/"> https://www.cybertriage.com/<br></a><br></p><p><strong>Connect with Brain:</strong><a href="https://www.linkedin.com/in/wadingthrulogs/"><br></a> 👤 Brian Carrier on LinkedIn:<a href="https://www.linkedin.com/in/brian-carrier-169243/"> https://www.linkedin.com/in/brian-carrier-169243/<br></a> 🏢 Sleuth Kit / Basis Technology on LinkedIn:<a href="https://www.linkedin.com/company/basis-technology/"> https://www.linkedin.com/company/basis-technology/<br></a> 💼 Cyber Triage on LinkedIn:<a href="https://www.linkedin.com/company/cyber-triage/"> https://www.linkedin.com/company/cyber-triage/<br></a><br></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber <br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Nov 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/ad9a9daa/65f7c103.mp3" length="45672016" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1900</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Josh Mason and Wade Wells sit down with Brian Carrier, the creator of Sleuth Kit and Autopsy, two of the most widely used digital forensics tools in the world. They dig into how Brian got his start in the early days of computer forensics, how open source shaped his career, and what he’s building now with Cyber Triage.</p><p>From stories about government funding and tool rewrites to the evolving balance between open source and commercial software, this episode is packed with insight for blue teamers, DFIR pros, and anyone who cares about investigation tooling that actually works.</p><p>Watch to hear:</p><ul><li>The 25-year evolution of Sleuth Kit &amp; Autopsy</li><li>How Cyber Triage simplifies investigations for SOCs</li><li>The tradeoffs between open source and commercial tools</li><li>What Brian sees next in AI-driven forensics</li></ul><p><br></p><p>⏱️ <strong>Timestamps:<br></strong> 00:00 Introduction and Guest Introduction<br> 00:15 Brian Carrier's Journey with Sleuth Kit and Autopsy<br> 02:06 Evolution and Funding of Autopsy<br> 06:52 Open Source vs. Commercial Software<br> 10:16 Future Roadmap and Innovations<br> 14:16 Autopsy and Cyber Triage for Blue Teamers<br> 16:24 Challenges in EDR and SOC Analysis<br> 16:41 Investigative Process and Clues<br> 17:18 Handling Noisy Data in EDR<br> 17:49 Importance of Tracing Malware<br> 18:28 Deploying Additional Collectors<br> 19:25 Feedback from the Community<br> 21:21 Cyber Insurance and Incident Response<br> 23:34 Automation in Forensics<br> 28:41 Advice for Blue Teamers<br> 30:12 Conclusion and Final Thoughts</p><p><strong>Links:<br></strong> 🎧 Listen on Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br></a> 🍎 Listen on Apple Podcasts:<a href="https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478"> https://podcasts.apple.com/us/podcast/simply-defensive/id1668519478<br></a> 💻 Learn more about Sleuth Kit:<a href="https://sleuthkit.org/"> https://sleuthkit.org/<br></a> 🔍 Try Autopsy:<a href="https://www.autopsy.com/"> https://www.autopsy.com/<br></a> 🧠 Explore Cyber Triage:<a href="https://www.cybertriage.com/"> https://www.cybertriage.com/<br></a><br></p><p><strong>Connect with Brain:</strong><a href="https://www.linkedin.com/in/wadingthrulogs/"><br></a> 👤 Brian Carrier on LinkedIn:<a href="https://www.linkedin.com/in/brian-carrier-169243/"> https://www.linkedin.com/in/brian-carrier-169243/<br></a> 🏢 Sleuth Kit / Basis Technology on LinkedIn:<a href="https://www.linkedin.com/company/basis-technology/"> https://www.linkedin.com/company/basis-technology/<br></a> 💼 Cyber Triage on LinkedIn:<a href="https://www.linkedin.com/company/cyber-triage/"> https://www.linkedin.com/company/cyber-triage/<br></a><br></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber <br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ad9a9daa/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Balancing Education and Real-World Cybersecurity with a SOC Analyst Student</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Balancing Education and Real-World Cybersecurity with a SOC Analyst Student</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b888e856-3383-49da-a299-c235bc547b61</guid>
      <link>https://simplydefensive.transistor.fm/s5/4</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV.</p><p>The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares insights from her studies and practical work, including developing a SOC program at UNLV and addressing common cybersecurity misconceptions.</p><p>The episode highlights the importance of communication, real-world projects, continuous learning, and the balance between technical and business aspects of cybersecurity.</p><p>00:00 Introduction and Host Banter<br>00:20 Guest Introduction: Victoria<br>01:03 Building a SOC: Challenges and Experiences<br>01:29 Education vs. Real-World Experience<br>02:29 SOC Class and Practical Training<br>03:49 Group Projects and Communication<br>07:14 Real-Life Incident Stories<br>10:33 Getting into Cybersecurity: Victoria's Journey<br>12:54 Business Side of Cybersecurity<br>16:17 The Cost of MFA and Free Alternatives<br>16:31 Lock Picking and Security Value<br>17:30 Teaching Cybersecurity Concepts<br>18:44 Consulting Experience for Students<br>19:15 Client Feedback and Confidential Reports<br>19:52 Challenges in Cybersecurity Projects<br>20:27 Transitioning into the SOC<br>22:34 Federal and State Regulations<br>26:16 Advice for Blue Teamers<br>28:06 Conclusion and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br><a href="https://SimplyCyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV.</p><p>The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares insights from her studies and practical work, including developing a SOC program at UNLV and addressing common cybersecurity misconceptions.</p><p>The episode highlights the importance of communication, real-world projects, continuous learning, and the balance between technical and business aspects of cybersecurity.</p><p>00:00 Introduction and Host Banter<br>00:20 Guest Introduction: Victoria<br>01:03 Building a SOC: Challenges and Experiences<br>01:29 Education vs. Real-World Experience<br>02:29 SOC Class and Practical Training<br>03:49 Group Projects and Communication<br>07:14 Real-Life Incident Stories<br>10:33 Getting into Cybersecurity: Victoria's Journey<br>12:54 Business Side of Cybersecurity<br>16:17 The Cost of MFA and Free Alternatives<br>16:31 Lock Picking and Security Value<br>17:30 Teaching Cybersecurity Concepts<br>18:44 Consulting Experience for Students<br>19:15 Client Feedback and Confidential Reports<br>19:52 Challenges in Cybersecurity Projects<br>20:27 Transitioning into the SOC<br>22:34 Federal and State Regulations<br>26:16 Advice for Blue Teamers<br>28:06 Conclusion and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br><a href="https://SimplyCyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Nov 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/c9f9243a/6f6ddd83.mp3" length="45898267" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1910</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV.</p><p>The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares insights from her studies and practical work, including developing a SOC program at UNLV and addressing common cybersecurity misconceptions.</p><p>The episode highlights the importance of communication, real-world projects, continuous learning, and the balance between technical and business aspects of cybersecurity.</p><p>00:00 Introduction and Host Banter<br>00:20 Guest Introduction: Victoria<br>01:03 Building a SOC: Challenges and Experiences<br>01:29 Education vs. Real-World Experience<br>02:29 SOC Class and Practical Training<br>03:49 Group Projects and Communication<br>07:14 Real-Life Incident Stories<br>10:33 Getting into Cybersecurity: Victoria's Journey<br>12:54 Business Side of Cybersecurity<br>16:17 The Cost of MFA and Free Alternatives<br>16:31 Lock Picking and Security Value<br>17:30 Teaching Cybersecurity Concepts<br>18:44 Consulting Experience for Students<br>19:15 Client Feedback and Confidential Reports<br>19:52 Challenges in Cybersecurity Projects<br>20:27 Transitioning into the SOC<br>22:34 Federal and State Regulations<br>26:16 Advice for Blue Teamers<br>28:06 Conclusion and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control. <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a></p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br><a href="https://SimplyCyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Blue Team, SOC Analyst, Cyber Education, UNLV, Incident Response, Josh Mason, Wade Wells, Simply Defensive Podcast, Student Cybersecurity, Communication, Tabletop Exercises, Cyber Career, Human Factors, MFA, Small Business Security, Ransomware, University SOC, Cyber Awareness</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Help Desk to SOC: How KevTech Broke Into Cybersecurity Without Certs</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>From Help Desk to SOC: How KevTech Broke Into Cybersecurity Without Certs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d98af0cb-c13a-425a-9cd7-c407a1e938dc</guid>
      <link>https://simplydefensive.transistor.fm/s5/3</link>
      <description>
        <![CDATA[<p>What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC?</p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification.</p><p>Kev gets real about what it’s actually like to land your first SOC role: the flood of alerts, the burnout, learning Excel the hard way, and relying on ChatGPT to survive scripting. He also shares how TryHackMe, Hack The Box, and constant hands-on practice built the foundation for his success.</p><p>If you’ve ever wondered what breaking into cybersecurity really looks like, this conversation pulls back the curtain — no fluff, no spin, just honest talk from the trenches.</p><p>Chapters:<br>00:00 Introduction and Welcome<br>00:29 Guest Introduction: Kev Apolinario<br>00:51 Transition to SOC Analyst Role<br>01:53 Challenges and Learning in Cybersecurity<br>06:43 Handling Alerts and Fatigue<br>10:26 Importance of Teamwork and Asking for Help<br>19:56 Executive Support Experience<br>27:02 Advice for Aspiring Blue Teamers</p><p>Follow Kevin on YouTube: <a href="https://youtube.com/@KevtechITSupport">https://youtube.com/@kevtechitsupport</a><br>Connect with Kevin on LinkedIn: <a href="https://www.linkedin.com/in/itprofessionalkevinapolinario">https://www.linkedin.com/in/itprofessionalkevinapolinario</a></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC?</p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification.</p><p>Kev gets real about what it’s actually like to land your first SOC role: the flood of alerts, the burnout, learning Excel the hard way, and relying on ChatGPT to survive scripting. He also shares how TryHackMe, Hack The Box, and constant hands-on practice built the foundation for his success.</p><p>If you’ve ever wondered what breaking into cybersecurity really looks like, this conversation pulls back the curtain — no fluff, no spin, just honest talk from the trenches.</p><p>Chapters:<br>00:00 Introduction and Welcome<br>00:29 Guest Introduction: Kev Apolinario<br>00:51 Transition to SOC Analyst Role<br>01:53 Challenges and Learning in Cybersecurity<br>06:43 Handling Alerts and Fatigue<br>10:26 Importance of Teamwork and Asking for Help<br>19:56 Executive Support Experience<br>27:02 Advice for Aspiring Blue Teamers</p><p>Follow Kevin on YouTube: <a href="https://youtube.com/@KevtechITSupport">https://youtube.com/@kevtechitsupport</a><br>Connect with Kevin on LinkedIn: <a href="https://www.linkedin.com/in/itprofessionalkevinapolinario">https://www.linkedin.com/in/itprofessionalkevinapolinario</a></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Oct 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/dbdf27c5/8de974c8.mp3" length="42783976" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1780</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC?</p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification.</p><p>Kev gets real about what it’s actually like to land your first SOC role: the flood of alerts, the burnout, learning Excel the hard way, and relying on ChatGPT to survive scripting. He also shares how TryHackMe, Hack The Box, and constant hands-on practice built the foundation for his success.</p><p>If you’ve ever wondered what breaking into cybersecurity really looks like, this conversation pulls back the curtain — no fluff, no spin, just honest talk from the trenches.</p><p>Chapters:<br>00:00 Introduction and Welcome<br>00:29 Guest Introduction: Kev Apolinario<br>00:51 Transition to SOC Analyst Role<br>01:53 Challenges and Learning in Cybersecurity<br>06:43 Handling Alerts and Fatigue<br>10:26 Importance of Teamwork and Asking for Help<br>19:56 Executive Support Experience<br>27:02 Advice for Aspiring Blue Teamers</p><p>Follow Kevin on YouTube: <a href="https://youtube.com/@KevtechITSupport">https://youtube.com/@kevtechitsupport</a><br>Connect with Kevin on LinkedIn: <a href="https://www.linkedin.com/in/itprofessionalkevinapolinario">https://www.linkedin.com/in/itprofessionalkevinapolinario</a></p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/dbdf27c5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Detection Engineering Tutorial: Cloud Security, Kubernetes Logging &amp; SOC Career Path</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Detection Engineering Tutorial: Cloud Security, Kubernetes Logging &amp; SOC Career Path</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85fc9280-b324-4747-a30b-a19c81c90fe3</guid>
      <link>https://simplydefensive.transistor.fm/s5/2</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity.</p><p><strong><br>What We Cover:</strong></p><ul><li>What detection engineering actually means in 2025</li><li>Working with dual-cloud environments (AWS + GCP)</li><li>The challenges of Kubernetes logging and ephemeral containers</li><li>SANS FOR508 (Digital Forensics and Threat Hunting) experience</li><li>How to avoid burnout in InfoSec</li><li>Building a SOC career: What do entry-level analysts really need to know?</li><li>Work-life balance with kids and an ambitious security career</li><li>DefCon stories and the Octopus Games competition</li></ul><p><strong>Resources &amp; Links Mentioned:</strong></p><ul><li>Live Overflow's Hextree.io learning platform:<a href="https://hextree.io"> https://hextree.io</a></li><li>SANS FOR508 (GCFA):<a href="https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/"> https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/</a></li><li>Marcus Hutchins (MalwareTech) on LinkedIn:<a href="https://www.linkedin.com/in/malwaretech/"> https://www.linkedin.com/in/malwaretech/</a></li><li>Graham Helton's Kubernetes security work:<a href="https://www.linkedin.com/in/grahamhelton3/"> https://www.linkedin.com/in/grahamhelton3/</a></li><li>Simply Defensive Podcast:<a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4"> https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br></a><br></li></ul><p><strong>Connect with JB:</strong></p><ul><li>YouTube: @JBCulbert</li><li>Twitter/X: @JBTweetsStuff</li></ul><p><br></p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction and Guest Welcome</p><p>00:50 JB's Day-to-Day Role in Cybersecurity</p><p>01:47 Past Experiences and Career Journey</p><p>02:27 Challenges in Detection Engineering</p><p>03:23 Kubernetes and Incident Investigation</p><p>03:51 SANS Classes and CTF Experiences</p><p>09:07 Remote vs In-Person Learning</p><p>11:21 Future Plans and Learning Platforms</p><p>14:13 Docker and Kubernetes in Labs</p><p>16:11 The Reality of Cybersecurity Skills</p><p>16:40 Defcon and Octopus Games</p><p>22:04 Balancing Cybersecurity and Personal Life</p><p>31:01 Advice for Aspiring Blue Teamers</p><p>32:57 Final Thoughts and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity.</p><p><strong><br>What We Cover:</strong></p><ul><li>What detection engineering actually means in 2025</li><li>Working with dual-cloud environments (AWS + GCP)</li><li>The challenges of Kubernetes logging and ephemeral containers</li><li>SANS FOR508 (Digital Forensics and Threat Hunting) experience</li><li>How to avoid burnout in InfoSec</li><li>Building a SOC career: What do entry-level analysts really need to know?</li><li>Work-life balance with kids and an ambitious security career</li><li>DefCon stories and the Octopus Games competition</li></ul><p><strong>Resources &amp; Links Mentioned:</strong></p><ul><li>Live Overflow's Hextree.io learning platform:<a href="https://hextree.io"> https://hextree.io</a></li><li>SANS FOR508 (GCFA):<a href="https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/"> https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/</a></li><li>Marcus Hutchins (MalwareTech) on LinkedIn:<a href="https://www.linkedin.com/in/malwaretech/"> https://www.linkedin.com/in/malwaretech/</a></li><li>Graham Helton's Kubernetes security work:<a href="https://www.linkedin.com/in/grahamhelton3/"> https://www.linkedin.com/in/grahamhelton3/</a></li><li>Simply Defensive Podcast:<a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4"> https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br></a><br></li></ul><p><strong>Connect with JB:</strong></p><ul><li>YouTube: @JBCulbert</li><li>Twitter/X: @JBTweetsStuff</li></ul><p><br></p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction and Guest Welcome</p><p>00:50 JB's Day-to-Day Role in Cybersecurity</p><p>01:47 Past Experiences and Career Journey</p><p>02:27 Challenges in Detection Engineering</p><p>03:23 Kubernetes and Incident Investigation</p><p>03:51 SANS Classes and CTF Experiences</p><p>09:07 Remote vs In-Person Learning</p><p>11:21 Future Plans and Learning Platforms</p><p>14:13 Docker and Kubernetes in Labs</p><p>16:11 The Reality of Cybersecurity Skills</p><p>16:40 Defcon and Octopus Games</p><p>22:04 Balancing Cybersecurity and Personal Life</p><p>31:01 Advice for Aspiring Blue Teamers</p><p>32:57 Final Thoughts and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/ad1f0b96/8fc0ca0a.mp3" length="50070628" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2084</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity.</p><p><strong><br>What We Cover:</strong></p><ul><li>What detection engineering actually means in 2025</li><li>Working with dual-cloud environments (AWS + GCP)</li><li>The challenges of Kubernetes logging and ephemeral containers</li><li>SANS FOR508 (Digital Forensics and Threat Hunting) experience</li><li>How to avoid burnout in InfoSec</li><li>Building a SOC career: What do entry-level analysts really need to know?</li><li>Work-life balance with kids and an ambitious security career</li><li>DefCon stories and the Octopus Games competition</li></ul><p><strong>Resources &amp; Links Mentioned:</strong></p><ul><li>Live Overflow's Hextree.io learning platform:<a href="https://hextree.io"> https://hextree.io</a></li><li>SANS FOR508 (GCFA):<a href="https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/"> https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/</a></li><li>Marcus Hutchins (MalwareTech) on LinkedIn:<a href="https://www.linkedin.com/in/malwaretech/"> https://www.linkedin.com/in/malwaretech/</a></li><li>Graham Helton's Kubernetes security work:<a href="https://www.linkedin.com/in/grahamhelton3/"> https://www.linkedin.com/in/grahamhelton3/</a></li><li>Simply Defensive Podcast:<a href="https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4"> https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br></a><br></li></ul><p><strong>Connect with JB:</strong></p><ul><li>YouTube: @JBCulbert</li><li>Twitter/X: @JBTweetsStuff</li></ul><p><br></p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction and Guest Welcome</p><p>00:50 JB's Day-to-Day Role in Cybersecurity</p><p>01:47 Past Experiences and Career Journey</p><p>02:27 Challenges in Detection Engineering</p><p>03:23 Kubernetes and Incident Investigation</p><p>03:51 SANS Classes and CTF Experiences</p><p>09:07 Remote vs In-Person Learning</p><p>11:21 Future Plans and Learning Platforms</p><p>14:13 Docker and Kubernetes in Labs</p><p>16:11 The Reality of Cybersecurity Skills</p><p>16:40 Defcon and Octopus Games</p><p>22:04 Balancing Cybersecurity and Personal Life</p><p>31:01 Advice for Aspiring Blue Teamers</p><p>32:57 Final Thoughts and Farewell</p><p>Don't forget to like, subscribe, and hit the bell icon for more blue team content!</p><p><br>🔗 <strong>Follow the hosts:<br></strong>Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a>Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p><p><br>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by<a href="https://www.threatlocker.com/simplydefensive"> @ThreatLocker </a>- Free 30-day trial visit:<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber  <br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hands-On Defense: Markus Schober on DFIR, Labs, and Building Better Blue Teamers</title>
      <itunes:season>5</itunes:season>
      <podcast:season>5</podcast:season>
      <itunes:title>Hands-On Defense: Markus Schober on DFIR, Labs, and Building Better Blue Teamers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17d07f6f-f6b7-4b83-a0be-b9459655479b</guid>
      <link>https://simplydefensive.transistor.fm/s5/1</link>
      <description>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with<a href="https://www.linkedin.com/in/markusschober/"> Markus Schober</a>, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time.</p><p><br>We dig into:<br> 🔹 The hidden value of building your own cyber range<br> 🔹 How IR pros train using real attacks (and why they need red team skills)<br> 🔹 Eric Zimmerman's forensics tools and practical lab setups<br> 🔹 Ransomware war stories from Fortune 100 response<br> 🔹 The role (and limitations) of AI in forensics<br> 🔹 How to break into DFIR as a practitioner — not just a paper tiger</p><p><br>Whether you’re building detections, teaching DFIR, or just figuring out where to start, this one’s for you.</p><p>👇 <strong>Timestamps </strong><a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><strong>&amp; Resources<br></strong> 0:00 Intro &amp; ThreatLocker sponsorship<br> 2:00 Markus' journey from responder to trainer<br> 5:00 What makes a good DFIR workshop?<br> 7:00 Building a cyber range that doesn’t suck<br> 10:00 Favorite open-source tools (hint: Zimmerman)<br> 14:00 Consulting vs. in-house IR<br> 19:00 APT10, ransomware, and real-world incidents<br> 24:00 Can AI replace forensic analysts?<br> 27:00 Where to find Markus' courses<br> 29:00 Parting wisdom for aspiring defenders</p><p>📚 <strong>Check out Blue Cape Security:<br></strong>→ <a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><br> → Hands-on IR &amp; Forensics Labs<br> → Certification (coming soon!)</p><p>🔗 <strong>Follow the hosts:<br></strong> Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a> Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br></p><p>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with<a href="https://www.linkedin.com/in/markusschober/"> Markus Schober</a>, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time.</p><p><br>We dig into:<br> 🔹 The hidden value of building your own cyber range<br> 🔹 How IR pros train using real attacks (and why they need red team skills)<br> 🔹 Eric Zimmerman's forensics tools and practical lab setups<br> 🔹 Ransomware war stories from Fortune 100 response<br> 🔹 The role (and limitations) of AI in forensics<br> 🔹 How to break into DFIR as a practitioner — not just a paper tiger</p><p><br>Whether you’re building detections, teaching DFIR, or just figuring out where to start, this one’s for you.</p><p>👇 <strong>Timestamps </strong><a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><strong>&amp; Resources<br></strong> 0:00 Intro &amp; ThreatLocker sponsorship<br> 2:00 Markus' journey from responder to trainer<br> 5:00 What makes a good DFIR workshop?<br> 7:00 Building a cyber range that doesn’t suck<br> 10:00 Favorite open-source tools (hint: Zimmerman)<br> 14:00 Consulting vs. in-house IR<br> 19:00 APT10, ransomware, and real-world incidents<br> 24:00 Can AI replace forensic analysts?<br> 27:00 Where to find Markus' courses<br> 29:00 Parting wisdom for aspiring defenders</p><p>📚 <strong>Check out Blue Cape Security:<br></strong>→ <a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><br> → Hands-on IR &amp; Forensics Labs<br> → Certification (coming soon!)</p><p>🔗 <strong>Follow the hosts:<br></strong> Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a> Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br></p><p>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p>]]>
      </content:encoded>
      <pubDate>Mon, 06 Oct 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/a63293de/51f67a6f.mp3" length="42659950" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1831</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with<a href="https://www.linkedin.com/in/markusschober/"> Markus Schober</a>, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time.</p><p><br>We dig into:<br> 🔹 The hidden value of building your own cyber range<br> 🔹 How IR pros train using real attacks (and why they need red team skills)<br> 🔹 Eric Zimmerman's forensics tools and practical lab setups<br> 🔹 Ransomware war stories from Fortune 100 response<br> 🔹 The role (and limitations) of AI in forensics<br> 🔹 How to break into DFIR as a practitioner — not just a paper tiger</p><p><br>Whether you’re building detections, teaching DFIR, or just figuring out where to start, this one’s for you.</p><p>👇 <strong>Timestamps </strong><a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><strong>&amp; Resources<br></strong> 0:00 Intro &amp; ThreatLocker sponsorship<br> 2:00 Markus' journey from responder to trainer<br> 5:00 What makes a good DFIR workshop?<br> 7:00 Building a cyber range that doesn’t suck<br> 10:00 Favorite open-source tools (hint: Zimmerman)<br> 14:00 Consulting vs. in-house IR<br> 19:00 APT10, ransomware, and real-world incidents<br> 24:00 Can AI replace forensic analysts?<br> 27:00 Where to find Markus' courses<br> 29:00 Parting wisdom for aspiring defenders</p><p>📚 <strong>Check out Blue Cape Security:<br></strong>→ <a href="https://www.bluecapesecurity.com/">https://www.bluecapesecurity.com/</a><br> → Hands-on IR &amp; Forensics Labs<br> → Certification (coming soon!)</p><p>🔗 <strong>Follow the hosts:<br></strong> Josh Mason:<a href="https://www.linkedin.com/in/joshuacmason/"> https://www.linkedin.com/in/joshuacmason/<br></a> Wade Wells:<a href="https://www.linkedin.com/in/wadingthrulogs/"> https://www.linkedin.com/in/wadingthrulogs/<br></a><br></p><p>💡 <strong>Brought to you by ThreatLocker</strong> – Secure your business with zero trust application control.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a9fbae54-4b59-4470-8959-1e55e28ed300</guid>
      <link>https://simplydefensive.transistor.fm/s4/8</link>
      <description>
        <![CDATA[<p>From Army recon missions to building Morado, COO <strong>Jordan Kalm</strong> reveals how military intelligence tactics translate into modern <strong>cyber threat intelligence</strong>. In this <em>Simply Defensive</em> episode, Josh Mason and Wade Wells dive into what <em>really works</em> for blue teams and SOC analysts — and what’s just noise.</p><p>👉 If you’ve ever wondered how to turn raw intel into actionable defense, this conversation is packed with practical takeaways you can use right away.</p><p><br>⏱ <strong>Timestamps<br></strong> 0:00 – Intro &amp; Jordan’s background<br> 4:00 – From infantry recon to threat intel<br> 12:00 – Building a threat intel platform that works<br> 20:00 – What blue teams actually need<br> 33:00 – Advice for new defenders</p><p>🔗 <strong>Connect with Jordan &amp; Morado<br></strong> Jordan Kalm:<a href="https://www.linkedin.com/in/jordan-kalm-2a562b5b/"> https://www.linkedin.com/in/jordan-kalm-2a562b5b/<br></a> Morado:<a href="https://www.morado.io/"> https://www.morado.io/</a></p><p><br>👥 Connect with us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From Army recon missions to building Morado, COO <strong>Jordan Kalm</strong> reveals how military intelligence tactics translate into modern <strong>cyber threat intelligence</strong>. In this <em>Simply Defensive</em> episode, Josh Mason and Wade Wells dive into what <em>really works</em> for blue teams and SOC analysts — and what’s just noise.</p><p>👉 If you’ve ever wondered how to turn raw intel into actionable defense, this conversation is packed with practical takeaways you can use right away.</p><p><br>⏱ <strong>Timestamps<br></strong> 0:00 – Intro &amp; Jordan’s background<br> 4:00 – From infantry recon to threat intel<br> 12:00 – Building a threat intel platform that works<br> 20:00 – What blue teams actually need<br> 33:00 – Advice for new defenders</p><p>🔗 <strong>Connect with Jordan &amp; Morado<br></strong> Jordan Kalm:<a href="https://www.linkedin.com/in/jordan-kalm-2a562b5b/"> https://www.linkedin.com/in/jordan-kalm-2a562b5b/<br></a> Morado:<a href="https://www.morado.io/"> https://www.morado.io/</a></p><p><br>👥 Connect with us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 15 Sep 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/6f6edce9/9b278f4a.mp3" length="55234380" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1970</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From Army recon missions to building Morado, COO <strong>Jordan Kalm</strong> reveals how military intelligence tactics translate into modern <strong>cyber threat intelligence</strong>. In this <em>Simply Defensive</em> episode, Josh Mason and Wade Wells dive into what <em>really works</em> for blue teams and SOC analysts — and what’s just noise.</p><p>👉 If you’ve ever wondered how to turn raw intel into actionable defense, this conversation is packed with practical takeaways you can use right away.</p><p><br>⏱ <strong>Timestamps<br></strong> 0:00 – Intro &amp; Jordan’s background<br> 4:00 – From infantry recon to threat intel<br> 12:00 – Building a threat intel platform that works<br> 20:00 – What blue teams actually need<br> 33:00 – Advice for new defenders</p><p>🔗 <strong>Connect with Jordan &amp; Morado<br></strong> Jordan Kalm:<a href="https://www.linkedin.com/in/jordan-kalm-2a562b5b/"> https://www.linkedin.com/in/jordan-kalm-2a562b5b/<br></a> Morado:<a href="https://www.morado.io/"> https://www.morado.io/</a></p><p><br>👥 Connect with us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How a Detective Became the Ginger Hacker: SOC Life, Job Hunts &amp; Blue Team Wisdom</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>How a Detective Became the Ginger Hacker: SOC Life, Job Hunts &amp; Blue Team Wisdom</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c32534cb-53dc-4708-8c28-fe823dd180be</guid>
      <link>https://simplydefensive.transistor.fm/s4/7</link>
      <description>
        <![CDATA[<p>From the streets to the SOC. 💻</p><p>In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally dosed the DMV 👀).</p><p>What you’ll hear:<br>🔹 Andrew’s pivot from law enforcement to cybersecurity<br>🔹 SOC life, schedules, and fighting burnout<br>🔹 Job hunting, recruiters, and landing that first role<br>🔹 Why soft skills matter as much as technical skills<br>🔹 Andrew’s advice for blue teamers: ask why, stay curious, fight alert fatigue</p><p>📺 Check out Andrew’s channel, Ginger Hacker: https://www.youtube.com/@gingerhacker</p><p>🎙️ More episodes of Simply Defensive: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4&amp;si=TqefAfDjdR1AYt1c</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From the streets to the SOC. 💻</p><p>In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally dosed the DMV 👀).</p><p>What you’ll hear:<br>🔹 Andrew’s pivot from law enforcement to cybersecurity<br>🔹 SOC life, schedules, and fighting burnout<br>🔹 Job hunting, recruiters, and landing that first role<br>🔹 Why soft skills matter as much as technical skills<br>🔹 Andrew’s advice for blue teamers: ask why, stay curious, fight alert fatigue</p><p>📺 Check out Andrew’s channel, Ginger Hacker: https://www.youtube.com/@gingerhacker</p><p>🎙️ More episodes of Simply Defensive: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4&amp;si=TqefAfDjdR1AYt1c</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/a0ae228e/4a5ff80b.mp3" length="60607702" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2162</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From the streets to the SOC. 💻</p><p>In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally dosed the DMV 👀).</p><p>What you’ll hear:<br>🔹 Andrew’s pivot from law enforcement to cybersecurity<br>🔹 SOC life, schedules, and fighting burnout<br>🔹 Job hunting, recruiters, and landing that first role<br>🔹 Why soft skills matter as much as technical skills<br>🔹 Andrew’s advice for blue teamers: ask why, stay curious, fight alert fatigue</p><p>📺 Check out Andrew’s channel, Ginger Hacker: https://www.youtube.com/@gingerhacker</p><p>🎙️ More episodes of Simply Defensive: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4&amp;si=TqefAfDjdR1AYt1c</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Automating the Blue Team | Kevin Mata (Swimlane) on SOAR &amp; AI in Cybersecurity</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Automating the Blue Team | Kevin Mata (Swimlane) on SOAR &amp; AI in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1d851644-d44f-4856-9e25-5140fd532290</guid>
      <link>https://simplydefensive.transistor.fm/s4/6</link>
      <description>
        <![CDATA[<p>Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI.</p><p>Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams save time and reduce alert fatigue, and where AI is already making a difference in the SOC. Along the way, he and Wade swap stories about early career struggles, Python hacks, and the future of automation in security operations.</p><p>If you’ve ever wondered how much you can trust automation, what SOAR really does in a SOC, or how AI will shape the future of defenders—this episode is for you.</p><p>👉 What You’ll Learn in This Episode:<br>- Kevin’s unique career journey: In-N-Out → SOC → Swimlane leadership<br>- How to use automation to supercharge Blue Team efficiency<br>- The role of SOAR platforms in ticketing, response, and orchestration<br>- Where AI fits into SOC operations (and where it doesn’t…yet)<br>- Tips for defenders at any stage of their career</p><p>🔗 Links &amp; References from the Episode:<br>- Swimlane: https://swimlane.com<br>- Recorded Future: https://www.recordedfuture.com<br>- VirusTotal: https://www.virustotal.com<br>- Mistral AI: https://mistral.ai</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI.</p><p>Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams save time and reduce alert fatigue, and where AI is already making a difference in the SOC. Along the way, he and Wade swap stories about early career struggles, Python hacks, and the future of automation in security operations.</p><p>If you’ve ever wondered how much you can trust automation, what SOAR really does in a SOC, or how AI will shape the future of defenders—this episode is for you.</p><p>👉 What You’ll Learn in This Episode:<br>- Kevin’s unique career journey: In-N-Out → SOC → Swimlane leadership<br>- How to use automation to supercharge Blue Team efficiency<br>- The role of SOAR platforms in ticketing, response, and orchestration<br>- Where AI fits into SOC operations (and where it doesn’t…yet)<br>- Tips for defenders at any stage of their career</p><p>🔗 Links &amp; References from the Episode:<br>- Swimlane: https://swimlane.com<br>- Recorded Future: https://www.recordedfuture.com<br>- VirusTotal: https://www.virustotal.com<br>- Mistral AI: https://mistral.ai</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Sep 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/acd53d12/fe5dc195.mp3" length="55029428" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1963</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI.</p><p>Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams save time and reduce alert fatigue, and where AI is already making a difference in the SOC. Along the way, he and Wade swap stories about early career struggles, Python hacks, and the future of automation in security operations.</p><p>If you’ve ever wondered how much you can trust automation, what SOAR really does in a SOC, or how AI will shape the future of defenders—this episode is for you.</p><p>👉 What You’ll Learn in This Episode:<br>- Kevin’s unique career journey: In-N-Out → SOC → Swimlane leadership<br>- How to use automation to supercharge Blue Team efficiency<br>- The role of SOAR platforms in ticketing, response, and orchestration<br>- Where AI fits into SOC operations (and where it doesn’t…yet)<br>- Tips for defenders at any stage of their career</p><p>🔗 Links &amp; References from the Episode:<br>- Swimlane: https://swimlane.com<br>- Recorded Future: https://www.recordedfuture.com<br>- VirusTotal: https://www.virustotal.com<br>- Mistral AI: https://mistral.ai</p><p>👥 Connect with Us on LinkedIn:<br>- Josh Mason (Co-Host): https://www.linkedin.com/in/joshuacmason<br>- Wade Wells (Co-Host): https://www.linkedin.com/in/wadingthrulogs/<br>- Kevin Mata (Guest): https://www.linkedin.com/in/kevinmata<br>- Swimlane: https://www.linkedin.com/company/swimlane</p><p>🎙️ More Simply Defensive<br>- Full playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4<br>- Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4<br>- Apple Podcasts: https://podcasts.apple.com/il/podcast/simply-defensive/id1773806182</p><p>👍 If you enjoyed this episode, don’t forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity leaders.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40f4c62b-8dbc-44fc-b7d8-998162501181</guid>
      <link>https://simplydefensive.transistor.fm/s4/5</link>
      <description>
        <![CDATA[<p>Ready to level up your defensive cybersecurity skills? In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Dan Regalado</strong> and <strong>Belem</strong> — the founders of <strong>Hack Defender Academy</strong> — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders.</p><p><br>💡 We cover:</p><ul><li>Why gamified, CTF-style learning works better than traditional training</li><li>How Hack Defender Academy helps beginners grow into skilled malware analysts</li><li>The role of <strong>AI in threat research</strong> — friend, foe, or both?</li><li>The importance of staying hungry and keeping your edge as a blue teamer</li></ul><p>🚨 <strong>Special Gift for Our Listeners</strong>: Hack Defender Academy is giving away <strong>one free certification pass</strong>! Details in the episode.</p><p><strong>🔗 Links from the episode<br></strong><br></p><p><strong>Hack Defender Academy<br></strong> 🌐 Website: academy.hack-defender.com<br> ▶️ YouTube:<a href="https://www.youtube.com/@HackDefOfficial"> Hack Defender Official<br></a> 📱 TikTok: @HackDefOfficial<br> 📸 Instagram:<a href="https://www.instagram.com/HackDefOfficial"> @HackDefOfficial<br></a> 🐦 X (Twitter):<a href="https://x.com/HackDefOfficial"> @HackDefOfficial<br></a> 💼 LinkedIn:<a href="https://www.linkedin.com/company/hackdefender"> Hack Defender<br></a> 📘 Facebook:<a href="https://www.facebook.com/hackdefender"> Hack Defender<br></a><br></p><p><strong>Connect with our guests<br></strong>🔹 Dan Regalado –<a href="https://www.linkedin.com/in/danregalado"> LinkedIn<br></a> 🔹 Belem –<a href="https://www.linkedin.com/in/belem"> LinkedIn<br></a><br></p><p><strong>Simply Defensive Podcast<br></strong>🎧 Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> Simply Defensive<br></a> 🎧 Apple: Simply Defensive</p><p><strong>Sponsor<br></strong> 💼 Thanks to ThreatLocker for supporting this episode.</p><p>👍 If you enjoyed this conversation, hit <strong>Like</strong>, <strong>Subscribe</strong>, and ring the 🔔 so you don’t miss our weekly episodes!<br> Drop a comment with the <strong>biggest challenge you’ve faced as a blue teamer</strong> — we’d love to hear your story.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ready to level up your defensive cybersecurity skills? In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Dan Regalado</strong> and <strong>Belem</strong> — the founders of <strong>Hack Defender Academy</strong> — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders.</p><p><br>💡 We cover:</p><ul><li>Why gamified, CTF-style learning works better than traditional training</li><li>How Hack Defender Academy helps beginners grow into skilled malware analysts</li><li>The role of <strong>AI in threat research</strong> — friend, foe, or both?</li><li>The importance of staying hungry and keeping your edge as a blue teamer</li></ul><p>🚨 <strong>Special Gift for Our Listeners</strong>: Hack Defender Academy is giving away <strong>one free certification pass</strong>! Details in the episode.</p><p><strong>🔗 Links from the episode<br></strong><br></p><p><strong>Hack Defender Academy<br></strong> 🌐 Website: academy.hack-defender.com<br> ▶️ YouTube:<a href="https://www.youtube.com/@HackDefOfficial"> Hack Defender Official<br></a> 📱 TikTok: @HackDefOfficial<br> 📸 Instagram:<a href="https://www.instagram.com/HackDefOfficial"> @HackDefOfficial<br></a> 🐦 X (Twitter):<a href="https://x.com/HackDefOfficial"> @HackDefOfficial<br></a> 💼 LinkedIn:<a href="https://www.linkedin.com/company/hackdefender"> Hack Defender<br></a> 📘 Facebook:<a href="https://www.facebook.com/hackdefender"> Hack Defender<br></a><br></p><p><strong>Connect with our guests<br></strong>🔹 Dan Regalado –<a href="https://www.linkedin.com/in/danregalado"> LinkedIn<br></a> 🔹 Belem –<a href="https://www.linkedin.com/in/belem"> LinkedIn<br></a><br></p><p><strong>Simply Defensive Podcast<br></strong>🎧 Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> Simply Defensive<br></a> 🎧 Apple: Simply Defensive</p><p><strong>Sponsor<br></strong> 💼 Thanks to ThreatLocker for supporting this episode.</p><p>👍 If you enjoyed this conversation, hit <strong>Like</strong>, <strong>Subscribe</strong>, and ring the 🔔 so you don’t miss our weekly episodes!<br> Drop a comment with the <strong>biggest challenge you’ve faced as a blue teamer</strong> — we’d love to hear your story.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Aug 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/6d7fa44e/4e9465ad.mp3" length="49549934" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1767</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ready to level up your defensive cybersecurity skills? In this episode of <em>Simply Defensive</em>, Josh Mason and Wade Wells sit down with <strong>Dan Regalado</strong> and <strong>Belem</strong> — the founders of <strong>Hack Defender Academy</strong> — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders.</p><p><br>💡 We cover:</p><ul><li>Why gamified, CTF-style learning works better than traditional training</li><li>How Hack Defender Academy helps beginners grow into skilled malware analysts</li><li>The role of <strong>AI in threat research</strong> — friend, foe, or both?</li><li>The importance of staying hungry and keeping your edge as a blue teamer</li></ul><p>🚨 <strong>Special Gift for Our Listeners</strong>: Hack Defender Academy is giving away <strong>one free certification pass</strong>! Details in the episode.</p><p><strong>🔗 Links from the episode<br></strong><br></p><p><strong>Hack Defender Academy<br></strong> 🌐 Website: academy.hack-defender.com<br> ▶️ YouTube:<a href="https://www.youtube.com/@HackDefOfficial"> Hack Defender Official<br></a> 📱 TikTok: @HackDefOfficial<br> 📸 Instagram:<a href="https://www.instagram.com/HackDefOfficial"> @HackDefOfficial<br></a> 🐦 X (Twitter):<a href="https://x.com/HackDefOfficial"> @HackDefOfficial<br></a> 💼 LinkedIn:<a href="https://www.linkedin.com/company/hackdefender"> Hack Defender<br></a> 📘 Facebook:<a href="https://www.facebook.com/hackdefender"> Hack Defender<br></a><br></p><p><strong>Connect with our guests<br></strong>🔹 Dan Regalado –<a href="https://www.linkedin.com/in/danregalado"> LinkedIn<br></a> 🔹 Belem –<a href="https://www.linkedin.com/in/belem"> LinkedIn<br></a><br></p><p><strong>Simply Defensive Podcast<br></strong>🎧 Spotify:<a href="https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4"> Simply Defensive<br></a> 🎧 Apple: Simply Defensive</p><p><strong>Sponsor<br></strong> 💼 Thanks to ThreatLocker for supporting this episode.</p><p>👍 If you enjoyed this conversation, hit <strong>Like</strong>, <strong>Subscribe</strong>, and ring the 🔔 so you don’t miss our weekly episodes!<br> Drop a comment with the <strong>biggest challenge you’ve faced as a blue teamer</strong> — we’d love to hear your story.</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">beb1dc11-0d22-46a6-98e2-3476eaeba60a</guid>
      <link>https://simplydefensive.transistor.fm/s4/4</link>
      <description>
        <![CDATA[<p>In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention.</p><p>Rob shares expert insights on:</p><ul><li>Proactive vs. Reactive cybersecurity — why a balanced security stack matters</li><li>How Zero Trust infrastructure can stop cyber attacks before they start</li><li>ThreatLocker’s "Deny by Default" approach to endpoint and application control</li><li>The importance of application definitions for effective security</li><li>Why AI is not the silver bullet for cybersecurity defense</li><li>Common security myths and misconceptions that put organizations at risk</li></ul><p>Whether you’re a SOC analyst, detection engineer, IT manager, or anyone interested in protecting against ransomware, this episode offers practical, real-world strategies for building a stronger cyber defense posture.</p><p>Timestamps:<br> 00:00 – Introduction and Host Greetings<br> 00:23 – Guest Introduction: Rob Allen from ThreatLocker<br> 00:44 – Rob Allen's Role and Responsibilities<br> 02:30 – Proactive vs. Reactive Cybersecurity Approaches<br> 03:54 – Challenges in Cybersecurity Detection<br> 05:24 – ThreatLocker’s Deny by Default Approach<br> 09:48 – The Importance of Application Definitions<br> 16:52 – Security Myths and Misconceptions<br> 18:53 – AI in Cybersecurity: Hype vs. Reality<br> 23:32 – Travel Plans and Closing Remarks</p><p>🔗 Connect with Rob Allen &amp; ThreatLocker<strong><br></strong> Website: https://www.threatlocker.com/<br> LinkedIn:<a href="https://www.linkedin.com/company/threatlocker/"> https://www.linkedin.com/company/threatlocker/</a></p><p><br></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention.</p><p>Rob shares expert insights on:</p><ul><li>Proactive vs. Reactive cybersecurity — why a balanced security stack matters</li><li>How Zero Trust infrastructure can stop cyber attacks before they start</li><li>ThreatLocker’s "Deny by Default" approach to endpoint and application control</li><li>The importance of application definitions for effective security</li><li>Why AI is not the silver bullet for cybersecurity defense</li><li>Common security myths and misconceptions that put organizations at risk</li></ul><p>Whether you’re a SOC analyst, detection engineer, IT manager, or anyone interested in protecting against ransomware, this episode offers practical, real-world strategies for building a stronger cyber defense posture.</p><p>Timestamps:<br> 00:00 – Introduction and Host Greetings<br> 00:23 – Guest Introduction: Rob Allen from ThreatLocker<br> 00:44 – Rob Allen's Role and Responsibilities<br> 02:30 – Proactive vs. Reactive Cybersecurity Approaches<br> 03:54 – Challenges in Cybersecurity Detection<br> 05:24 – ThreatLocker’s Deny by Default Approach<br> 09:48 – The Importance of Application Definitions<br> 16:52 – Security Myths and Misconceptions<br> 18:53 – AI in Cybersecurity: Hype vs. Reality<br> 23:32 – Travel Plans and Closing Remarks</p><p>🔗 Connect with Rob Allen &amp; ThreatLocker<strong><br></strong> Website: https://www.threatlocker.com/<br> LinkedIn:<a href="https://www.linkedin.com/company/threatlocker/"> https://www.linkedin.com/company/threatlocker/</a></p><p><br></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 18 Aug 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/99e78f7e/2826db96.mp3" length="42821883" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1527</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention.</p><p>Rob shares expert insights on:</p><ul><li>Proactive vs. Reactive cybersecurity — why a balanced security stack matters</li><li>How Zero Trust infrastructure can stop cyber attacks before they start</li><li>ThreatLocker’s "Deny by Default" approach to endpoint and application control</li><li>The importance of application definitions for effective security</li><li>Why AI is not the silver bullet for cybersecurity defense</li><li>Common security myths and misconceptions that put organizations at risk</li></ul><p>Whether you’re a SOC analyst, detection engineer, IT manager, or anyone interested in protecting against ransomware, this episode offers practical, real-world strategies for building a stronger cyber defense posture.</p><p>Timestamps:<br> 00:00 – Introduction and Host Greetings<br> 00:23 – Guest Introduction: Rob Allen from ThreatLocker<br> 00:44 – Rob Allen's Role and Responsibilities<br> 02:30 – Proactive vs. Reactive Cybersecurity Approaches<br> 03:54 – Challenges in Cybersecurity Detection<br> 05:24 – ThreatLocker’s Deny by Default Approach<br> 09:48 – The Importance of Application Definitions<br> 16:52 – Security Myths and Misconceptions<br> 18:53 – AI in Cybersecurity: Hype vs. Reality<br> 23:32 – Travel Plans and Closing Remarks</p><p>🔗 Connect with Rob Allen &amp; ThreatLocker<strong><br></strong> Website: https://www.threatlocker.com/<br> LinkedIn:<a href="https://www.linkedin.com/company/threatlocker/"> https://www.linkedin.com/company/threatlocker/</a></p><p><br></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Your CISO Needs a “Shut Up, Boss” Button</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Why Your CISO Needs a “Shut Up, Boss” Button</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16c338f9-530d-41e8-b795-223343c9a5ae</guid>
      <link>https://simplydefensive.transistor.fm/s4/3</link>
      <description>
        <![CDATA[<p>What if GitHub sucks for security detections—and AI is finally good enough to replace it?</p><p>Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks.</p><p>Aaron doesn’t hold back. From ranting about GitHub’s failures to sharing how AI is now actually useful for real-world detections, this episode goes deep into:</p><p>Why most teams still build detections in silos (and waste time doing it)<br>What makes detections fail—and what 80% of orgs get wrong<br>How Detections.ai uses prompt engineering and log analysis to generate battle-ready alerts<br>Why vendors will never cover all your detection needs (and that’s okay)</p><p>Whether you're a threat hunter, detection engineer, or just AI-curious, this episode will challenge your assumptions and give you practical ideas to level up your SOC.</p><p>Connect with Aaron on LinkedIn: <a href="https://www.linkedin.com/in/aaronmog">https://www.linkedin.com/in/aaronmog</a><br>https://detections.ai/ Code “SimplyCyber”</p><p>👉 Subscribe for more real talk on cyber defense.<br> 🎧 Listen in and get ahead of the curve.</p><p>Chapters:<br>00:00 Introduction and Guest Welcome<br>00:31 Aaron Mog and Detections.ai Overview<br>01:58 Community-Driven Detection Engineering<br>04:24 AI Integration and Product Evolution<br>06:20 Challenges in Detection Engineering<br>08:11 AI's Role in Detection Engineering<br>15:51 Vendor Limitations and Custom Solutions<br>16:54 Microsoft's Limitations in Cybersecurity<br>17:23 The Evolution of Threat Hunting<br>18:07 Collaborative Approach to Cybersecurity<br>20:07 Crowdsourcing and AI in Detection Engineering<br>20:57 Challenges and Innovations in AI for Security<br>21:37 AI's Role in Detection and Response<br>23:25 Elastic's Blog and Detection Engineering<br>24:29 AI in Summarizing and Enhancing Security Reports<br>28:14 Community and Commercial Aspects of AI in Security<br>32:18 Conclusion and Community Engagement</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if GitHub sucks for security detections—and AI is finally good enough to replace it?</p><p>Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks.</p><p>Aaron doesn’t hold back. From ranting about GitHub’s failures to sharing how AI is now actually useful for real-world detections, this episode goes deep into:</p><p>Why most teams still build detections in silos (and waste time doing it)<br>What makes detections fail—and what 80% of orgs get wrong<br>How Detections.ai uses prompt engineering and log analysis to generate battle-ready alerts<br>Why vendors will never cover all your detection needs (and that’s okay)</p><p>Whether you're a threat hunter, detection engineer, or just AI-curious, this episode will challenge your assumptions and give you practical ideas to level up your SOC.</p><p>Connect with Aaron on LinkedIn: <a href="https://www.linkedin.com/in/aaronmog">https://www.linkedin.com/in/aaronmog</a><br>https://detections.ai/ Code “SimplyCyber”</p><p>👉 Subscribe for more real talk on cyber defense.<br> 🎧 Listen in and get ahead of the curve.</p><p>Chapters:<br>00:00 Introduction and Guest Welcome<br>00:31 Aaron Mog and Detections.ai Overview<br>01:58 Community-Driven Detection Engineering<br>04:24 AI Integration and Product Evolution<br>06:20 Challenges in Detection Engineering<br>08:11 AI's Role in Detection Engineering<br>15:51 Vendor Limitations and Custom Solutions<br>16:54 Microsoft's Limitations in Cybersecurity<br>17:23 The Evolution of Threat Hunting<br>18:07 Collaborative Approach to Cybersecurity<br>20:07 Crowdsourcing and AI in Detection Engineering<br>20:57 Challenges and Innovations in AI for Security<br>21:37 AI's Role in Detection and Response<br>23:25 Elastic's Blog and Detection Engineering<br>24:29 AI in Summarizing and Enhancing Security Reports<br>28:14 Community and Commercial Aspects of AI in Security<br>32:18 Conclusion and Community Engagement</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 04 Aug 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/cc828d09/d84e2b3c.mp3" length="57432512" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2049</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if GitHub sucks for security detections—and AI is finally good enough to replace it?</p><p>Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks.</p><p>Aaron doesn’t hold back. From ranting about GitHub’s failures to sharing how AI is now actually useful for real-world detections, this episode goes deep into:</p><p>Why most teams still build detections in silos (and waste time doing it)<br>What makes detections fail—and what 80% of orgs get wrong<br>How Detections.ai uses prompt engineering and log analysis to generate battle-ready alerts<br>Why vendors will never cover all your detection needs (and that’s okay)</p><p>Whether you're a threat hunter, detection engineer, or just AI-curious, this episode will challenge your assumptions and give you practical ideas to level up your SOC.</p><p>Connect with Aaron on LinkedIn: <a href="https://www.linkedin.com/in/aaronmog">https://www.linkedin.com/in/aaronmog</a><br>https://detections.ai/ Code “SimplyCyber”</p><p>👉 Subscribe for more real talk on cyber defense.<br> 🎧 Listen in and get ahead of the curve.</p><p>Chapters:<br>00:00 Introduction and Guest Welcome<br>00:31 Aaron Mog and Detections.ai Overview<br>01:58 Community-Driven Detection Engineering<br>04:24 AI Integration and Product Evolution<br>06:20 Challenges in Detection Engineering<br>08:11 AI's Role in Detection Engineering<br>15:51 Vendor Limitations and Custom Solutions<br>16:54 Microsoft's Limitations in Cybersecurity<br>17:23 The Evolution of Threat Hunting<br>18:07 Collaborative Approach to Cybersecurity<br>20:07 Crowdsourcing and AI in Detection Engineering<br>20:57 Challenges and Innovations in AI for Security<br>21:37 AI's Role in Detection and Response<br>23:25 Elastic's Blog and Detection Engineering<br>24:29 AI in Summarizing and Enhancing Security Reports<br>28:14 Community and Commercial Aspects of AI in Security<br>32:18 Conclusion and Community Engagement</p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker<br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Jack in the Box Might Have the Best Security Team in Fast Food</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Why Jack in the Box Might Have the Best Security Team in Fast Food</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aea10f0c-cae8-4c54-a636-b05b0ec0b1b2</guid>
      <link>https://simplydefensive.transistor.fm/s4/2</link>
      <description>
        <![CDATA[<p>How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of <em>Simply Defensive</em>, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals.</p><p>Chris shares his journey from Windows NT and dot-matrix printers to modern InfoSec leadership, explains what he actually looks for when hiring blue teamers (hint: it's not your certs), and drops tactical insights on building a metrics program that actually <em>matters</em> to the business.</p><p><br>We also talk about:</p><ul><li>The chaos theory of SOC alerts</li><li>The power of curiosity in detection work</li><li>Building a team culture that beats burnout</li><li>Why your legal team doesn’t care about phishing — and how to change that</li></ul><p>Oh, and there's a fast-food burger debate. No spoilers, but lines are drawn.</p><p>Whether you're just getting started in security or leading your own team, this episode’s got something for you.</p><p>Connect with Chris on LinkedIn:<br>🔗 <a href="https://www.linkedin.com/in/christopherjulio/">https://www.linkedin.com/in/christopherjulio/</a></p><p>Chapters:<br>00:00 Introduction and Guest Welcome</p><p>00:43 Chris Julio's Navy Background</p><p>04:27 Transition to Cybersecurity</p><p>06:42 Hiring and Team Building Insights</p><p>21:36 Balancing Work and Family Life</p><p>25:53 Engaging with the InfoSec Community</p><p>27:09 Final Thoughts and Advice for Blue Teamers</p><p>28:16 Closing Remarks and Sponsor Acknowledgment</p><p><br>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of <em>Simply Defensive</em>, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals.</p><p>Chris shares his journey from Windows NT and dot-matrix printers to modern InfoSec leadership, explains what he actually looks for when hiring blue teamers (hint: it's not your certs), and drops tactical insights on building a metrics program that actually <em>matters</em> to the business.</p><p><br>We also talk about:</p><ul><li>The chaos theory of SOC alerts</li><li>The power of curiosity in detection work</li><li>Building a team culture that beats burnout</li><li>Why your legal team doesn’t care about phishing — and how to change that</li></ul><p>Oh, and there's a fast-food burger debate. No spoilers, but lines are drawn.</p><p>Whether you're just getting started in security or leading your own team, this episode’s got something for you.</p><p>Connect with Chris on LinkedIn:<br>🔗 <a href="https://www.linkedin.com/in/christopherjulio/">https://www.linkedin.com/in/christopherjulio/</a></p><p>Chapters:<br>00:00 Introduction and Guest Welcome</p><p>00:43 Chris Julio's Navy Background</p><p>04:27 Transition to Cybersecurity</p><p>06:42 Hiring and Team Building Insights</p><p>21:36 Balancing Work and Family Life</p><p>25:53 Engaging with the InfoSec Community</p><p>27:09 Final Thoughts and Advice for Blue Teamers</p><p>28:16 Closing Remarks and Sponsor Acknowledgment</p><p><br>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 28 Jul 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/c633b673/34671db5.mp3" length="50409416" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of <em>Simply Defensive</em>, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals.</p><p>Chris shares his journey from Windows NT and dot-matrix printers to modern InfoSec leadership, explains what he actually looks for when hiring blue teamers (hint: it's not your certs), and drops tactical insights on building a metrics program that actually <em>matters</em> to the business.</p><p><br>We also talk about:</p><ul><li>The chaos theory of SOC alerts</li><li>The power of curiosity in detection work</li><li>Building a team culture that beats burnout</li><li>Why your legal team doesn’t care about phishing — and how to change that</li></ul><p>Oh, and there's a fast-food burger debate. No spoilers, but lines are drawn.</p><p>Whether you're just getting started in security or leading your own team, this episode’s got something for you.</p><p>Connect with Chris on LinkedIn:<br>🔗 <a href="https://www.linkedin.com/in/christopherjulio/">https://www.linkedin.com/in/christopherjulio/</a></p><p>Chapters:<br>00:00 Introduction and Guest Welcome</p><p>00:43 Chris Julio's Navy Background</p><p>04:27 Transition to Cybersecurity</p><p>06:42 Hiring and Team Building Insights</p><p>21:36 Balancing Work and Family Life</p><p>25:53 Engaging with the InfoSec Community</p><p>27:09 Final Thoughts and Advice for Blue Teamers</p><p>28:16 Closing Remarks and Sponsor Acknowledgment</p><p><br>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <br><a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:title>Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b03041a-d8d4-4b73-b3c4-100a68857a35</guid>
      <link>https://simplydefensive.transistor.fm/s4/1</link>
      <description>
        <![CDATA[<p>SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos.</p><p>We cover:<br>- Why malicious packages are sneaking past defenders<br>- The truth about SBOMs (and what most orgs are doing wrong)<br>- How to spot typo-squatting and backdoored build scripts<br>- What defenders can do—even if you're not building the code<br>- Why “just NPM install” is more dangerous than you think</p><p>From transitive dependencies to the hidden power of private package repositories, this episode is packed with practical insights, hilarious stories, and advice every blue teamer needs.</p><p>Episode Links:<br>🔗 Kyle’s blog: <a href="https://crimehacks.com">https://crimehacks.com</a><br> 👨‍💻 Kyle on LinkedIn: <a href="https://www.linkedin.com/in/kyle-m-kelly">https://www.linkedin.com/in/kyle-m-kelly</a><br> 📰 Crime Hacks on LinkedIn: <a href="https://www.linkedin.com/company/crimehacks">https://www.linkedin.com/company/crimehacks</a></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos.</p><p>We cover:<br>- Why malicious packages are sneaking past defenders<br>- The truth about SBOMs (and what most orgs are doing wrong)<br>- How to spot typo-squatting and backdoored build scripts<br>- What defenders can do—even if you're not building the code<br>- Why “just NPM install” is more dangerous than you think</p><p>From transitive dependencies to the hidden power of private package repositories, this episode is packed with practical insights, hilarious stories, and advice every blue teamer needs.</p><p>Episode Links:<br>🔗 Kyle’s blog: <a href="https://crimehacks.com">https://crimehacks.com</a><br> 👨‍💻 Kyle on LinkedIn: <a href="https://www.linkedin.com/in/kyle-m-kelly">https://www.linkedin.com/in/kyle-m-kelly</a><br> 📰 Crime Hacks on LinkedIn: <a href="https://www.linkedin.com/company/crimehacks">https://www.linkedin.com/company/crimehacks</a></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 21 Jul 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/e9438934/5a1eacdd.mp3" length="34778835" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1736</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos.</p><p>We cover:<br>- Why malicious packages are sneaking past defenders<br>- The truth about SBOMs (and what most orgs are doing wrong)<br>- How to spot typo-squatting and backdoored build scripts<br>- What defenders can do—even if you're not building the code<br>- Why “just NPM install” is more dangerous than you think</p><p>From transitive dependencies to the hidden power of private package repositories, this episode is packed with practical insights, hilarious stories, and advice every blue teamer needs.</p><p>Episode Links:<br>🔗 Kyle’s blog: <a href="https://crimehacks.com">https://crimehacks.com</a><br> 👨‍💻 Kyle on LinkedIn: <a href="https://www.linkedin.com/in/kyle-m-kelly">https://www.linkedin.com/in/kyle-m-kelly</a><br> 📰 Crime Hacks on LinkedIn: <a href="https://www.linkedin.com/company/crimehacks">https://www.linkedin.com/company/crimehacks</a></p><p>=========================<br>Sponsored by ThreatLocker - Free 30-day trial of ThreatLocker <a href="https://www.threatlocker.com/simplydefensive">https://www.threatlocker.com/simplydefensive</a><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E8: Innovations in Cybersecurity: A Conversation with Threat Locker's John Liliston</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E8: Innovations in Cybersecurity: A Conversation with Threat Locker's John Liliston</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1328ef55-c0d5-4e3c-ae08-527a87747cb5</guid>
      <link>https://simplydefensive.transistor.fm/s3/8</link>
      <description>
        <![CDATA[<p>In the final episode of Season 3 on Simply Defensive, hosts Josh Mason and Wade Wells welcome John Liliston, the Product Director at ThreatLocker.</p><p>John shares his journey into cybersecurity, his role at ThreatLocker, and his thoughts on the evolution of security solutions. He discusses ThreatLocker's approach to zero trust, the impact of AI on cybersecurity, and the unique integration of application control and threat detection in their offerings.</p><p><br></p><p>The episode also covers John's experiences and insights from recent conferences like RSA and potential future advancements in the industry. Tune in for an in-depth discussion on defensive cybersecurity and innovative product design.</p><p><br></p><p>Connect with John on LinkedIn: <a href="https://www.linkedin.com/in/john-lilliston-4725217b/">https://www.linkedin.com/in/john-lilliston-4725217b/</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:31 Meet John Liliston: Threat Locker's Product Director</p><p>02:35 John's Journey into Cybersecurity</p><p>03:45 Transitioning to Product Design</p><p>04:52 Balancing Roles at Threat Locker</p><p>06:10 Emerging Threats and Product Development</p><p>17:47 The Future of Security Solutions</p><p>24:56 Concluding Thoughts and Upcoming Events</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the final episode of Season 3 on Simply Defensive, hosts Josh Mason and Wade Wells welcome John Liliston, the Product Director at ThreatLocker.</p><p>John shares his journey into cybersecurity, his role at ThreatLocker, and his thoughts on the evolution of security solutions. He discusses ThreatLocker's approach to zero trust, the impact of AI on cybersecurity, and the unique integration of application control and threat detection in their offerings.</p><p><br></p><p>The episode also covers John's experiences and insights from recent conferences like RSA and potential future advancements in the industry. Tune in for an in-depth discussion on defensive cybersecurity and innovative product design.</p><p><br></p><p>Connect with John on LinkedIn: <a href="https://www.linkedin.com/in/john-lilliston-4725217b/">https://www.linkedin.com/in/john-lilliston-4725217b/</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:31 Meet John Liliston: Threat Locker's Product Director</p><p>02:35 John's Journey into Cybersecurity</p><p>03:45 Transitioning to Product Design</p><p>04:52 Balancing Roles at Threat Locker</p><p>06:10 Emerging Threats and Product Development</p><p>17:47 The Future of Security Solutions</p><p>24:56 Concluding Thoughts and Upcoming Events</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Jun 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/d71dbdc6/f2351380.mp3" length="26316758" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1641</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the final episode of Season 3 on Simply Defensive, hosts Josh Mason and Wade Wells welcome John Liliston, the Product Director at ThreatLocker.</p><p>John shares his journey into cybersecurity, his role at ThreatLocker, and his thoughts on the evolution of security solutions. He discusses ThreatLocker's approach to zero trust, the impact of AI on cybersecurity, and the unique integration of application control and threat detection in their offerings.</p><p><br></p><p>The episode also covers John's experiences and insights from recent conferences like RSA and potential future advancements in the industry. Tune in for an in-depth discussion on defensive cybersecurity and innovative product design.</p><p><br></p><p>Connect with John on LinkedIn: <a href="https://www.linkedin.com/in/john-lilliston-4725217b/">https://www.linkedin.com/in/john-lilliston-4725217b/</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:31 Meet John Liliston: Threat Locker's Product Director</p><p>02:35 John's Journey into Cybersecurity</p><p>03:45 Transitioning to Product Design</p><p>04:52 Balancing Roles at Threat Locker</p><p>06:10 Emerging Threats and Product Development</p><p>17:47 The Future of Security Solutions</p><p>24:56 Concluding Thoughts and Upcoming Events</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84921e93-63ba-4afd-8f7e-28324fa296d0</guid>
      <link>https://simplydefensive.transistor.fm/s3/7</link>
      <description>
        <![CDATA[<p>Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community.</p><p>Gain insights into his military background, his passion for educating others about cybersecurity, and engaging stories from his experiences. Chuck also previews his upcoming talk for BSides Tampa 2025, offering valuable advice on tailoring security training for diverse audiences.</p><p>Don't miss this opportunity to tap into his innovative approach to cybersecurity awareness!</p><p>Connect with Chuck on LinkedIn: <a href="https://www.linkedin.com/in/chucksapp/">https://www.linkedin.com/in/chucksapp/<br></a>Check out the article discussed: <a href="https://www.staysafeonline.org/articles/ai-fools-stay-sharp">https://www.staysafeonline.org/articles/ai-fools-stay-sharp</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:18 Chuck's Background and Military Experience</p><p>03:54 Transition to Cybersecurity</p><p>06:29 Hackspace Con Story</p><p>10:35 Upcoming Talk and Security Awareness</p><p>15:15 Challenges in Security Awareness</p><p>20:38 Storytelling in Cybersecurity</p><p>21:56 Real-Life Examples of Scams</p><p>23:30 Phishing Tests and Awareness</p><p>31:03 Creative Security Solutions</p><p>32:03 Leveraging Security Behavior Databases</p><p>35:23 Meeting Industry Leaders</p><p>37:53 Final Thoughts and Recommendations</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community.</p><p>Gain insights into his military background, his passion for educating others about cybersecurity, and engaging stories from his experiences. Chuck also previews his upcoming talk for BSides Tampa 2025, offering valuable advice on tailoring security training for diverse audiences.</p><p>Don't miss this opportunity to tap into his innovative approach to cybersecurity awareness!</p><p>Connect with Chuck on LinkedIn: <a href="https://www.linkedin.com/in/chucksapp/">https://www.linkedin.com/in/chucksapp/<br></a>Check out the article discussed: <a href="https://www.staysafeonline.org/articles/ai-fools-stay-sharp">https://www.staysafeonline.org/articles/ai-fools-stay-sharp</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:18 Chuck's Background and Military Experience</p><p>03:54 Transition to Cybersecurity</p><p>06:29 Hackspace Con Story</p><p>10:35 Upcoming Talk and Security Awareness</p><p>15:15 Challenges in Security Awareness</p><p>20:38 Storytelling in Cybersecurity</p><p>21:56 Real-Life Examples of Scams</p><p>23:30 Phishing Tests and Awareness</p><p>31:03 Creative Security Solutions</p><p>32:03 Leveraging Security Behavior Databases</p><p>35:23 Meeting Industry Leaders</p><p>37:53 Final Thoughts and Recommendations</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 19 May 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/575ef982/d29a1514.mp3" length="39983498" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2286</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community.</p><p>Gain insights into his military background, his passion for educating others about cybersecurity, and engaging stories from his experiences. Chuck also previews his upcoming talk for BSides Tampa 2025, offering valuable advice on tailoring security training for diverse audiences.</p><p>Don't miss this opportunity to tap into his innovative approach to cybersecurity awareness!</p><p>Connect with Chuck on LinkedIn: <a href="https://www.linkedin.com/in/chucksapp/">https://www.linkedin.com/in/chucksapp/<br></a>Check out the article discussed: <a href="https://www.staysafeonline.org/articles/ai-fools-stay-sharp">https://www.staysafeonline.org/articles/ai-fools-stay-sharp</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:18 Chuck's Background and Military Experience</p><p>03:54 Transition to Cybersecurity</p><p>06:29 Hackspace Con Story</p><p>10:35 Upcoming Talk and Security Awareness</p><p>15:15 Challenges in Security Awareness</p><p>20:38 Storytelling in Cybersecurity</p><p>21:56 Real-Life Examples of Scams</p><p>23:30 Phishing Tests and Awareness</p><p>31:03 Creative Security Solutions</p><p>32:03 Leveraging Security Behavior Databases</p><p>35:23 Meeting Industry Leaders</p><p>37:53 Final Thoughts and Recommendations</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9a29859c-b2ff-4d08-a4ca-ba06c189b632</guid>
      <link>https://simplydefensive.transistor.fm/s3/6</link>
      <description>
        <![CDATA[<p>Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly.</p><p>James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecurity threats. They discuss the vital steps and strategies for implementing robust security measures in small companies, the importance of patch management, and how to protect sensitive information.</p><p>Additionally, James delves into his experiences as a foster parent, offering insights into the foster care system and the impactful ways you can contribute. Stay tuned for valuable tips on safeguarding your business and heartwarming stories from the world of foster care.</p><p>Episode Links:<br>Connect with James on LI: <a href="https://www.linkedin.com/in/jbierly/">https://www.linkedin.com/in/jbierly/</a><br>Secure Point Solutions: <a href="https://www.secureps.net/">https://www.secureps.net/</a><br>NFPA: <a href="https://nfpaonline.org/">https://nfpaonline.org/</a></p><p>00:00 Introduction and Guest Welcome<br>00:22 James Bierly's Journey from Submarines to Cybersecurity<br>02:54 Transition to IT and Cybersecurity<br>07:28 Challenges and Rewards of Small Business Cybersecurity<br>12:29 Starting a Cybersecurity Business<br>20:11 Key Security Practices for Small Businesses<br>22:42 Challenges in School Cybersecurity<br>25:29 Starting a Cybersecurity Consulting Business<br>26:14 Engaging with Local Businesses<br>28:42 Building a Network Through Referrals<br>32:54 Becoming a Foster Parent<br>43:48 Advice for Blue Teamers</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly.</p><p>James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecurity threats. They discuss the vital steps and strategies for implementing robust security measures in small companies, the importance of patch management, and how to protect sensitive information.</p><p>Additionally, James delves into his experiences as a foster parent, offering insights into the foster care system and the impactful ways you can contribute. Stay tuned for valuable tips on safeguarding your business and heartwarming stories from the world of foster care.</p><p>Episode Links:<br>Connect with James on LI: <a href="https://www.linkedin.com/in/jbierly/">https://www.linkedin.com/in/jbierly/</a><br>Secure Point Solutions: <a href="https://www.secureps.net/">https://www.secureps.net/</a><br>NFPA: <a href="https://nfpaonline.org/">https://nfpaonline.org/</a></p><p>00:00 Introduction and Guest Welcome<br>00:22 James Bierly's Journey from Submarines to Cybersecurity<br>02:54 Transition to IT and Cybersecurity<br>07:28 Challenges and Rewards of Small Business Cybersecurity<br>12:29 Starting a Cybersecurity Business<br>20:11 Key Security Practices for Small Businesses<br>22:42 Challenges in School Cybersecurity<br>25:29 Starting a Cybersecurity Consulting Business<br>26:14 Engaging with Local Businesses<br>28:42 Building a Network Through Referrals<br>32:54 Becoming a Foster Parent<br>43:48 Advice for Blue Teamers</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 12 May 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/90d471d5/26f31b63.mp3" length="46199802" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2677</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly.</p><p>James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecurity threats. They discuss the vital steps and strategies for implementing robust security measures in small companies, the importance of patch management, and how to protect sensitive information.</p><p>Additionally, James delves into his experiences as a foster parent, offering insights into the foster care system and the impactful ways you can contribute. Stay tuned for valuable tips on safeguarding your business and heartwarming stories from the world of foster care.</p><p>Episode Links:<br>Connect with James on LI: <a href="https://www.linkedin.com/in/jbierly/">https://www.linkedin.com/in/jbierly/</a><br>Secure Point Solutions: <a href="https://www.secureps.net/">https://www.secureps.net/</a><br>NFPA: <a href="https://nfpaonline.org/">https://nfpaonline.org/</a></p><p>00:00 Introduction and Guest Welcome<br>00:22 James Bierly's Journey from Submarines to Cybersecurity<br>02:54 Transition to IT and Cybersecurity<br>07:28 Challenges and Rewards of Small Business Cybersecurity<br>12:29 Starting a Cybersecurity Business<br>20:11 Key Security Practices for Small Businesses<br>22:42 Challenges in School Cybersecurity<br>25:29 Starting a Cybersecurity Consulting Business<br>26:14 Engaging with Local Businesses<br>28:42 Building a Network Through Referrals<br>32:54 Becoming a Foster Parent<br>43:48 Advice for Blue Teamers</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E5: The Ultimate Guide to Detection as Code and Blue Team Tactics with David French</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E5: The Ultimate Guide to Detection as Code and Blue Team Tactics with David French</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">529590a9-c1b8-4bf5-b692-ea235a9cc504</guid>
      <link>https://simplydefensive.transistor.fm/s3/5</link>
      <description>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive.</p><p>Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red Team.</p><p>Learn why coding skills are crucial for modern cybersecurity professionals, and get tips on leveraging AI in the field.</p><p>Whether you're a beginner or an experienced blue teamer, this episode is packed with valuable insights and actionable advice.</p><p><br>LinkedIn - <a href="https://www.linkedin.com/in/davidfrench001/">https://www.linkedin.com/in/davidfrench001/</a></p><p>Google Cloud Security community - <a href="https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security">https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security</a></p><p>Medium - <a href="https://medium.com/@threatpunter">https://medium.com/@threatpunter</a></p><p>GitHub - <a href="https://github.com/threat-punter">https://github.com/threat-punter</a></p><p><br></p><p>00:00 Introduction and Casual Banter</p><p>00:21 Guest Introduction: David French</p><p>01:11 David's Background and Career Journey</p><p>02:40 Detection Engineering and Origin Stories</p><p>04:18 Current Role and Responsibilities</p><p>05:05 Getting into Cybersecurity</p><p>08:30 Detection as Code: Concepts and Practices</p><p>12:34 Testing Detections: Challenges and Strategies</p><p>16:51 Tools and Techniques for Detection Testing</p><p>19:25 Open Source Tools and Community Contributions</p><p>23:23 AI in Detection Engineering</p><p>26:32 Exploring AI Tools for Coding and Presentations</p><p>27:50 Deep Research and Its Impact</p><p>28:52 Journey into Public Speaking</p><p>40:00 Community Engagement and Networking</p><p>40:29 Upcoming Conference and Final Thoughts</p><p>43:45 The Importance of Coding for Security Professionals</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive.</p><p>Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red Team.</p><p>Learn why coding skills are crucial for modern cybersecurity professionals, and get tips on leveraging AI in the field.</p><p>Whether you're a beginner or an experienced blue teamer, this episode is packed with valuable insights and actionable advice.</p><p><br>LinkedIn - <a href="https://www.linkedin.com/in/davidfrench001/">https://www.linkedin.com/in/davidfrench001/</a></p><p>Google Cloud Security community - <a href="https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security">https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security</a></p><p>Medium - <a href="https://medium.com/@threatpunter">https://medium.com/@threatpunter</a></p><p>GitHub - <a href="https://github.com/threat-punter">https://github.com/threat-punter</a></p><p><br></p><p>00:00 Introduction and Casual Banter</p><p>00:21 Guest Introduction: David French</p><p>01:11 David's Background and Career Journey</p><p>02:40 Detection Engineering and Origin Stories</p><p>04:18 Current Role and Responsibilities</p><p>05:05 Getting into Cybersecurity</p><p>08:30 Detection as Code: Concepts and Practices</p><p>12:34 Testing Detections: Challenges and Strategies</p><p>16:51 Tools and Techniques for Detection Testing</p><p>19:25 Open Source Tools and Community Contributions</p><p>23:23 AI in Detection Engineering</p><p>26:32 Exploring AI Tools for Coding and Presentations</p><p>27:50 Deep Research and Its Impact</p><p>28:52 Journey into Public Speaking</p><p>40:00 Community Engagement and Networking</p><p>40:29 Upcoming Conference and Final Thoughts</p><p>43:45 The Importance of Coding for Security Professionals</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 05 May 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/bdf95f8a/2d78491c.mp3" length="51270579" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2913</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive.</p><p>Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red Team.</p><p>Learn why coding skills are crucial for modern cybersecurity professionals, and get tips on leveraging AI in the field.</p><p>Whether you're a beginner or an experienced blue teamer, this episode is packed with valuable insights and actionable advice.</p><p><br>LinkedIn - <a href="https://www.linkedin.com/in/davidfrench001/">https://www.linkedin.com/in/davidfrench001/</a></p><p>Google Cloud Security community - <a href="https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security">https://www.googlecloudcommunity.com/gc/Google-Cloud-Security/ct-p/googlecloud-security</a></p><p>Medium - <a href="https://medium.com/@threatpunter">https://medium.com/@threatpunter</a></p><p>GitHub - <a href="https://github.com/threat-punter">https://github.com/threat-punter</a></p><p><br></p><p>00:00 Introduction and Casual Banter</p><p>00:21 Guest Introduction: David French</p><p>01:11 David's Background and Career Journey</p><p>02:40 Detection Engineering and Origin Stories</p><p>04:18 Current Role and Responsibilities</p><p>05:05 Getting into Cybersecurity</p><p>08:30 Detection as Code: Concepts and Practices</p><p>12:34 Testing Detections: Challenges and Strategies</p><p>16:51 Tools and Techniques for Detection Testing</p><p>19:25 Open Source Tools and Community Contributions</p><p>23:23 AI in Detection Engineering</p><p>26:32 Exploring AI Tools for Coding and Presentations</p><p>27:50 Deep Research and Its Impact</p><p>28:52 Journey into Public Speaking</p><p>40:00 Community Engagement and Networking</p><p>40:29 Upcoming Conference and Final Thoughts</p><p>43:45 The Importance of Coding for Security Professionals</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/Socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E3: Unlocking the Secrets of OPSEC - A Deep Dive with Mitch Cohen</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E3: Unlocking the Secrets of OPSEC - A Deep Dive with Mitch Cohen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f56af8f6-bdbb-45e4-a995-af3264a14e3f</guid>
      <link>https://simplydefensive.transistor.fm/s3/3</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Mitch Cohen, privacy and OPSEC expert from flare.io.</p><p>Mitch shares his journey to becoming a 'digital ghost' and offers valuable insights into operational security (OPSEC) and privacy practices. He discusses the importance of securing personal information, the risks associated with poor OPSEC, and provides actionable steps for improving digital privacy.</p><p>Josh, Wade, and Mitch explore real-world examples, the ethical implications of privacy, and how to strike a balance between convenience and security.</p><p>An excellent resource for cybersecurity professionals and anyone interested in protecting their digital footprint.</p><p><a href="https://try.flare.io/flare-community/?utm_campaign=6283079-Flare%20Academy%20Discord%20Community&amp;utm_source=Media&amp;utm_medium=Simply%20Defensive">Learn more in the flare.io Discord</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:27 Meet Mitch Cohen: Privacy and OPSEC Expert</p><p>01:29 The Importance of OPSEC</p><p>04:13 Defining OPSEC and Its Relevance</p><p>07:07 Real-World OPSEC Challenges</p><p>08:23 Balancing Public Presence and Privacy</p><p>12:44 Threat Models and OPSEC Strategies</p><p>18:07 Practical OPSEC Tips and Personal Stories</p><p>20:53 Rolling Back Your Public Profile</p><p>21:48 Digital Spring Cleaning: Deleting Old Posts</p><p>23:03 The Art of Misinformation: Poisoning the Well</p><p>24:51 Changing Your Appearance for OPSEC</p><p>27:38 Resources for Learning OPSEC</p><p>31:23 The Importance of Privacy as a Human Right</p><p>36:41 Convenience vs. Security: The Trade-offs</p><p>40:01 Final Thoughts and Advice for Blue Teamers </p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Mitch Cohen, privacy and OPSEC expert from flare.io.</p><p>Mitch shares his journey to becoming a 'digital ghost' and offers valuable insights into operational security (OPSEC) and privacy practices. He discusses the importance of securing personal information, the risks associated with poor OPSEC, and provides actionable steps for improving digital privacy.</p><p>Josh, Wade, and Mitch explore real-world examples, the ethical implications of privacy, and how to strike a balance between convenience and security.</p><p>An excellent resource for cybersecurity professionals and anyone interested in protecting their digital footprint.</p><p><a href="https://try.flare.io/flare-community/?utm_campaign=6283079-Flare%20Academy%20Discord%20Community&amp;utm_source=Media&amp;utm_medium=Simply%20Defensive">Learn more in the flare.io Discord</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:27 Meet Mitch Cohen: Privacy and OPSEC Expert</p><p>01:29 The Importance of OPSEC</p><p>04:13 Defining OPSEC and Its Relevance</p><p>07:07 Real-World OPSEC Challenges</p><p>08:23 Balancing Public Presence and Privacy</p><p>12:44 Threat Models and OPSEC Strategies</p><p>18:07 Practical OPSEC Tips and Personal Stories</p><p>20:53 Rolling Back Your Public Profile</p><p>21:48 Digital Spring Cleaning: Deleting Old Posts</p><p>23:03 The Art of Misinformation: Poisoning the Well</p><p>24:51 Changing Your Appearance for OPSEC</p><p>27:38 Resources for Learning OPSEC</p><p>31:23 The Importance of Privacy as a Human Right</p><p>36:41 Convenience vs. Security: The Trade-offs</p><p>40:01 Final Thoughts and Advice for Blue Teamers </p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 21 Apr 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/0468080f/e824fbc4.mp3" length="46248850" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2551</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Mitch Cohen, privacy and OPSEC expert from flare.io.</p><p>Mitch shares his journey to becoming a 'digital ghost' and offers valuable insights into operational security (OPSEC) and privacy practices. He discusses the importance of securing personal information, the risks associated with poor OPSEC, and provides actionable steps for improving digital privacy.</p><p>Josh, Wade, and Mitch explore real-world examples, the ethical implications of privacy, and how to strike a balance between convenience and security.</p><p>An excellent resource for cybersecurity professionals and anyone interested in protecting their digital footprint.</p><p><a href="https://try.flare.io/flare-community/?utm_campaign=6283079-Flare%20Academy%20Discord%20Community&amp;utm_source=Media&amp;utm_medium=Simply%20Defensive">Learn more in the flare.io Discord</a></p><p><br></p><p>00:00 Introduction to Simply Defensive</p><p>00:27 Meet Mitch Cohen: Privacy and OPSEC Expert</p><p>01:29 The Importance of OPSEC</p><p>04:13 Defining OPSEC and Its Relevance</p><p>07:07 Real-World OPSEC Challenges</p><p>08:23 Balancing Public Presence and Privacy</p><p>12:44 Threat Models and OPSEC Strategies</p><p>18:07 Practical OPSEC Tips and Personal Stories</p><p>20:53 Rolling Back Your Public Profile</p><p>21:48 Digital Spring Cleaning: Deleting Old Posts</p><p>23:03 The Art of Misinformation: Poisoning the Well</p><p>24:51 Changing Your Appearance for OPSEC</p><p>27:38 Resources for Learning OPSEC</p><p>31:23 The Importance of Privacy as a Human Right</p><p>36:41 Convenience vs. Security: The Trade-offs</p><p>40:01 Final Thoughts and Advice for Blue Teamers </p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E2: Navigating the Cybersecurity Landscape with Edna Johnson - From Developer to Threat Hunter</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E2: Navigating the Cybersecurity Landscape with Edna Johnson - From Developer to Threat Hunter</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2e83a348-112b-4128-8db3-236e8aa39f25</guid>
      <link>https://simplydefensive.transistor.fm/s3/2</link>
      <description>
        <![CDATA[<p>Navigating the Cybersecurity Landscape with Edna Johnson: From Developer to Threat Hunter</p><p><br></p><p>Join hosts Josh Mason and Wade Wells as they welcome Edna Johnson, a vibrant and passionate cybersecurity engineer, to Simply Defensive. Edna shares her journey from initially wanting to be a developer to diving deep into the world of cybersecurity, attending and volunteering at major conferences such as Defcon and BSides.</p><p>She discusses her role in various cybersecurity groups, her imposter syndrome battles, and the importance of volunteering and community engagement in this field. Listen in for valuable insights on threat hunting, content creation, and the significance of understanding basic processes in blue teaming. Don't miss this fantastic episode filled with real-world advice and behind-the-scenes stories from Edna's inspiring career!</p><p>Connect with Edna:<a href="https://www.linkedin.com/in/ednajonsson/"><br>https://www.linkedin.com/in/ednajonsson/<br></a><a href="https://www.buzzsprout.com/1749189">https://www.buzzsprout.com/1749189</a> <br><a href="https://deathcon.io/">https://deathcon.io/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Edna Johnson's Background and Achievements</p><p>01:53 Challenges and Successes in CTFs</p><p>03:41 Journey into Cybersecurity</p><p>05:12 Teaching Cybersecurity and Overcoming Imposter Syndrome</p><p>08:52 Involvement with BSides and Networking During the Pandemic</p><p>10:39 Current Projects and Content Development</p><p>11:49 Exploring AI-Generated Honeypots</p><p>14:06 Passion for Threat Hunting and Script Writing</p><p>14:58 Involvement with Death Con</p><p>17:01 Exploring the Unique Aspects of Death Con</p><p>17:35 The Value of Networking and Friendships</p><p>18:17 Extended Access to Labs and Workshops</p><p>19:21 Organizing Death Con San Diego</p><p>20:59 The Benefits of Volunteering in Cybersecurity</p><p>24:40 Joining and Growing DEF CON Groups</p><p>30:34 Final Thoughts and Advice for Blue Teamers</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Navigating the Cybersecurity Landscape with Edna Johnson: From Developer to Threat Hunter</p><p><br></p><p>Join hosts Josh Mason and Wade Wells as they welcome Edna Johnson, a vibrant and passionate cybersecurity engineer, to Simply Defensive. Edna shares her journey from initially wanting to be a developer to diving deep into the world of cybersecurity, attending and volunteering at major conferences such as Defcon and BSides.</p><p>She discusses her role in various cybersecurity groups, her imposter syndrome battles, and the importance of volunteering and community engagement in this field. Listen in for valuable insights on threat hunting, content creation, and the significance of understanding basic processes in blue teaming. Don't miss this fantastic episode filled with real-world advice and behind-the-scenes stories from Edna's inspiring career!</p><p>Connect with Edna:<a href="https://www.linkedin.com/in/ednajonsson/"><br>https://www.linkedin.com/in/ednajonsson/<br></a><a href="https://www.buzzsprout.com/1749189">https://www.buzzsprout.com/1749189</a> <br><a href="https://deathcon.io/">https://deathcon.io/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Edna Johnson's Background and Achievements</p><p>01:53 Challenges and Successes in CTFs</p><p>03:41 Journey into Cybersecurity</p><p>05:12 Teaching Cybersecurity and Overcoming Imposter Syndrome</p><p>08:52 Involvement with BSides and Networking During the Pandemic</p><p>10:39 Current Projects and Content Development</p><p>11:49 Exploring AI-Generated Honeypots</p><p>14:06 Passion for Threat Hunting and Script Writing</p><p>14:58 Involvement with Death Con</p><p>17:01 Exploring the Unique Aspects of Death Con</p><p>17:35 The Value of Networking and Friendships</p><p>18:17 Extended Access to Labs and Workshops</p><p>19:21 Organizing Death Con San Diego</p><p>20:59 The Benefits of Volunteering in Cybersecurity</p><p>24:40 Joining and Growing DEF CON Groups</p><p>30:34 Final Thoughts and Advice for Blue Teamers</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 14 Apr 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/b7b966ce/155eea91.mp3" length="39507951" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1912</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Navigating the Cybersecurity Landscape with Edna Johnson: From Developer to Threat Hunter</p><p><br></p><p>Join hosts Josh Mason and Wade Wells as they welcome Edna Johnson, a vibrant and passionate cybersecurity engineer, to Simply Defensive. Edna shares her journey from initially wanting to be a developer to diving deep into the world of cybersecurity, attending and volunteering at major conferences such as Defcon and BSides.</p><p>She discusses her role in various cybersecurity groups, her imposter syndrome battles, and the importance of volunteering and community engagement in this field. Listen in for valuable insights on threat hunting, content creation, and the significance of understanding basic processes in blue teaming. Don't miss this fantastic episode filled with real-world advice and behind-the-scenes stories from Edna's inspiring career!</p><p>Connect with Edna:<a href="https://www.linkedin.com/in/ednajonsson/"><br>https://www.linkedin.com/in/ednajonsson/<br></a><a href="https://www.buzzsprout.com/1749189">https://www.buzzsprout.com/1749189</a> <br><a href="https://deathcon.io/">https://deathcon.io/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Edna Johnson's Background and Achievements</p><p>01:53 Challenges and Successes in CTFs</p><p>03:41 Journey into Cybersecurity</p><p>05:12 Teaching Cybersecurity and Overcoming Imposter Syndrome</p><p>08:52 Involvement with BSides and Networking During the Pandemic</p><p>10:39 Current Projects and Content Development</p><p>11:49 Exploring AI-Generated Honeypots</p><p>14:06 Passion for Threat Hunting and Script Writing</p><p>14:58 Involvement with Death Con</p><p>17:01 Exploring the Unique Aspects of Death Con</p><p>17:35 The Value of Networking and Friendships</p><p>18:17 Extended Access to Labs and Workshops</p><p>19:21 Organizing Death Con San Diego</p><p>20:59 The Benefits of Volunteering in Cybersecurity</p><p>24:40 Joining and Growing DEF CON Groups</p><p>30:34 Final Thoughts and Advice for Blue Teamers</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S3 E1: Building Effective Cyber Defense Teams with Fletus Poston III</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:title>S3 E1: Building Effective Cyber Defense Teams with Fletus Poston III</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab42e930-e07d-4c95-b38d-e73d640c2f1a</guid>
      <link>https://simplydefensive.transistor.fm/s3/1</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by special guest Fletus Poston III, a seasoned cyber defense expert with nearly 18 years of experience.</p><p>Learn about the complexities of cyber defense in various industries, discussing the pros and cons of regulatory red tape, the impact of audits on cybersecurity, and the dynamics between internal and external red teams. </p><p>Fletus shares valuable insights on mentorship, career advice for aspiring SOC analysts, and the importance of understanding different perspectives within the industry.</p><p>Whether you're new to cybersecurity or a seasoned professional, this episode offers a deep dive into the real-world challenges and strategies in the field.</p><p>Connect with Fletus on YouTube at<a href="https://www.youtube.com/@fletusposton"> ⁨@fletusposton⁩ </a>and on <a href="https://www.linkedin.com/in/fletusposton">LinkedIn</a>.  </p><p>00:00 Introduction and Guest Introduction<br>00:55 Discussing Industry Regulations<br>01:34 Challenges with Auditing<br>04:46 Red Team vs Blue Team Dynamics<br>08:34 Career Journey in Cybersecurity<br>11:16 Building and Managing SOCs<br>13:34 Internal vs External SOC Management<br>17:05 Maintaining SOC Analyst Morale<br>18:22 Testing and Tabletops<br>18:36 Disaster Recovery Scenarios<br>19:16 Level One Analysts and Guardrails<br>19:38 Tierless SOCs and Escalation<br>20:13 Choosing the Right SOC Environment<br>21:26 Understanding Documentation and SOPs<br>22:25 Advice for Aspiring SOC Analysts<br>24:21 Work-Life Balance in SOC Roles<br>29:32 Reverse Mentorship and Cross-Training<br>31:01 Finding the Right Company Culture<br>34:57 Conclusion and Final Thoughts</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by special guest Fletus Poston III, a seasoned cyber defense expert with nearly 18 years of experience.</p><p>Learn about the complexities of cyber defense in various industries, discussing the pros and cons of regulatory red tape, the impact of audits on cybersecurity, and the dynamics between internal and external red teams. </p><p>Fletus shares valuable insights on mentorship, career advice for aspiring SOC analysts, and the importance of understanding different perspectives within the industry.</p><p>Whether you're new to cybersecurity or a seasoned professional, this episode offers a deep dive into the real-world challenges and strategies in the field.</p><p>Connect with Fletus on YouTube at<a href="https://www.youtube.com/@fletusposton"> ⁨@fletusposton⁩ </a>and on <a href="https://www.linkedin.com/in/fletusposton">LinkedIn</a>.  </p><p>00:00 Introduction and Guest Introduction<br>00:55 Discussing Industry Regulations<br>01:34 Challenges with Auditing<br>04:46 Red Team vs Blue Team Dynamics<br>08:34 Career Journey in Cybersecurity<br>11:16 Building and Managing SOCs<br>13:34 Internal vs External SOC Management<br>17:05 Maintaining SOC Analyst Morale<br>18:22 Testing and Tabletops<br>18:36 Disaster Recovery Scenarios<br>19:16 Level One Analysts and Guardrails<br>19:38 Tierless SOCs and Escalation<br>20:13 Choosing the Right SOC Environment<br>21:26 Understanding Documentation and SOPs<br>22:25 Advice for Aspiring SOC Analysts<br>24:21 Work-Life Balance in SOC Roles<br>29:32 Reverse Mentorship and Cross-Training<br>31:01 Finding the Right Company Culture<br>34:57 Conclusion and Final Thoughts</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 07 Apr 2025 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/ce6d0ea6/ea65dcc0.mp3" length="34563011" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2156</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by special guest Fletus Poston III, a seasoned cyber defense expert with nearly 18 years of experience.</p><p>Learn about the complexities of cyber defense in various industries, discussing the pros and cons of regulatory red tape, the impact of audits on cybersecurity, and the dynamics between internal and external red teams. </p><p>Fletus shares valuable insights on mentorship, career advice for aspiring SOC analysts, and the importance of understanding different perspectives within the industry.</p><p>Whether you're new to cybersecurity or a seasoned professional, this episode offers a deep dive into the real-world challenges and strategies in the field.</p><p>Connect with Fletus on YouTube at<a href="https://www.youtube.com/@fletusposton"> ⁨@fletusposton⁩ </a>and on <a href="https://www.linkedin.com/in/fletusposton">LinkedIn</a>.  </p><p>00:00 Introduction and Guest Introduction<br>00:55 Discussing Industry Regulations<br>01:34 Challenges with Auditing<br>04:46 Red Team vs Blue Team Dynamics<br>08:34 Career Journey in Cybersecurity<br>11:16 Building and Managing SOCs<br>13:34 Internal vs External SOC Management<br>17:05 Maintaining SOC Analyst Morale<br>18:22 Testing and Tabletops<br>18:36 Disaster Recovery Scenarios<br>19:16 Level One Analysts and Guardrails<br>19:38 Tierless SOCs and Escalation<br>20:13 Choosing the Right SOC Environment<br>21:26 Understanding Documentation and SOPs<br>22:25 Advice for Aspiring SOC Analysts<br>24:21 Work-Life Balance in SOC Roles<br>29:32 Reverse Mentorship and Cross-Training<br>31:01 Finding the Right Company Culture<br>34:57 Conclusion and Final Thoughts</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E8: SOC Challenges, Trends, and Community Wisdom with Reanna Schultz</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E8: SOC Challenges, Trends, and Community Wisdom with Reanna Schultz</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fedfdd14-82be-4215-8a04-bd52de8e3b31</guid>
      <link>https://simplydefensive.transistor.fm/s2/8</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Reanna Schultz, a renowned cyber influencer and SOC manager. Reanna shares her journey from aspiring state highway patrolwoman to cybersecurity expert, emphasizing the importance of community engagement and continuous learning.</p><p>Join us as we cover the challenges and rewards of working in a SOC, the nuances of public speaking, and offers valuable advice for newcomers to the field. This episode is a treasure trove of insights, humor, and practical tips for anyone interested in cybersecurity.</p><p><br></p><p>Connect with Reanna on LinkedIn: <a href="https://www.linkedin.com/in/reanna-schultz/">https://www.linkedin.com/in/reanna-schultz/</a></p><p>Follow Reanna on YouTube: <a href="https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA">https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA</a></p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Reanna Schultz, a renowned cyber influencer and SOC manager. Reanna shares her journey from aspiring state highway patrolwoman to cybersecurity expert, emphasizing the importance of community engagement and continuous learning.</p><p>Join us as we cover the challenges and rewards of working in a SOC, the nuances of public speaking, and offers valuable advice for newcomers to the field. This episode is a treasure trove of insights, humor, and practical tips for anyone interested in cybersecurity.</p><p><br></p><p>Connect with Reanna on LinkedIn: <a href="https://www.linkedin.com/in/reanna-schultz/">https://www.linkedin.com/in/reanna-schultz/</a></p><p>Follow Reanna on YouTube: <a href="https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA">https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA</a></p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Mar 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/223636ab/b4b0fc86.mp3" length="40362664" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2518</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Reanna Schultz, a renowned cyber influencer and SOC manager. Reanna shares her journey from aspiring state highway patrolwoman to cybersecurity expert, emphasizing the importance of community engagement and continuous learning.</p><p>Join us as we cover the challenges and rewards of working in a SOC, the nuances of public speaking, and offers valuable advice for newcomers to the field. This episode is a treasure trove of insights, humor, and practical tips for anyone interested in cybersecurity.</p><p><br></p><p>Connect with Reanna on LinkedIn: <a href="https://www.linkedin.com/in/reanna-schultz/">https://www.linkedin.com/in/reanna-schultz/</a></p><p>Follow Reanna on YouTube: <a href="https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA">https://www.youtube.com/channel/UC52GRGtruHriE2yGJzv5nuA</a></p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E7: Understanding Mac Security - Challenges and Insights with Slava Konstantinov</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E7: Understanding Mac Security - Challenges and Insights with Slava Konstantinov</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">77716170-68af-48b0-b6e3-725b78609304</guid>
      <link>https://simplydefensive.transistor.fm/s2/7</link>
      <description>
        <![CDATA[<p>Understanding Mac Security: Challenges and Insights with Slava Konstantinov</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Slava Konstantinov, the Head of Mac Development at ThreatLocker. Slava dives deep into the world of Mac security, explaining the challenges and intricacies of developing security agents for macOS. Learn about the differences discussed between Mac, Windows, and Linux security, the hurdles in defending Macs due to Apple's privacy measures, and the importance of zero trust security models. Slava also shares stories from his journey in cybersecurity, tips for defenders, and insights into current developments and future plans at ThreatLocker.</p><p>Don't miss this comprehensive discussion on modern Mac security!</p><p><br>Connect with Slava on LinkedIn: <a href="https://www.linkedin.com/in/franticmm/">https://www.linkedin.com/in/franticmm</a><br>Connect with <a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast.">@ThreatLocker</a></p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:57 Challenges of Mac Security</p><p>01:38 Mac vs. Windows Security</p><p>02:32 Kernel Level Security</p><p>05:34 Mac Malware and Attack Vectors</p><p>10:10 Hackintosh and Early Mac Experiences</p><p>15:00 Zero Trust and ThreatLocker Mac Agent</p><p>16:31 Inbound Connection Issues</p><p>17:04 Ring Fencing and Application Control</p><p>17:38 Unified Audit and ThreatLocker Detect</p><p>18:24 Cross-Platform Detection Challenges</p><p>20:16 MacOS Debugging and Firewall Issues</p><p>24:34 Zero Trust and Elevation</p><p>26:13 Conference Experiences and Advice</p><p>28:28 Final Thoughts and Security Tips</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding Mac Security: Challenges and Insights with Slava Konstantinov</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Slava Konstantinov, the Head of Mac Development at ThreatLocker. Slava dives deep into the world of Mac security, explaining the challenges and intricacies of developing security agents for macOS. Learn about the differences discussed between Mac, Windows, and Linux security, the hurdles in defending Macs due to Apple's privacy measures, and the importance of zero trust security models. Slava also shares stories from his journey in cybersecurity, tips for defenders, and insights into current developments and future plans at ThreatLocker.</p><p>Don't miss this comprehensive discussion on modern Mac security!</p><p><br>Connect with Slava on LinkedIn: <a href="https://www.linkedin.com/in/franticmm/">https://www.linkedin.com/in/franticmm</a><br>Connect with <a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast.">@ThreatLocker</a></p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:57 Challenges of Mac Security</p><p>01:38 Mac vs. Windows Security</p><p>02:32 Kernel Level Security</p><p>05:34 Mac Malware and Attack Vectors</p><p>10:10 Hackintosh and Early Mac Experiences</p><p>15:00 Zero Trust and ThreatLocker Mac Agent</p><p>16:31 Inbound Connection Issues</p><p>17:04 Ring Fencing and Application Control</p><p>17:38 Unified Audit and ThreatLocker Detect</p><p>18:24 Cross-Platform Detection Challenges</p><p>20:16 MacOS Debugging and Firewall Issues</p><p>24:34 Zero Trust and Elevation</p><p>26:13 Conference Experiences and Advice</p><p>28:28 Final Thoughts and Security Tips</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/3fb64ccd/3925a54a.mp3" length="34546786" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2155</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding Mac Security: Challenges and Insights with Slava Konstantinov</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Slava Konstantinov, the Head of Mac Development at ThreatLocker. Slava dives deep into the world of Mac security, explaining the challenges and intricacies of developing security agents for macOS. Learn about the differences discussed between Mac, Windows, and Linux security, the hurdles in defending Macs due to Apple's privacy measures, and the importance of zero trust security models. Slava also shares stories from his journey in cybersecurity, tips for defenders, and insights into current developments and future plans at ThreatLocker.</p><p>Don't miss this comprehensive discussion on modern Mac security!</p><p><br>Connect with Slava on LinkedIn: <a href="https://www.linkedin.com/in/franticmm/">https://www.linkedin.com/in/franticmm</a><br>Connect with <a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast.">@ThreatLocker</a></p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:57 Challenges of Mac Security</p><p>01:38 Mac vs. Windows Security</p><p>02:32 Kernel Level Security</p><p>05:34 Mac Malware and Attack Vectors</p><p>10:10 Hackintosh and Early Mac Experiences</p><p>15:00 Zero Trust and ThreatLocker Mac Agent</p><p>16:31 Inbound Connection Issues</p><p>17:04 Ring Fencing and Application Control</p><p>17:38 Unified Audit and ThreatLocker Detect</p><p>18:24 Cross-Platform Detection Challenges</p><p>20:16 MacOS Debugging and Firewall Issues</p><p>24:34 Zero Trust and Elevation</p><p>26:13 Conference Experiences and Advice</p><p>28:28 Final Thoughts and Security Tips</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E6: Navigating OT Security - An Inside Look with Lesley Carhart</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E6: Navigating OT Security - An Inside Look with Lesley Carhart</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3e071f2-9b1a-49c5-8714-d4d6cb9f5d50</guid>
      <link>https://simplydefensive.transistor.fm/s2/6</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome the highly esteemed Leslie Carhart from Dragos.</p><p>We step into the world of industrial cybersecurity, discussing the critical nature of securing vital infrastructure like power plants, water treatment facilities, and manufacturing setups. Leslie shares insights on the unique challenges faced in this sector, including handling old systems, different procedural mindsets, and low-level industrial devices.</p><p>The episode also covers Leslie's intriguing career journey, filled with diverse technical roles, and her advice on entering and thriving in cybersecurity. Moreover, Leslie offers valuable guidance on mentorship and maintaining a work-life balance for cybersecurity professionals.</p><p><br></p><p><a href="https://www.linkedin.com/in/lcarhart/">https://www.linkedin.com/in/lcarhart/</a></p><p><a href="https://pancakescon.com/">https://pancakescon.com/</a></p><p><a href="https://www.sans.org/profiles/lesley-carhart/">https://www.sans.org/profiles/lesley-carhart/</a></p><p><a href="https://bsky.app/profile/hacks4pancakes.com">https://bsky.app/profile/hacks4pancakes.com</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:02 Leslie Carhartt's Role at Dragos</p><p>02:06 Challenges in Industrial Cybersecurity</p><p>06:39 Leslie's Career Journey</p><p>09:01 Advice for Aspiring OT Cybersecurity Professionals</p><p>13:24 Incident Response in OT Environments</p><p>16:50 Mapping Processes in OT Security</p><p>18:06 Reflecting on Early Career Lessons</p><p>18:31 Navigating Social Media Criticism</p><p>19:55 Cyber Warfare and Air Force Insights</p><p>22:04 Challenges in OT Security</p><p>24:02 Mentoring in Cybersecurity</p><p>24:43 Advice for Aspiring Cybersecurity Professionals</p><p>25:51 Realities of Pen Testing and Incident Response</p><p>29:32 Effective Mentorship Strategies</p><p>32:50 Final Thoughts and Contact Information</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast."> </a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome the highly esteemed Leslie Carhart from Dragos.</p><p>We step into the world of industrial cybersecurity, discussing the critical nature of securing vital infrastructure like power plants, water treatment facilities, and manufacturing setups. Leslie shares insights on the unique challenges faced in this sector, including handling old systems, different procedural mindsets, and low-level industrial devices.</p><p>The episode also covers Leslie's intriguing career journey, filled with diverse technical roles, and her advice on entering and thriving in cybersecurity. Moreover, Leslie offers valuable guidance on mentorship and maintaining a work-life balance for cybersecurity professionals.</p><p><br></p><p><a href="https://www.linkedin.com/in/lcarhart/">https://www.linkedin.com/in/lcarhart/</a></p><p><a href="https://pancakescon.com/">https://pancakescon.com/</a></p><p><a href="https://www.sans.org/profiles/lesley-carhart/">https://www.sans.org/profiles/lesley-carhart/</a></p><p><a href="https://bsky.app/profile/hacks4pancakes.com">https://bsky.app/profile/hacks4pancakes.com</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:02 Leslie Carhartt's Role at Dragos</p><p>02:06 Challenges in Industrial Cybersecurity</p><p>06:39 Leslie's Career Journey</p><p>09:01 Advice for Aspiring OT Cybersecurity Professionals</p><p>13:24 Incident Response in OT Environments</p><p>16:50 Mapping Processes in OT Security</p><p>18:06 Reflecting on Early Career Lessons</p><p>18:31 Navigating Social Media Criticism</p><p>19:55 Cyber Warfare and Air Force Insights</p><p>22:04 Challenges in OT Security</p><p>24:02 Mentoring in Cybersecurity</p><p>24:43 Advice for Aspiring Cybersecurity Professionals</p><p>25:51 Realities of Pen Testing and Incident Response</p><p>29:32 Effective Mentorship Strategies</p><p>32:50 Final Thoughts and Contact Information</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast."> </a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Feb 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/2f0c51ff/569c985d.mp3" length="35330426" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2204</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome the highly esteemed Leslie Carhart from Dragos.</p><p>We step into the world of industrial cybersecurity, discussing the critical nature of securing vital infrastructure like power plants, water treatment facilities, and manufacturing setups. Leslie shares insights on the unique challenges faced in this sector, including handling old systems, different procedural mindsets, and low-level industrial devices.</p><p>The episode also covers Leslie's intriguing career journey, filled with diverse technical roles, and her advice on entering and thriving in cybersecurity. Moreover, Leslie offers valuable guidance on mentorship and maintaining a work-life balance for cybersecurity professionals.</p><p><br></p><p><a href="https://www.linkedin.com/in/lcarhart/">https://www.linkedin.com/in/lcarhart/</a></p><p><a href="https://pancakescon.com/">https://pancakescon.com/</a></p><p><a href="https://www.sans.org/profiles/lesley-carhart/">https://www.sans.org/profiles/lesley-carhart/</a></p><p><a href="https://bsky.app/profile/hacks4pancakes.com">https://bsky.app/profile/hacks4pancakes.com</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>01:02 Leslie Carhartt's Role at Dragos</p><p>02:06 Challenges in Industrial Cybersecurity</p><p>06:39 Leslie's Career Journey</p><p>09:01 Advice for Aspiring OT Cybersecurity Professionals</p><p>13:24 Incident Response in OT Environments</p><p>16:50 Mapping Processes in OT Security</p><p>18:06 Reflecting on Early Career Lessons</p><p>18:31 Navigating Social Media Criticism</p><p>19:55 Cyber Warfare and Air Force Insights</p><p>22:04 Challenges in OT Security</p><p>24:02 Mentoring in Cybersecurity</p><p>24:43 Advice for Aspiring Cybersecurity Professionals</p><p>25:51 Realities of Pen Testing and Incident Response</p><p>29:32 Effective Mentorship Strategies</p><p>32:50 Final Thoughts and Contact Information</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: <a href="https://www.linkedin.com/in/joshuacmason">https://www.linkedin.com/in/joshuacmason</a><br>Wade Wells: <a href="https://www.linkedin.com/in/wadingthrulogs">https://www.linkedin.com/in/wadingthrulogs</a><br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><a href="https://www.threatlocker.com/pages/solutions?utm_source=simply_cyber_daily&amp;utm_medium=sponsor&amp;utm_campaign=&amp;utm_content=live&amp;utm_term=podcast."> </a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br><a href="https://simplycyber.io/socials">https://SimplyCyber.io/Socials</a><br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E5: From Red to Blue - David Perez's Cybersecurity Odyssey</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E5: From Red to Blue - David Perez's Cybersecurity Odyssey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">045cf9ea-b53d-4a19-8915-50a137f3b8e9</guid>
      <link>https://simplydefensive.transistor.fm/s2/5</link>
      <description>
        <![CDATA[<p>From Navy Red Team to Blue Team: David Perez's Cybersecurity Journey</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade What’s Up interview David Perez, a Navy veteran who transitioned from red teaming to blue teaming in cybersecurity. David shares insights into his career path, his experience with the Navy’s Skillbridge program, and the challenges he faced moving from a structured military environment to the more fluid civilian sector.</p><p>David also discusses the importance of thinking like an attacker for effective defense, his thoughts on training and detection engineering, and offers valuable advice for those looking to break into the cybersecurity field. Join the conversation to learn about David’s journey, his day-to-day responsibilities, and how he stays sharp in the ever-evolving world of cybersecurity. </p><p>Don’t forget to like, subscribe, and share!</p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:19 David Perez's Cybersecurity Journey</p><p>00:54 Transition from Military to Civilian Cybersecurity</p><p>01:48 Skill Bridge Experience</p><p>03:07 First SOC Job and Responsibilities</p><p>03:51 Becoming a Detection Engineer</p><p>04:41 Challenges and Freedom in Cybersecurity Roles</p><p>08:28 Detection Engineering Insights</p><p>11:06 Risk-Based Alerting</p><p>13:14 Detection Rule Management</p><p>16:38 Detection Building Process</p><p>18:24 Automated Threat Hunting</p><p>19:40 Challenges in Detection Engineering</p><p>20:15 Resources and Learning for Detection Engineering</p><p>21:46 Teaching and Learning in Cybersecurity</p><p>22:46 The Importance of Experience in Detection Engineering</p><p>28:31 Balancing Work and Personal Life</p><p>31:46 Advice for Aspiring Blue Teamers</p><p>34:12 Conclusion and Contact Information</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From Navy Red Team to Blue Team: David Perez's Cybersecurity Journey</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade What’s Up interview David Perez, a Navy veteran who transitioned from red teaming to blue teaming in cybersecurity. David shares insights into his career path, his experience with the Navy’s Skillbridge program, and the challenges he faced moving from a structured military environment to the more fluid civilian sector.</p><p>David also discusses the importance of thinking like an attacker for effective defense, his thoughts on training and detection engineering, and offers valuable advice for those looking to break into the cybersecurity field. Join the conversation to learn about David’s journey, his day-to-day responsibilities, and how he stays sharp in the ever-evolving world of cybersecurity. </p><p>Don’t forget to like, subscribe, and share!</p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:19 David Perez's Cybersecurity Journey</p><p>00:54 Transition from Military to Civilian Cybersecurity</p><p>01:48 Skill Bridge Experience</p><p>03:07 First SOC Job and Responsibilities</p><p>03:51 Becoming a Detection Engineer</p><p>04:41 Challenges and Freedom in Cybersecurity Roles</p><p>08:28 Detection Engineering Insights</p><p>11:06 Risk-Based Alerting</p><p>13:14 Detection Rule Management</p><p>16:38 Detection Building Process</p><p>18:24 Automated Threat Hunting</p><p>19:40 Challenges in Detection Engineering</p><p>20:15 Resources and Learning for Detection Engineering</p><p>21:46 Teaching and Learning in Cybersecurity</p><p>22:46 The Importance of Experience in Detection Engineering</p><p>28:31 Balancing Work and Personal Life</p><p>31:46 Advice for Aspiring Blue Teamers</p><p>34:12 Conclusion and Contact Information</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Feb 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/da9384a1/73144a9b.mp3" length="34925843" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2179</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From Navy Red Team to Blue Team: David Perez's Cybersecurity Journey</p><p><br></p><p>In this episode of Simply Defensive, hosts Josh Mason and Wade What’s Up interview David Perez, a Navy veteran who transitioned from red teaming to blue teaming in cybersecurity. David shares insights into his career path, his experience with the Navy’s Skillbridge program, and the challenges he faced moving from a structured military environment to the more fluid civilian sector.</p><p>David also discusses the importance of thinking like an attacker for effective defense, his thoughts on training and detection engineering, and offers valuable advice for those looking to break into the cybersecurity field. Join the conversation to learn about David’s journey, his day-to-day responsibilities, and how he stays sharp in the ever-evolving world of cybersecurity. </p><p>Don’t forget to like, subscribe, and share!</p><p><br></p><p>00:00 Introduction and Guest Introduction</p><p>00:19 David Perez's Cybersecurity Journey</p><p>00:54 Transition from Military to Civilian Cybersecurity</p><p>01:48 Skill Bridge Experience</p><p>03:07 First SOC Job and Responsibilities</p><p>03:51 Becoming a Detection Engineer</p><p>04:41 Challenges and Freedom in Cybersecurity Roles</p><p>08:28 Detection Engineering Insights</p><p>11:06 Risk-Based Alerting</p><p>13:14 Detection Rule Management</p><p>16:38 Detection Building Process</p><p>18:24 Automated Threat Hunting</p><p>19:40 Challenges in Detection Engineering</p><p>20:15 Resources and Learning for Detection Engineering</p><p>21:46 Teaching and Learning in Cybersecurity</p><p>22:46 The Importance of Experience in Detection Engineering</p><p>28:31 Balancing Work and Personal Life</p><p>31:46 Advice for Aspiring Blue Teamers</p><p>34:12 Conclusion and Contact Information</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E4: SOC Operations and Metrics with Hayden Covington</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E4: SOC Operations and Metrics with Hayden Covington</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17b0b083-c0ce-40d4-8055-1767430614a1</guid>
      <link>https://simplydefensive.transistor.fm/s2/4</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Hayden Covington from Black Hills Information Security. Hayden shares insights into his role at a Security Operations Center (SOC), discussing key metrics, challenges in SOC work, and the importance of communication with MSP customers.</p><p>The conversation also delves into Hayden's new course on SOC foundations using Elastic and Jira, his experiences with public speaking, and the importance of personal documentation for productivity and problem-solving.</p><p>- Hayden’s Webinar on Metrics in the SOC: https://www.youtube.com/watch?v=RvsAy4xXrpQ<br>- Hayden’s LinkedIn: https://www.linkedin.com/in/hayden-covington-468495128/<br>- Hayden’s Course: https://www.antisyphontraining.com/course/foundations-of-soc-with-elastic-and-jira-with-hayden-covington/</p><p>00:00 Introduction and Guest Welcome<br>00:18 Hayden's Background and Role at Black Hills<br>01:15 Importance of SOC Metrics<br>04:06 Challenges in SOC and Customer Relationships<br>09:19 Working from Home vs. Office<br>11:50 Foundations of SOC Course<br>16:46 Discussing the Course and Coffee Consumption<br>17:30 Teaching Experiences and Imposter Syndrome<br>19:10 Career Journey and Working at Black Hills<br>20:55 Public Speaking and Overcoming Fear<br>22:52 Balancing Hobbies and Work<br>27:57 Dungeons &amp; Dragons and Gaming<br>33:41 Productivity Tips and Tools<br>34:41 Conclusion and Farewell</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason <br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs <br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Hayden Covington from Black Hills Information Security. Hayden shares insights into his role at a Security Operations Center (SOC), discussing key metrics, challenges in SOC work, and the importance of communication with MSP customers.</p><p>The conversation also delves into Hayden's new course on SOC foundations using Elastic and Jira, his experiences with public speaking, and the importance of personal documentation for productivity and problem-solving.</p><p>- Hayden’s Webinar on Metrics in the SOC: https://www.youtube.com/watch?v=RvsAy4xXrpQ<br>- Hayden’s LinkedIn: https://www.linkedin.com/in/hayden-covington-468495128/<br>- Hayden’s Course: https://www.antisyphontraining.com/course/foundations-of-soc-with-elastic-and-jira-with-hayden-covington/</p><p>00:00 Introduction and Guest Welcome<br>00:18 Hayden's Background and Role at Black Hills<br>01:15 Importance of SOC Metrics<br>04:06 Challenges in SOC and Customer Relationships<br>09:19 Working from Home vs. Office<br>11:50 Foundations of SOC Course<br>16:46 Discussing the Course and Coffee Consumption<br>17:30 Teaching Experiences and Imposter Syndrome<br>19:10 Career Journey and Working at Black Hills<br>20:55 Public Speaking and Overcoming Fear<br>22:52 Balancing Hobbies and Work<br>27:57 Dungeons &amp; Dragons and Gaming<br>33:41 Productivity Tips and Tools<br>34:41 Conclusion and Farewell</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason <br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs <br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Feb 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/7c9f1e44/1fb65147.mp3" length="34835958" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2173</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Hayden Covington from Black Hills Information Security. Hayden shares insights into his role at a Security Operations Center (SOC), discussing key metrics, challenges in SOC work, and the importance of communication with MSP customers.</p><p>The conversation also delves into Hayden's new course on SOC foundations using Elastic and Jira, his experiences with public speaking, and the importance of personal documentation for productivity and problem-solving.</p><p>- Hayden’s Webinar on Metrics in the SOC: https://www.youtube.com/watch?v=RvsAy4xXrpQ<br>- Hayden’s LinkedIn: https://www.linkedin.com/in/hayden-covington-468495128/<br>- Hayden’s Course: https://www.antisyphontraining.com/course/foundations-of-soc-with-elastic-and-jira-with-hayden-covington/</p><p>00:00 Introduction and Guest Welcome<br>00:18 Hayden's Background and Role at Black Hills<br>01:15 Importance of SOC Metrics<br>04:06 Challenges in SOC and Customer Relationships<br>09:19 Working from Home vs. Office<br>11:50 Foundations of SOC Course<br>16:46 Discussing the Course and Coffee Consumption<br>17:30 Teaching Experiences and Imposter Syndrome<br>19:10 Career Journey and Working at Black Hills<br>20:55 Public Speaking and Overcoming Fear<br>22:52 Balancing Hobbies and Work<br>27:57 Dungeons &amp; Dragons and Gaming<br>33:41 Productivity Tips and Tools<br>34:41 Conclusion and Farewell</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason <br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs <br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E3: Unlocking the Potential of Blue Teaming with Microsoft Intel Analyst Simeon</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E3: Unlocking the Potential of Blue Teaming with Microsoft Intel Analyst Simeon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c7e61a6-1163-49ce-8bfb-958f0b8e119a</guid>
      <link>https://simplydefensive.transistor.fm/s2/3</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells talk with Simeon, an Intel Analyst at Microsoft. Listen as they explore his journey from aspiring doctor to cybersecurity expert, discussing his innovative contributions like the creation of KC7 Cyber, a tool that democratizes access to cybersecurity training.</p><p>Learn about Simeon's early influences, challenges, and the importance of critical thinking, analytical reasoning, and communication in cybersecurity. He also shares his passion for breaking down biases and encouraging diversity in the tech world while offering practical advice for both new and seasoned blue teamers. Discover how KC7 is shaping the future of cyber defense training and get inspired by Simeon's dedication to making cybersecurity accessible to all.</p><p><br>Connect with Simeon: <a href="https://www.linkedin.com/in/kakpovi/">https://www.linkedin.com/in/kakpovi/</a></p><p>Check out KC7: <a href="https://kc7cyber.com/">https://kc7cyber.com/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Simeon's Background and Career Journey</p><p>01:26 Getting Started in Cybersecurity</p><p>02:17 The Cyber Analyst Challenge Experience</p><p>04:03 Industry vs Academic Cybersecurity</p><p>07:08 Diversity in Cybersecurity</p><p>07:54 Emerging Coders Club at Howard</p><p>08:21 Breaking Technical and Non-Technical Labels</p><p>13:17 The Birth of KC7 Cyber</p><p>17:19 Using AI to Scale Cybersecurity Training</p><p>18:28 Behind the Scenes of a Complex Engine</p><p>20:01 Teaching Critical Thinking and Analytical Reasoning</p><p>20:50 The Importance of Transferable Skills</p><p>21:13 Using KQL for Fast Data Access</p><p>22:57 Investigative Process and Anticipating Questions</p><p>24:19 Technical Interviews and Investigative Skills</p><p>26:39 Training New Analysts in Full Scope Investigations</p><p>32:57 KC7: A Tool for Accelerated Learning</p><p>36:37 Final Thoughts and Recommendations</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells talk with Simeon, an Intel Analyst at Microsoft. Listen as they explore his journey from aspiring doctor to cybersecurity expert, discussing his innovative contributions like the creation of KC7 Cyber, a tool that democratizes access to cybersecurity training.</p><p>Learn about Simeon's early influences, challenges, and the importance of critical thinking, analytical reasoning, and communication in cybersecurity. He also shares his passion for breaking down biases and encouraging diversity in the tech world while offering practical advice for both new and seasoned blue teamers. Discover how KC7 is shaping the future of cyber defense training and get inspired by Simeon's dedication to making cybersecurity accessible to all.</p><p><br>Connect with Simeon: <a href="https://www.linkedin.com/in/kakpovi/">https://www.linkedin.com/in/kakpovi/</a></p><p>Check out KC7: <a href="https://kc7cyber.com/">https://kc7cyber.com/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Simeon's Background and Career Journey</p><p>01:26 Getting Started in Cybersecurity</p><p>02:17 The Cyber Analyst Challenge Experience</p><p>04:03 Industry vs Academic Cybersecurity</p><p>07:08 Diversity in Cybersecurity</p><p>07:54 Emerging Coders Club at Howard</p><p>08:21 Breaking Technical and Non-Technical Labels</p><p>13:17 The Birth of KC7 Cyber</p><p>17:19 Using AI to Scale Cybersecurity Training</p><p>18:28 Behind the Scenes of a Complex Engine</p><p>20:01 Teaching Critical Thinking and Analytical Reasoning</p><p>20:50 The Importance of Transferable Skills</p><p>21:13 Using KQL for Fast Data Access</p><p>22:57 Investigative Process and Anticipating Questions</p><p>24:19 Technical Interviews and Investigative Skills</p><p>26:39 Training New Analysts in Full Scope Investigations</p><p>32:57 KC7: A Tool for Accelerated Learning</p><p>36:37 Final Thoughts and Recommendations</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Jan 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/a258abfd/89ee0b03.mp3" length="38321792" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2391</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells talk with Simeon, an Intel Analyst at Microsoft. Listen as they explore his journey from aspiring doctor to cybersecurity expert, discussing his innovative contributions like the creation of KC7 Cyber, a tool that democratizes access to cybersecurity training.</p><p>Learn about Simeon's early influences, challenges, and the importance of critical thinking, analytical reasoning, and communication in cybersecurity. He also shares his passion for breaking down biases and encouraging diversity in the tech world while offering practical advice for both new and seasoned blue teamers. Discover how KC7 is shaping the future of cyber defense training and get inspired by Simeon's dedication to making cybersecurity accessible to all.</p><p><br>Connect with Simeon: <a href="https://www.linkedin.com/in/kakpovi/">https://www.linkedin.com/in/kakpovi/</a></p><p>Check out KC7: <a href="https://kc7cyber.com/">https://kc7cyber.com/</a></p><p><br></p><p>00:00 Introduction and Guest Welcome</p><p>00:36 Simeon's Background and Career Journey</p><p>01:26 Getting Started in Cybersecurity</p><p>02:17 The Cyber Analyst Challenge Experience</p><p>04:03 Industry vs Academic Cybersecurity</p><p>07:08 Diversity in Cybersecurity</p><p>07:54 Emerging Coders Club at Howard</p><p>08:21 Breaking Technical and Non-Technical Labels</p><p>13:17 The Birth of KC7 Cyber</p><p>17:19 Using AI to Scale Cybersecurity Training</p><p>18:28 Behind the Scenes of a Complex Engine</p><p>20:01 Teaching Critical Thinking and Analytical Reasoning</p><p>20:50 The Importance of Transferable Skills</p><p>21:13 Using KQL for Fast Data Access</p><p>22:57 Investigative Process and Anticipating Questions</p><p>24:19 Technical Interviews and Investigative Skills</p><p>26:39 Training New Analysts in Full Scope Investigations</p><p>32:57 KC7: A Tool for Accelerated Learning</p><p>36:37 Final Thoughts and Recommendations</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E2: From Military Police to Cyber Sleuth - Jess Bishop's Journey and Insights</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E2: From Military Police to Cyber Sleuth - Jess Bishop's Journey and Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">153159c5-41e2-4caa-9925-3a6c80580e6f</guid>
      <link>https://simplydefensive.transistor.fm/s2/2</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by SOC analyst Jessica Bishop. Jessica shares her unconventional journey into cybersecurity, transitioning from military police to a corporate role and eventually into a SOC analyst position at an MSSP.</p><p>She discusses her job's dynamic and engaging aspects, the importance of teamwork and communication within cybersecurity, and her intriguing hobby of paranormal investigation. Tune in to hear about effective cybersecurity practices, the challenges of working in a SOC, and the crossover between investigative tactics in cybersecurity and paranormal research.</p><p>Follow Jess on LinkedIn: https://www.linkedin.com/in/jessica-bishop-%F0%9F%A7%AD-262729b4/</p><p>00:00 Introduction and Guest Welcome<br>00:38 Jessica's Journey into Cybersecurity<br>04:02 Networking and Mentorship<br>05:00 Education and Career Path<br>09:24 Challenges and Rewards in SOC Work<br>13:58 Paranormal Investigations<br>16:05 Haunted House Stories<br>17:35 The Importance of Skepticism in Investigations<br>18:38 Relating Skepticism to Cybersecurity<br>19:00 The Dropbox Incident<br>20:18 Inflating Metrics in SOC<br>21:04 Challenges of Working in a SOC<br>24:21 The Importance of Communication in Security<br>29:41 Empathy in Security Work<br>30:22 Final Thoughts and Recommendations</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by SOC analyst Jessica Bishop. Jessica shares her unconventional journey into cybersecurity, transitioning from military police to a corporate role and eventually into a SOC analyst position at an MSSP.</p><p>She discusses her job's dynamic and engaging aspects, the importance of teamwork and communication within cybersecurity, and her intriguing hobby of paranormal investigation. Tune in to hear about effective cybersecurity practices, the challenges of working in a SOC, and the crossover between investigative tactics in cybersecurity and paranormal research.</p><p>Follow Jess on LinkedIn: https://www.linkedin.com/in/jessica-bishop-%F0%9F%A7%AD-262729b4/</p><p>00:00 Introduction and Guest Welcome<br>00:38 Jessica's Journey into Cybersecurity<br>04:02 Networking and Mentorship<br>05:00 Education and Career Path<br>09:24 Challenges and Rewards in SOC Work<br>13:58 Paranormal Investigations<br>16:05 Haunted House Stories<br>17:35 The Importance of Skepticism in Investigations<br>18:38 Relating Skepticism to Cybersecurity<br>19:00 The Dropbox Incident<br>20:18 Inflating Metrics in SOC<br>21:04 Challenges of Working in a SOC<br>24:21 The Importance of Communication in Security<br>29:41 Empathy in Security Work<br>30:22 Final Thoughts and Recommendations</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Jan 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/558a98c9/3b80e06b.mp3" length="33518601" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2091</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by SOC analyst Jessica Bishop. Jessica shares her unconventional journey into cybersecurity, transitioning from military police to a corporate role and eventually into a SOC analyst position at an MSSP.</p><p>She discusses her job's dynamic and engaging aspects, the importance of teamwork and communication within cybersecurity, and her intriguing hobby of paranormal investigation. Tune in to hear about effective cybersecurity practices, the challenges of working in a SOC, and the crossover between investigative tactics in cybersecurity and paranormal research.</p><p>Follow Jess on LinkedIn: https://www.linkedin.com/in/jessica-bishop-%F0%9F%A7%AD-262729b4/</p><p>00:00 Introduction and Guest Welcome<br>00:38 Jessica's Journey into Cybersecurity<br>04:02 Networking and Mentorship<br>05:00 Education and Career Path<br>09:24 Challenges and Rewards in SOC Work<br>13:58 Paranormal Investigations<br>16:05 Haunted House Stories<br>17:35 The Importance of Skepticism in Investigations<br>18:38 Relating Skepticism to Cybersecurity<br>19:00 The Dropbox Incident<br>20:18 Inflating Metrics in SOC<br>21:04 Challenges of Working in a SOC<br>24:21 The Importance of Communication in Security<br>29:41 Empathy in Security Work<br>30:22 Final Thoughts and Recommendations</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S2 E1: Cybersecurity Adventures with Dan Reardon - Memes, Blogging, and Community Insights</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:title>S2 E1: Cybersecurity Adventures with Dan Reardon - Memes, Blogging, and Community Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e513736-922f-41ea-8fb2-feb9d1271d53</guid>
      <link>https://simplydefensive.transistor.fm/s2/1</link>
      <description>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells in this episode of Simply Defensive as they welcome cybersecurity meme-maker and SOC analyst, Dan Reardon, also known as The HaircutFish.</p><p>Discover Dan's unconventional journey into cybersecurity, from creating influential memes about prominent figures like Jon Hammond and John Strand to writing insightful blogs on Medium. Dan shares his experiences at Wild West Hacking Fest, overcoming personal challenges, and the importance of networking within the cybersecurity community.</p><p>Learn about the reality of working as a SOC analyst, the tools of the trade such as Vim, VS Code, and Wireshark, and the rewarding nature of thwarting cyber attacks. This episode emphasizes the power of community, the significance of balancing work with family life, and the benefits of giving back through knowledge sharing.</p><p>Don't miss these valuable insights, and expect more exciting discussions in future episodes!</p><p>Connect with our guest, Dan Reardon, on LinkedIn: <a href="https://www.linkedin.com/in/danrearden/">https://www.linkedin.com/in/danrearden</a></p><p><br></p><p>00:00 Welcome to Simply Defensive</p><p>00:10 Meet Dan Reardon aka Haircutfish</p><p>00:51 Dan's Journey into Cybersecurity</p><p>01:14 The Art of Meme Making</p><p>02:15 Connecting Through Memes</p><p>06:20 Dan's Blogging Adventures</p><p>11:50 Learning and Adapting in Cybersecurity</p><p>14:21 Dan's Hacker Origin Story</p><p>17:07 Getting Started with TryHackMe and Blue Teaming</p><p>17:48 First Security Job Experience</p><p>18:19 Expectations vs Reality in SOC Roles</p><p>20:30 Favorite Tools and Utilities</p><p>25:16 The Importance of Community in Cybersecurity</p><p>33:08 Final Thoughts and Recommendations for Blue Teamers</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells in this episode of Simply Defensive as they welcome cybersecurity meme-maker and SOC analyst, Dan Reardon, also known as The HaircutFish.</p><p>Discover Dan's unconventional journey into cybersecurity, from creating influential memes about prominent figures like Jon Hammond and John Strand to writing insightful blogs on Medium. Dan shares his experiences at Wild West Hacking Fest, overcoming personal challenges, and the importance of networking within the cybersecurity community.</p><p>Learn about the reality of working as a SOC analyst, the tools of the trade such as Vim, VS Code, and Wireshark, and the rewarding nature of thwarting cyber attacks. This episode emphasizes the power of community, the significance of balancing work with family life, and the benefits of giving back through knowledge sharing.</p><p>Don't miss these valuable insights, and expect more exciting discussions in future episodes!</p><p>Connect with our guest, Dan Reardon, on LinkedIn: <a href="https://www.linkedin.com/in/danrearden/">https://www.linkedin.com/in/danrearden</a></p><p><br></p><p>00:00 Welcome to Simply Defensive</p><p>00:10 Meet Dan Reardon aka Haircutfish</p><p>00:51 Dan's Journey into Cybersecurity</p><p>01:14 The Art of Meme Making</p><p>02:15 Connecting Through Memes</p><p>06:20 Dan's Blogging Adventures</p><p>11:50 Learning and Adapting in Cybersecurity</p><p>14:21 Dan's Hacker Origin Story</p><p>17:07 Getting Started with TryHackMe and Blue Teaming</p><p>17:48 First Security Job Experience</p><p>18:19 Expectations vs Reality in SOC Roles</p><p>20:30 Favorite Tools and Utilities</p><p>25:16 The Importance of Community in Cybersecurity</p><p>33:08 Final Thoughts and Recommendations for Blue Teamers</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Jan 2025 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/64f041e0/053e014e.mp3" length="35950291" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2243</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join hosts Josh Mason and Wade Wells in this episode of Simply Defensive as they welcome cybersecurity meme-maker and SOC analyst, Dan Reardon, also known as The HaircutFish.</p><p>Discover Dan's unconventional journey into cybersecurity, from creating influential memes about prominent figures like Jon Hammond and John Strand to writing insightful blogs on Medium. Dan shares his experiences at Wild West Hacking Fest, overcoming personal challenges, and the importance of networking within the cybersecurity community.</p><p>Learn about the reality of working as a SOC analyst, the tools of the trade such as Vim, VS Code, and Wireshark, and the rewarding nature of thwarting cyber attacks. This episode emphasizes the power of community, the significance of balancing work with family life, and the benefits of giving back through knowledge sharing.</p><p>Don't miss these valuable insights, and expect more exciting discussions in future episodes!</p><p>Connect with our guest, Dan Reardon, on LinkedIn: <a href="https://www.linkedin.com/in/danrearden/">https://www.linkedin.com/in/danrearden</a></p><p><br></p><p>00:00 Welcome to Simply Defensive</p><p>00:10 Meet Dan Reardon aka Haircutfish</p><p>00:51 Dan's Journey into Cybersecurity</p><p>01:14 The Art of Meme Making</p><p>02:15 Connecting Through Memes</p><p>06:20 Dan's Blogging Adventures</p><p>11:50 Learning and Adapting in Cybersecurity</p><p>14:21 Dan's Hacker Origin Story</p><p>17:07 Getting Started with TryHackMe and Blue Teaming</p><p>17:48 First Security Job Experience</p><p>18:19 Expectations vs Reality in SOC Roles</p><p>20:30 Favorite Tools and Utilities</p><p>25:16 The Importance of Community in Cybersecurity</p><p>33:08 Final Thoughts and Recommendations for Blue Teamers</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Sponsored by ThreatLocker <a href="https://simplycyber.io/threatlocker">@ThreatLocker<br></a>Allow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform from ThreatLocker. Learn more at <a href="https://simplycyber.io/threatlocker">https://simplycyber.io/threatlocker</a><br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E8: From Cyber Beginnings to VP - An Interview with Melanie Thomas</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E8: From Cyber Beginnings to VP - An Interview with Melanie Thomas</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d4a71a5a-43af-4628-957e-7fd6e25f10be</guid>
      <link>https://simplydefensive.transistor.fm/s1/8</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Melanie Thomas, Vice President of Cyber Security at BridgePoint Technologies. Melanie shares insights from her role, her experience in cybersecurity, and her path from tech support to VP. She discusses her adjunct professorship at the University of San Diego, her community service, and the importance of networking. The conversation covers the significance of education in cybersecurity, Melanie's approach to balancing technical and strategic roles, and valuable advice for new entrants in the field, including teamwork and maintaining humility.</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Melanie Thomas, Vice President of Cyber Security at BridgePoint Technologies. Melanie shares insights from her role, her experience in cybersecurity, and her path from tech support to VP. She discusses her adjunct professorship at the University of San Diego, her community service, and the importance of networking. The conversation covers the significance of education in cybersecurity, Melanie's approach to balancing technical and strategic roles, and valuable advice for new entrants in the field, including teamwork and maintaining humility.</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </content:encoded>
      <pubDate>Mon, 18 Nov 2024 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/97954b7c/766c47b8.mp3" length="30407216" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>1896</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Melanie Thomas, Vice President of Cyber Security at BridgePoint Technologies. Melanie shares insights from her role, her experience in cybersecurity, and her path from tech support to VP. She discusses her adjunct professorship at the University of San Diego, her community service, and the importance of networking. The conversation covers the significance of education in cybersecurity, Melanie's approach to balancing technical and strategic roles, and valuable advice for new entrants in the field, including teamwork and maintaining humility.</p><p><br></p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================<br>This podcast is presented by Simply Cyber Media Group</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E7: War Driving Adventures and Hard Hat Brigade Insights</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E7: War Driving Adventures and Hard Hat Brigade Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30b2a7d9-d9fd-4d25-bac0-047019c10aa0</guid>
      <link>https://simplydefensive.transistor.fm/s1/7</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Ken, also known as MonkeyDragon, a member of Defcon 858 in San Diego and co-founder of Hard Hat Brigade. Ken introduces himself and discusses his role in cybersecurity, focusing primarily on incident response, threat detection, and threat hunting. The conversation transitions to the topic of 'war driving,' a practice of searching for wireless networks, which Ken is passionate about. He shares insights into the tools used, such as Kismet, and the community-driven project, Wiggle. Ken also talks about his journey into cybersecurity, the origins, and the activities of the Hard Hat Brigade, and offers advice for new blue teamers: ask questions without fear. The episode highlights Ken's involvement in various security events and his emphasis on community and kindness in the cybersecurity field.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Ken, also known as MonkeyDragon, a member of Defcon 858 in San Diego and co-founder of Hard Hat Brigade. Ken introduces himself and discusses his role in cybersecurity, focusing primarily on incident response, threat detection, and threat hunting. The conversation transitions to the topic of 'war driving,' a practice of searching for wireless networks, which Ken is passionate about. He shares insights into the tools used, such as Kismet, and the community-driven project, Wiggle. Ken also talks about his journey into cybersecurity, the origins, and the activities of the Hard Hat Brigade, and offers advice for new blue teamers: ask questions without fear. The episode highlights Ken's involvement in various security events and his emphasis on community and kindness in the cybersecurity field.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 11 Nov 2024 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/7a26cbf1/18704338.mp3" length="36111085" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2253</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Ken, also known as MonkeyDragon, a member of Defcon 858 in San Diego and co-founder of Hard Hat Brigade. Ken introduces himself and discusses his role in cybersecurity, focusing primarily on incident response, threat detection, and threat hunting. The conversation transitions to the topic of 'war driving,' a practice of searching for wireless networks, which Ken is passionate about. He shares insights into the tools used, such as Kismet, and the community-driven project, Wiggle. Ken also talks about his journey into cybersecurity, the origins, and the activities of the Hard Hat Brigade, and offers advice for new blue teamers: ask questions without fear. The episode highlights Ken's involvement in various security events and his emphasis on community and kindness in the cybersecurity field.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E6: Aligning Red and Blue Best Practices for Effective SOCs </title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E6: Aligning Red and Blue Best Practices for Effective SOCs </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">371b65aa-bb62-4656-9647-81b7be333cd5</guid>
      <link>https://simplydefensive.transistor.fm/s1/6</link>
      <description>
        <![CDATA[<p>Welcome to Simply Defensive! Josh Mason and co-host Wade Wells sit down with special guest Ashley Knowles from Black Hills InfoSec. Dive into the world of pen testing, SOC management, and the complex relationships between blue and red teams. Ashley shares her experiences working as a penetration tester for over a decade, her role with Black Hills InfoSec, and insights on improving SOC operations. Discover the challenges of balancing SOC metrics, handling new threats, and fostering transparency between teams. Plus, learn about the intricacies of Microsoft DevTunnels and other cutting-edge techniques used in the field. Don't miss Ashley's advice on research, continuous learning, and the importance of Googling effectively.</p><p>Subscribe and hit the bell for more episodes!</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Simply Defensive! Josh Mason and co-host Wade Wells sit down with special guest Ashley Knowles from Black Hills InfoSec. Dive into the world of pen testing, SOC management, and the complex relationships between blue and red teams. Ashley shares her experiences working as a penetration tester for over a decade, her role with Black Hills InfoSec, and insights on improving SOC operations. Discover the challenges of balancing SOC metrics, handling new threats, and fostering transparency between teams. Plus, learn about the intricacies of Microsoft DevTunnels and other cutting-edge techniques used in the field. Don't miss Ashley's advice on research, continuous learning, and the importance of Googling effectively.</p><p>Subscribe and hit the bell for more episodes!</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 04 Nov 2024 09:30:00 -0500</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/a6fedc33/95146cd2.mp3" length="40574897" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2532</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Simply Defensive! Josh Mason and co-host Wade Wells sit down with special guest Ashley Knowles from Black Hills InfoSec. Dive into the world of pen testing, SOC management, and the complex relationships between blue and red teams. Ashley shares her experiences working as a penetration tester for over a decade, her role with Black Hills InfoSec, and insights on improving SOC operations. Discover the challenges of balancing SOC metrics, handling new threats, and fostering transparency between teams. Plus, learn about the intricacies of Microsoft DevTunnels and other cutting-edge techniques used in the field. Don't miss Ashley's advice on research, continuous learning, and the importance of Googling effectively.</p><p>Subscribe and hit the bell for more episodes!</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E5: Incident Response, Career Evolution, and the Importance of Soft Skills</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E5: Incident Response, Career Evolution, and the Importance of Soft Skills</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1df67bab-cd19-4056-b078-d51e19444429</guid>
      <link>https://simplydefensive.transistor.fm/s1/5</link>
      <description>
        <![CDATA[<p>Blake Reagan on Incident Response, Career Evolution, and the Importance of Soft Skills</p><p><br></p><p>In this week's episode of Simply Defensive, host Josh Mason and co-host Wade Wells welcome incident response expert Blake Reagan. The discussion delves into Blake's journey from the building trades to cybersecurity, a field he entered after the 2008 economic downturn. Blake shares his experiences in digital forensics, emphasizing the importance of soft skills like public speaking and effective communication in cybersecurity roles. The trio also discusses the merits of tools like the Autopsy Digital Forensics platform, the utility of Toastmasters for public speaking, and time management strategies, making this episode a comprehensive look at the tech and human sides of cybersecurity.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Blake Reagan on Incident Response, Career Evolution, and the Importance of Soft Skills</p><p><br></p><p>In this week's episode of Simply Defensive, host Josh Mason and co-host Wade Wells welcome incident response expert Blake Reagan. The discussion delves into Blake's journey from the building trades to cybersecurity, a field he entered after the 2008 economic downturn. Blake shares his experiences in digital forensics, emphasizing the importance of soft skills like public speaking and effective communication in cybersecurity roles. The trio also discusses the merits of tools like the Autopsy Digital Forensics platform, the utility of Toastmasters for public speaking, and time management strategies, making this episode a comprehensive look at the tech and human sides of cybersecurity.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 28 Oct 2024 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/a4d94f77/6cac8b6e.mp3" length="37171902" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2319</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Blake Reagan on Incident Response, Career Evolution, and the Importance of Soft Skills</p><p><br></p><p>In this week's episode of Simply Defensive, host Josh Mason and co-host Wade Wells welcome incident response expert Blake Reagan. The discussion delves into Blake's journey from the building trades to cybersecurity, a field he entered after the 2008 economic downturn. Blake shares his experiences in digital forensics, emphasizing the importance of soft skills like public speaking and effective communication in cybersecurity roles. The trio also discusses the merits of tools like the Autopsy Digital Forensics platform, the utility of Toastmasters for public speaking, and time management strategies, making this episode a comprehensive look at the tech and human sides of cybersecurity.</p><p><br>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E4: Real Talk on Cybersecurity Careers with FedX</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E4: Real Talk on Cybersecurity Careers with FedX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb4f2be4-8130-4e29-b908-3cb673832f10</guid>
      <link>https://simplydefensive.transistor.fm/s1/4</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by @TheFedXChannel, a seasoned security analyst from Central Florida. The conversation starts with FedEx discussing his local internet setup and transitioning into his extensive career journey from construction to IT and cybersecurity. They explore the importance of real-world experience, the challenges of getting started in the cybersecurity industry, and the value of networking, both online and locally. FedEx also shares his journey through higher education and obtaining his degree, along with the significance of continuous learning and certifications. The episode concludes with FedEx discussing his newly launched YouTube channel focused on cybersecurity content and his inspiration to share knowledge and help others enter the field.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by @TheFedXChannel, a seasoned security analyst from Central Florida. The conversation starts with FedEx discussing his local internet setup and transitioning into his extensive career journey from construction to IT and cybersecurity. They explore the importance of real-world experience, the challenges of getting started in the cybersecurity industry, and the value of networking, both online and locally. FedEx also shares his journey through higher education and obtaining his degree, along with the significance of continuous learning and certifications. The episode concludes with FedEx discussing his newly launched YouTube channel focused on cybersecurity content and his inspiration to share knowledge and help others enter the field.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 21 Oct 2024 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/e4d8d8b2/8e1dfe4e.mp3" length="36537388" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2279</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by @TheFedXChannel, a seasoned security analyst from Central Florida. The conversation starts with FedEx discussing his local internet setup and transitioning into his extensive career journey from construction to IT and cybersecurity. They explore the importance of real-world experience, the challenges of getting started in the cybersecurity industry, and the value of networking, both online and locally. FedEx also shares his journey through higher education and obtaining his degree, along with the significance of continuous learning and certifications. The episode concludes with FedEx discussing his newly launched YouTube channel focused on cybersecurity content and his inspiration to share knowledge and help others enter the field.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E3: Watchmaker to Threat Hunter - Jibby's Remarkable Journey</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E3: Watchmaker to Threat Hunter - Jibby's Remarkable Journey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9e747e86-d352-4a23-8df7-1d52becd769f</guid>
      <link>https://simplydefensive.transistor.fm/s1/3</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells interview their first guest of the season, Jibby. Jibby shares his incredible journey from a decade-long career in watch and jewelry repair to a thriving role in cybersecurity. By leveraging community support, hands-on learning platforms like KC7 Cyber and TryHackMe, and staying committed despite multiple setbacks, Jibby has secured a prestigious role at Microsoft as a Security Researcher. He highlights the importance of networking, community, and continuous learning in forging a successful path in cybersecurity. The episode also explores Jibby’s passion for contributing back to the community, leading to talks at various conferences and building new cybersecurity challenges for others.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells interview their first guest of the season, Jibby. Jibby shares his incredible journey from a decade-long career in watch and jewelry repair to a thriving role in cybersecurity. By leveraging community support, hands-on learning platforms like KC7 Cyber and TryHackMe, and staying committed despite multiple setbacks, Jibby has secured a prestigious role at Microsoft as a Security Researcher. He highlights the importance of networking, community, and continuous learning in forging a successful path in cybersecurity. The episode also explores Jibby’s passion for contributing back to the community, leading to talks at various conferences and building new cybersecurity challenges for others.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 14 Oct 2024 09:30:00 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/3d0bf17a/cb59eb12.mp3" length="41874749" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2613</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, hosts Josh Mason and Wade Wells interview their first guest of the season, Jibby. Jibby shares his incredible journey from a decade-long career in watch and jewelry repair to a thriving role in cybersecurity. By leveraging community support, hands-on learning platforms like KC7 Cyber and TryHackMe, and staying committed despite multiple setbacks, Jibby has secured a prestigious role at Microsoft as a Security Researcher. He highlights the importance of networking, community, and continuous learning in forging a successful path in cybersecurity. The episode also explores Jibby’s passion for contributing back to the community, leading to talks at various conferences and building new cybersecurity challenges for others.</p><p>=========================<br>Connect with your hosts:<br>Josh Mason: https://www.linkedin.com/in/joshuacmason<br>Wade Wells: https://www.linkedin.com/in/wadingthrulogs<br>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career 💪<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E2: Decoding Detection As Code - A Deep Dive with Wade Wells</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E2: Decoding Detection As Code - A Deep Dive with Wade Wells</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b51bc20a-c564-4a86-9c3c-2b8fb79ade51</guid>
      <link>https://simplydefensive.transistor.fm/s1/2</link>
      <description>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason talks with co-host Wade Wells about the concept of 'detection as code,' a methodology in cybersecurity focusing on automating and enhancing detection logic using software development principles. Wade shares his experiences and upcoming engagements, including his talk at Blue Team Con in Chicago. The duo delves into the intricacies of detection engineering, highlighting the similarities with DevOps practices and the importance of proper tuning and testing. They discuss the challenges and benefits of employing detection as code, its future potential, and the role of cybersecurity tools like Splunk, CrowdStrike, and Google Chronicle. The episode also touches on how detection engineering could impact red teaming and the importance of understanding the client's environment to create effective detections.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason talks with co-host Wade Wells about the concept of 'detection as code,' a methodology in cybersecurity focusing on automating and enhancing detection logic using software development principles. Wade shares his experiences and upcoming engagements, including his talk at Blue Team Con in Chicago. The duo delves into the intricacies of detection engineering, highlighting the similarities with DevOps practices and the importance of proper tuning and testing. They discuss the challenges and benefits of employing detection as code, its future potential, and the role of cybersecurity tools like Splunk, CrowdStrike, and Google Chronicle. The episode also touches on how detection engineering could impact red teaming and the importance of understanding the client's environment to create effective detections.</p>]]>
      </content:encoded>
      <pubDate>Mon, 07 Oct 2024 16:21:17 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/f4ebaaee/27dcc53d.mp3" length="46840017" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>4974</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Simply Defensive, host Josh Mason talks with co-host Wade Wells about the concept of 'detection as code,' a methodology in cybersecurity focusing on automating and enhancing detection logic using software development principles. Wade shares his experiences and upcoming engagements, including his talk at Blue Team Con in Chicago. The duo delves into the intricacies of detection engineering, highlighting the similarities with DevOps practices and the importance of proper tuning and testing. They discuss the challenges and benefits of employing detection as code, its future potential, and the role of cybersecurity tools like Splunk, CrowdStrike, and Google Chronicle. The episode also touches on how detection engineering could impact red teaming and the importance of understanding the client's environment to create effective detections.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>S1 E1: Simply Defensive Launches! Meet Your Hosts, Josh and Wade</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>S1 E1: Simply Defensive Launches! Meet Your Hosts, Josh and Wade</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4749c71-3270-46c6-8b8f-71fab03520fd</guid>
      <link>https://simplydefensive.transistor.fm/s1/1</link>
      <description>
        <![CDATA[<p>Simply Defensive: Episode 1 - Meet Your Hosts, Josh and Wade</p><p><br></p><p>Welcome to the inaugural episode of Simply Defensive! Join hosts Josh Mason and Wade Wells as they introduce the podcast and share their professional backgrounds in cybersecurity. Discover the story behind the podcast's creation, their unique approach compared to vendor-driven content, and the importance of community in cybersecurity. Josh dives into his journey from being a pilot in the Air Force to becoming a director of cyber training, while Wade talks about his varied roles in the cybersecurity industry, including his work in SOCs and threat intelligence.</p><p><br>Get insights on upcoming talks, community involvement, and the launch of future episodes focused on real-world experiences from the defensive side of cybersecurity.</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Simply Defensive: Episode 1 - Meet Your Hosts, Josh and Wade</p><p><br></p><p>Welcome to the inaugural episode of Simply Defensive! Join hosts Josh Mason and Wade Wells as they introduce the podcast and share their professional backgrounds in cybersecurity. Discover the story behind the podcast's creation, their unique approach compared to vendor-driven content, and the importance of community in cybersecurity. Josh dives into his journey from being a pilot in the Air Force to becoming a director of cyber training, while Wade talks about his varied roles in the cybersecurity industry, including his work in SOCs and threat intelligence.</p><p><br>Get insights on upcoming talks, community involvement, and the launch of future episodes focused on real-world experiences from the defensive side of cybersecurity.</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </content:encoded>
      <pubDate>Mon, 30 Sep 2024 23:43:12 -0400</pubDate>
      <author>Simply Cyber Media Group</author>
      <enclosure url="https://media.transistor.fm/e26ae689/d99729b4.mp3" length="32629509" type="audio/mpeg"/>
      <itunes:author>Simply Cyber Media Group</itunes:author>
      <itunes:duration>2035</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Simply Defensive: Episode 1 - Meet Your Hosts, Josh and Wade</p><p><br></p><p>Welcome to the inaugural episode of Simply Defensive! Join hosts Josh Mason and Wade Wells as they introduce the podcast and share their professional backgrounds in cybersecurity. Discover the story behind the podcast's creation, their unique approach compared to vendor-driven content, and the importance of community in cybersecurity. Josh dives into his journey from being a pilot in the Air Force to becoming a director of cyber training, while Wade talks about his varied roles in the cybersecurity industry, including his work in SOCs and threat intelligence.</p><p><br>Get insights on upcoming talks, community involvement, and the launch of future episodes focused on real-world experiences from the defensive side of cybersecurity.</p><p>=========================<br>Simply Cyber empowers people who want a rewarding cybersecurity career<br>=========================<br>All the ways to connect with Simply Cyber<br>https://SimplyCyber.io/Socials<br>=========================</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, blue team, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
